SCREAM: Sensory Channel Remote Execution Attack Methods
PublicDownloadable Content
open in viewerSensory channel threats on embedded systems are an often overlooked attack vector. Because many computing systems focus on digital communication, much of the security research for embedded systems has focused on securing the communication channels between devices. This project explores sensory channel attack concepts and demonstrates that an attack on an embedded device purely through sensory channel inputs can achieve arbitrary code execution. Unlike previous research on sensory channel attacks, this work does not require the device to have preloaded malware. We demonstrate that our attacks were successful in two separate, realistic applications with up to a 100.00% success rate. Finally, we propose a possible defense to these attacks and suggest future avenues of research in this field.
- This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
- Creator
- Publisher
- Identifier
- E-project-032016-122925
- Advisor
- Year
- 2016
- Date created
- 2016-03-20
- Resource type
- Major
- Rights statement
- Last modified
- 2020-12-29
Relations
- In Collection:
Items
Permanent link to this page: https://digital.wpi.edu/show/p5547t008