Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427277
|View full text |Cite
|
Sign up to set email alerts
|

LeakyPick: IoT Audio Spy Detector

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 17 publications
0
13
0
1
Order By: Relevance
“…Hidden Wireless Camera Detection: There are emerging research efforts performing hidden wireless camera detection due to their popularity and the privacy concerns associated with unauthorized videotaping [9,10,22,24,29,39]. For example, [10] proposes a hidden wireless camera detection approach by utilizing the intrinsic traffic patterns of flows from wireless cameras.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Hidden Wireless Camera Detection: There are emerging research efforts performing hidden wireless camera detection due to their popularity and the privacy concerns associated with unauthorized videotaping [9,10,22,24,29,39]. For example, [10] proposes a hidden wireless camera detection approach by utilizing the intrinsic traffic patterns of flows from wireless cameras.…”
Section: Related Workmentioning
confidence: 99%
“…[24] investigates the responsive traffic variation corresponding to the light condition change to determine whether the traffic is produced by a wireless camera. [29] proposes to detect wireless cameras by monitoring network traffic that indicates the characteristics of corresponding audio transmission. All those traffic pattern based techniques, however, can only detect the existence of traffic flows belonging to wireless cameras, and they cannot tell the exact location of the camera.…”
Section: Related Workmentioning
confidence: 99%
“…We assume that the adversaries conduct attacks in the WLAN, and the specific behaviors can be (1) connecting unauthorized devices to the wireless network such as hidden cameras and bugs [24,47]; (2) using IoT honeypots or virtual machines to forge legitimate real devices [48,49]; (3) utilizing software to counterfeit the wireless AP, which has the same SSID and MAC address as the legitimate one, deceiving the user to connect and further performing malicious attacks [17][18][19][20]; (4) exploiting the device vulnerabilities that have been disclosed on the Internet to endanger the security of user devices and the entire platform [37,50].…”
Section: Reat Modelmentioning
confidence: 99%
“…None of the developed methods considers privacy preservation on audio data. However, recently smart home IoT devices are increasing adding audio recording and monitoring features to a numerous household devices including smart speakers, virtual assistant AI devices, security systems, thermostats, doorbells, voice control devices (TV, vacuum cleaner), and many more [3]. All of the voice control devices are equipped with recorders and microphones which significantly increases privacy concerns.…”
Section: Introductionmentioning
confidence: 99%