The peer-to-peer network used by AirTags, Apple's just-released tracking and location devices, could be used by anyone to send small amounts of data, essentially creating a covert channel not limited ...
Researchers bypass Android security mechanisms and exploit smartphone cellular voice channel to act as a new covert channel which can potentially be used to leak information and to spread malware.
A new technical paper titled “Clock-to-Clock Modulation Covert Channel” was published by researchers at University of Rennes-INSA Rennes-IETR-UMR and University of South Brittany/Lab-STICC- UMR CNRS. ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results