Previous research about sensor based attacks on Android platform focused mainly on accessing or controlling over sensitive device components, such as camera, microphone and GPS. These approaches get data from sensors directly and need corresponding sensor invoking permissions. This paper presents a novel approach (GVS-Attack) to launch permission bypassing attacks from a zero permission Android application (VoicEmployer) through the speaker. The idea of GVS-Attack utilizes an Android system built-in voice assistant module -- Google Voice Search. Through Android Intent mechanism, VoicEmployer triggers Google Voice Search to the foreground, and then plays prepared audio files (like "call number 1234 5678") in the background. Google Voice Search can recognize this voice command and execute corresponding operations. With ingenious designs, our GVS-Attack can forge SMS/Email, access privacy information, transmit sensitive data and achieve remote control without any permission. Also we found a vulnerability of status checking in Google Search app, which can be utilized by GVS-Attack to dial arbitrary numbers even when the phone is securely locked with password. A prototype of VoicEmployer has been implemented to demonstrate the feasibility of GVS-Attack in real world. In theory, nearly all Android devices equipped with Google Services Framework can be affected by GVS-Attack. This study may inspire application developers and researchers rethink that zero permission doesn't mean safety and the speaker can be treated as a new attack surface.
翻译:先前对安道尔平台的基于传感器的袭击的研究主要侧重于访问或控制敏感设备部件,如相机、麦克风和全球定位系统。这些方法直接从传感器获得数据,需要相应的传感器援引许可。本文展示了一种创新方法(GVS-Attack),从零许可的安道(VoicEmployer)应用程序(Voic-Attack)通过发言者启动绕过攻击的许可。GVS-Attack的想法使用一个安道系统内置语音助理模块 -- -- Google语音搜索。通过安卓 Intent 机制,VoicEmployer触发Google语音搜索到前方,然后在背景中播放准备的音频文件(如“12345678”呼叫号)。Google语音搜索可以识别这个语音指令,并通过演讲者进行相应的操作。GVS-Atack安全框架、隐私信息、敏感数据传输和远程控制。我们发现,Google Serial Strial 应用程序很容易在谷搜索中进行状态检查,GVS-S-stalalal Alistal Alistal Alistal Alistration Slisherviewd Slift