Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping
The contact-free sensing nature of Wi-Fi has been leveraged to achieve privacy breaches,
yet existing attacks relying on Wi-Fi CSI (channel state information) demand hacking Wi-Fi …
yet existing attacks relying on Wi-Fi CSI (channel state information) demand hacking Wi-Fi …
Eye of Sauron:{Long-Range} Hidden Spy Camera Detection and Positioning with Inbuilt Memory {EM} Radiation
In this paper, we present ESauron—the first proof-of-concept system that can detect diverse
forms of spy cameras (ie, wireless, wired and offline devices) and quickly pinpoint their …
forms of spy cameras (ie, wireless, wired and offline devices) and quickly pinpoint their …
Revealing Hidden IoT Devices through Passive Detection, Fingerprinting, and Localization
Internet-of-things (IoT) devices (eg, micro camera and microphone) are usually small form
factor, low-cost, and low-power, which makes them easy to conceal and deploy in the indoor …
factor, low-cost, and low-power, which makes them easy to conceal and deploy in the indoor …
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices
Unlawful wireless cameras are often hidden to secretly monitor private activities. However,
existing methods to detect and localize these cameras are interactively complex or require …
existing methods to detect and localize these cameras are interactively complex or require …
MuKI-Fi: Multi-person Keystroke Inference with BFI-enabled Wi-Fi Sensing
The contact-free sensing nature of Wi-Fi has been leveraged to achieve privacy breaches
such as keystroke inference (KI). However, the use of channel state information (CSI) in …
such as keystroke inference (KI). However, the use of channel state information (CSI) in …
GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations
The escalating threat of hidden GPS tracking devices poses significant risks to personal
privacy and security. Featured by their miniaturization and misleading appearances, GPS …
privacy and security. Featured by their miniaturization and misleading appearances, GPS …
RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound Reflection
Password inference attacks by covert wireless side-channels jeopardize information safety,
even for people with high security awareness and vigilance against snoopers. Yet, with …
even for people with high security awareness and vigilance against snoopers. Yet, with …
CamShield: Tracing Electromagnetics to Steer Ultrasound Against Illegal Cameras
To balance venue safety with public photography rights, this article presents CamShield—a
novel system for selective defense against unauthorized photography. Amid dense …
novel system for selective defense against unauthorized photography. Amid dense …
Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation
Unauthorized covert voice recording presents a significant threat to privacy-sensitive
scenarios, such as confidential meetings and private conversations. Due to their …
scenarios, such as confidential meetings and private conversations. Due to their …
[PDF][PDF] EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras
IoT devices and other embedded systems are in-creasingly equipped with cameras that can
sense critical information in private spaces. The data security of these cameras, however …
sense critical information in private spaces. The data security of these cameras, however …