Eye of Sauron:{Long-Range} Hidden Spy Camera Detection and Positioning with Inbuilt Memory {EM} Radiation

Q Zhang, D Liu, X Zhang, Z Cao, F Zeng… - 33rd USENIX Security …, 2024 - usenix.org
In this paper, we present ESauron—the first proof-of-concept system that can detect diverse
forms of spy cameras (ie, wireless, wired and offline devices) and quickly pinpoint their …

A Survey on Human Profile Information Inference via Wireless Signals

Q He, E Yang, S Fang - IEEE Communications Surveys & …, 2024 - ieeexplore.ieee.org
Due to the ubiquitous deployment of wireless infrastructures, the radio signal nature of
invisibility, and the elimination of the line-of-sight requirement, it has drawn increasing …

Camradar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations

Z Liu, F Lin, C Wang, Y Shen, Z Ba, L Lu, W Xu… - Proceedings of the …, 2023 - dl.acm.org
Hidden cameras in sensitive locations have become an increasing threat to personal privacy
all over the world. Because the camera is small and camouflaged, it is difficult to detect the …

Sneaky spy devices and defective detectors: the ecosystem of intimate partner surveillance with covert devices

R Ceccio, S Stephenson, V Chadha… - 32nd USENIX Security …, 2023 - usenix.org
Recent anecdotal evidence suggests that abusers have begun to use covert spy devices
such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …

When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription

Y He, Q He, S Fang, Y Liu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Wireless security cameras may deter intruders. Accompanying the hardware, consumers
may pay recurring monthly fees for recording videos to the cloud, or use the free tier offering …

Are there wireless hidden cameras spying on me?

J Heo, S Gil, Y Jung, J Kim, D Kim, W Park… - Proceedings of the 38th …, 2022 - dl.acm.org
The proliferation of IoT devices has created risks of their abuse for unauthorized
sensing/monitoring of our daily activities. Especially, the leakage of images taken by …

LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices

Y Gu, J Chen, C Wu, K He, Z Zhao, R Du - Proceedings of the ACM on …, 2024 - dl.acm.org
Unlawful wireless cameras are often hidden to secretly monitor private activities. However,
existing methods to detect and localize these cameras are interactively complex or require …

Revealing Hidden IoT Devices through Passive Detection, Fingerprinting, and Localization

W Sun, H Givehchian, D Bharadia - Proceedings on Privacy …, 2025 - petsymposium.org
Internet-of-things (IoT) devices (eg, micro camera and microphone) are usually small form
factor, low-cost, and low-power, which makes them easy to conceal and deploy in the indoor …

Phantom-CSI Attacks against Wireless Liveness Detection

Q He, S Fang - Proceedings of the 26th International Symposium on …, 2023 - dl.acm.org
All systems monitoring human behavior in real time are, by their nature, attractive targets for
spoofing. For example, misdirecting live-feed security cameras or voice-controllable Internet …

Precise Wireless Camera Localization Leveraging Traffic-aided Spatial Analysis

Y He, Q He, S Fang, Y Liu - IEEE Transactions on Mobile …, 2023 - ieeexplore.ieee.org
Wireless cameras nowadays commonly employ motion sensors to identify that something is
occurring in their fields of vision before starting to record and notifying the property owner of …