Taxonomy and challenges of out-of-band signal injection attacks and defenses

I Giechaskiel, K Rasmussen - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Recent research has shown that the integrity of sensor measurements can be violated
through out-of-band signal injection attacks. These attacks target the conversion process …

mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device

C Wang, F Lin, T Liu, K Zheng, Z Wang, Z Li… - Proceedings of the 28th …, 2022 - dl.acm.org
Earpiece mode of smartphones is often used for confidential communication. In this paper,
we proposed a remote (> 2m) and motion-resilient attack on smartphone earpiece. We …

Milliear: Millimeter-wave acoustic eavesdropping with unconstrained vocabulary

P Hu, Y Ma, PS Santhalingam… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
As acoustic communication systems become more common in homes and offices,
eavesdropping brings significant security and privacy risks. Current approaches of acoustic …

Accear: Accelerometer acoustic eavesdropping with unconstrained vocabulary

P Hu, H Zhuang, PS Santhalingam… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
With the increasing popularity of voice-based applications, acoustic eavesdropping has
become a serious threat to users' privacy. While on smartphones the access to microphones …

Wearable microphone jamming

Y Chen, H Li, SY Teng, S Nagels, Z Li… - Proceedings of the …, 2020 - dl.acm.org
We engineered a wearable microphone jammer that is capable of disabling microphones in
its user's surroundings, including hidden microphones. Our device is based on a recent …

mmecho: A mmwave-based acoustic eavesdropping method

P Hu, W Li, R Spolaor, X Cheng - Proceedings of the ACM Turing Award …, 2023 - dl.acm.org
Acoustic eavesdropping on private or confidential spaces poses a significant privacy threat.
While soundproof rooms can mitigate these risks to some extent, they are unable to counter …

Lamphone: Real-time passive sound recovery from light bulb vibrations

B Nassi, Y Pirutin, A Shamir, Y Elovici… - Cryptology ePrint …, 2020 - eprint.iacr.org
Recent studies have suggested various side-channel attacks for eavesdropping sound by
analyzing the side effects of sound waves on nearby objects (eg, a bag of chips and …

Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication

M Guri, Y Solewicz, Y Elovici - 2018 IEEE Conference on …, 2018 - ieeexplore.ieee.org
In this paper we show how two or more air-gapped computers in the same room, equipped
with passive speakers, headphones, or earphones can covertly exchange data via …

Hard drive of hearing: Disks that eavesdrop with a synthesized microphone

A Kwong, W Xu, K Fu - 2019 IEEE symposium on security and …, 2019 - ieeexplore.ieee.org
Security conscious individuals may take considerable measures to disable sensors in order
to protect their privacy. However, they often overlook the cyberphysical attack surface …

Watchdog: Detecting ultrasonic-based inaudible voice attacks to smart home systems

J Mao, S Zhu, X Dai, Q Lin, J Liu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things is a critical infrastructure component as well as an enabling technology to
support the fast-developing cross-region, cross-application, and diversified collaborative …