skip to main content
10.1145/2789168.2790119acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Acoustic Eavesdropping through Wireless Vibrometry

Authors Info & Claims
Published:07 September 2015Publication History

ABSTRACT

Loudspeakers are widely used in conferencing and infotainment systems. Private information leakage from loudspeaker sound is often assumed to be preventable using sound-proof isolators like walls. In this paper, we explore a new acoustic eavesdropping attack that can subvert such protectors using radio devices. Our basic idea lies in an acoustic-radio transformation (ART) algorithm, which recovers loudspeaker sound by inspecting the subtle disturbance it causes to the radio signals generated by an adversary or by its co-located WiFi transmitter. ART builds on a modeling framework that distills key factors to determine the recovered audio quality. It incorporates diversity mechanisms and noise suppression algorithms that can boost the eavesdropping quality. We implement the ART eavesdropper on a software-radio platform and conduct experiments to verify its feasibility and threat level. When targeted at vanilla PC or smartphone loudspeakers, the attacker can successfully recover high-quality audio even when blocked by sound-proof walls. On the other hand, we propose several pragmatic countermeasures that can effectively reduce the attacker's audio recovery quality by orders of magnitude.

References

  1. Z. C. Taysi, M. A. Guvensan, and T. Melodia, "TinyEARS: Spying on House Appliances with Audio Sensor Nodes," in Proc. of ACM BuildSys, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Zhuang, F. Zhou, and J. D. Tygar, "Keyboard Acoustic Emanations Revisited," ACM Transactions on Information System Security, vol. 13, no. 1, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Backes, M. Dürmuth, S. Gerling, M. Pinkal, and C. Sporleder, "Acoustic Side-channel Attacks on Printers," in Proc. of USENIX Security, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Genkin, A. Shamir, and E. Tromer, "RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis," 2014.Google ScholarGoogle ScholarCross RefCross Ref
  5. P. Castellini, M. Martarelli, and E. Tomasini, "Laser Doppler Vibrometry: Development of Advanced Solutions Answering to Technology's Needs," Mechanical Systems and Signal Processing, vol. 20, no. 6, 2006.Google ScholarGoogle Scholar
  6. S. Sen, B. Radunovic, R. R. Choudhury, and T. Minka, "You Are Facing the Mona Lisa: Spot Localization Using PHY Layer Information," in Proc. of ACM MobiSys, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Q. Pu, S. Gupta, S. Gollakota, and S. Patel, "Whole-home Gesture Recognition using Wireless Signals," in ACM MobiCom, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Wang, Y. Zou, Z. Zhou, K. Wu, and L. M. Ni, "We Can Hear You with Wi-Fi!" in Proc. of ACM MobiCom, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Davis, M. Rubinstein, N. Wadhwa, G. J. Mysore, F. Durand, and W. T. Freeman, "The Visual Microphone: Passive Recovery of Sound from Video," ACM Trans. Graph., vol. 33, no. 4, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge University Press, 2005. Google ScholarGoogle ScholarCross RefCross Ref
  11. BIBentryALTinterwordspacingW. Klippel and J. Schlechter, "Measurement and Visualization of Loudspeaker Cone Vibration," 2006. {Online}. Available: http://www.aes.org/e-lib/browse.cfm?elib=13716BIBentrySTDinterwordspacingGoogle ScholarGoogle Scholar
  12. J. R. Stuart, "Noise: methods for estimating detectability and threshold," Journal of the Audio Engineering Society, 1994.Google ScholarGoogle Scholar
  13. M. Vorlander, Auralization: Fundamentals of Acoustics, Modelling, Simulation, Algorithms and Acoustic Virtual Reality. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. X. Zhang and K. G. Shin, "E-Mili: Energy-Minimizing Idle Listening in Wireless Networks," Proc. of ACM MobiCom, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Sur, T. Wei, and X. Zhang, "Bringing Multi-Antenna Gain to Energy-Constrained Wireless Devices," in Proc. of ACM/IEEE IPSN, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Selva, "Functionally weighted Lagrange interpolation of band-limited signals from nonuniform samples," IEEE Transactions on Signal Processing, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. "ARP Request Replay Attack," http://www.aircrack-ng.org/doku.php?id=arp-request_reinjection, 2010.Google ScholarGoogle Scholar
  18. A. Musa and J. Eriksson, "Tracking Unmodified Smartones Using Wi-Fi Monitors." Proc. of ACM SenSys, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. "Introduction to Wi-Fi Wireless Antennas," http://compnetworking.about.com/od/homenetworkhardware/a/introduction-to-wifi-wireless-antennas.htm, 2015.Google ScholarGoogle Scholar
  20. "WiFi Signal Attenuation," http://www.liveport.com/wifi-signal-attenuation, 2015.Google ScholarGoogle Scholar
  21. V. Shrivastava, D. Agrawal, A. Mishra, S. Banerjee, and T. Nadeem, "On the (in)feasibility of Fine Grained Power Control," Mobile Computing and Communications Review, vol. 11, no. 2, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Rice University, "Wireless Open-Access Research Platform," http://warp.rice.edu/trac/wiki, 2013.Google ScholarGoogle Scholar
  23. Volo Wireless LLC., "Wideband UHF Daughter Card (WURC)," 2014.Google ScholarGoogle Scholar
  24. "WARPLab 7_3_0 Benchmarks," http://warpproject.org/trac/wiki/WARPLab/Benchmarks/WARPLAB_7_3_0, 2014.Google ScholarGoogle Scholar
  25. R. P. Muscatell, "Laser microphone," 1984, uS Patent 4,479,265.Google ScholarGoogle Scholar
  26. W. McGrath, "Technique and device for through-the-wall audio surveillance," 2005, uS Patent App. 11/095,122.Google ScholarGoogle Scholar
  27. J. Nanzer, Microwave and millimeter-wave remote sensing for security applications. Artech House, 2012.Google ScholarGoogle Scholar
  28. V. Chen, F. Li, S.-S. Ho, and H. Wechsler, "Analysis of Micro-Doppler Signatures," IEE Proceedings on Radar, Sonar and Navigation, vol. 150, no. 4, 2003.Google ScholarGoogle Scholar
  29. F. Adib, Z. Kabelac, D. Katabi, and R. C. Miller, "3D Tracking via Body Radio Reflections," in Proc. of USENIX NSDI, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. F. Adib and D. Katabi, "See Through Walls with WiFi!" in Proc. of ACM SIGCOMM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Narain, A. Sanatinia, and G. Noubir, "Single-stroke Language-agnostic Keylogging Using Stereo-microphones and Domain Specific Machine Learning," in Proc. of ACM WiSec, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. P. Marquardt, A. Verma, H. Carter, and P. Traynor, "(Sp)iPhone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers," in Proc. of ACM CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Y. Michalevsky, D. Boneh, and G. Nakibly, "Gyrophone: Recognizing speech from gyroscope signals," in Proc. 23rd USENIX Security Symposium, USENIX Association, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Acoustic Eavesdropping through Wireless Vibrometry

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
      September 2015
      638 pages
      ISBN:9781450336192
      DOI:10.1145/2789168

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 September 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      MobiCom '15 Paper Acceptance Rate38of207submissions,18%Overall Acceptance Rate440of2,972submissions,15%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    ePub

    View this article in ePub.

    View ePub