Student Work

SCREAM: Sensory Channel Remote Execution Attack Methods

Public

Downloadable Content

open in viewer

Sensory channel threats on embedded systems are an often overlooked attack vector. Because many computing systems focus on digital communication, much of the security research for embedded systems has focused on securing the communication channels between devices. This project explores sensory channel attack concepts and demonstrates that an attack on an embedded device purely through sensory channel inputs can achieve arbitrary code execution. Unlike previous research on sensory channel attacks, this work does not require the device to have preloaded malware. We demonstrate that our attacks were successful in two separate, realistic applications with up to a 100.00% success rate. Finally, we propose a possible defense to these attacks and suggest future avenues of research in this field.

  • This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
Creator
Publisher
Identifier
  • E-project-032016-122925
Advisor
Year
  • 2016
Date created
  • 2016-03-20
Resource type
Major
Rights statement
Last modified
  • 2020-12-29

Relations

In Collection:

Items

Items

Permanent link to this page: https://digital.wpi.edu/show/p5547t008