"Our end-to-end attacks simply measure the rendering time per frame of the graphical operations… to determine whether the pixel was white or non-white.”
This is a prime example of something that is so simple, yet elegant, and brilliant. Fantastically cool and scary.
tidderuuf@lemmy.world 2 months ago
Let me stop you right there… and leave.
NaibofTabr@infosec.pub 2 months ago
Normally I would agree with this perspective, but in this case the “malicious app” is just a demo. It requires no permissions to do the malicious behavior, which means that the relevant code could be included in any app and wouldn’t trigger a user approval, a permissions request or a security alert. This could be hiding in anything that you install.
krooklochurm@lemmy.ca 2 months ago
Man in the middle an app download or find some kind of exploit to inject the code from a website, ta da.
I mean, obviously there’s more to it than this but.
NihilsineNefas@slrpnk.net 2 months ago
So they’re using the same programs that the three letter agencies of the world have been using to crack phones since before touchscreens existed?
FreedomAdvocate@lemmy.net.au 2 months ago
So it could be hiding in, what would you call them…….malicious apps?
The relevant code isn’t going to be in a non malicious app.