%0 Conference Proceedings %T Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping %+ Technical University of Berlin / Technische Universität Berlin (TU) %+ Weizenbaum Institut [Berlin] %A Kröger, Jacob, Leon %A Raschke, Philip %Z Part 2: Mobile and Web Security %< avec comité de lecture %( Lecture Notes in Computer Science %B 33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) %C Charleston, SC, United States %Y Simon N. Foley %I Springer International Publishing %3 Data and Applications Security and Privacy XXXIII %V LNCS-11559 %P 102-120 %8 2019-07-15 %D 2019 %R 10.1007/978-3-030-22479-0_6 %K Privacy %K Smartphone %K Eavesdropping %K Spying %K Listening %K Microphone %K Conversation %K Advertisement %Z Computer Science [cs]Conference papers %X Besides various other privacy concerns with mobile devices, many people suspect their smartphones to be secretly eavesdropping on them. In particular, a large number of reports has emerged in recent years claiming that private conversations conducted in the presence of smartphones seemingly resulted in targeted online advertisements. These rumors have not only attracted media attention, but also the attention of regulatory authorities. With regard to explaining the phenomenon, opinions are divided both in public debate and in research. While one side dismisses the eavesdropping suspicions as unrealistic or even paranoid, many others are fully convinced of the allegations or at least consider them plausible. To help structure the ongoing controversy and dispel misconceptions that may have arisen, this paper provides a holistic overview of the issue, reviewing and analyzing existing arguments and explanatory approaches from both sides. Based on previous research and our own analysis, we challenge the widespread assumption that the spying fears have already been disproved. While confirming a lack of empirical evidence, we cannot rule out the possibility of sophisticated large-scale eavesdropping attacks being successful and remaining undetected. Taking into account existing access control mechanisms, detection methods, and other technical aspects, we point out remaining vulnerabilities and research gaps. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-02384582/document %2 https://inria.hal.science/hal-02384582/file/480962_1_En_6_Chapter.pdf %L hal-02384582 %U https://inria.hal.science/hal-02384582 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-11559