Pwn the Fone: Automated Attacks Through Acoustic Analysis