Q Zhang, D Liu, X Zhang, Z Cao, F Zeng… - 33rd USENIX Security …, 2024 - usenix.org
In this paper, we present ESauron—the first proof-of-concept system that can detect diverse forms of spy cameras (ie, wireless, wired and offline devices) and quickly pinpoint their …
Internet-of-things (IoT) devices (eg, micro camera and microphone) are usually small form factor, low-cost, and low-power, which makes them easy to conceal and deploy in the indoor …
Y Gu, J Chen, C Wu, K He, Z Zhao, R Du - Proceedings of the ACM on …, 2024 - dl.acm.org
Unlawful wireless cameras are often hidden to secretly monitor private activities. However, existing methods to detect and localize these cameras are interactively complex or require …
H Wang, J Hu, T Zheng, J Hu, Z Chen… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The contact-free sensing nature of Wi-Fi has been leveraged to achieve privacy breaches such as keystroke inference (KI). However, the use of channel state information (CSI) in …
Y Li, Z Yan, W Jin, Z Ning, D Liu, Z Qin, Y Liu… - Proceedings of the …, 2024 - dl.acm.org
The escalating threat of hidden GPS tracking devices poses significant risks to personal privacy and security. Featured by their miniaturization and misleading appearances, GPS …
P Wang, J Hu, C Liu, J Luo - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Password inference attacks by covert wireless side-channels jeopardize information safety, even for people with high security awareness and vigilance against snoopers. Yet, with …
Q Zhang, P Wang, Y Li, J Hu, H Zheng… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
To balance venue safety with public photography rights, this article presents CamShield—a novel system for selective defense against unauthorized photography. Amid dense …
R Zhou, X Ji, H Chen, C Yan, W Xu - ACM Transactions on Sensor …, 2024 - dl.acm.org
Unauthorized covert voice recording presents a significant threat to privacy-sensitive scenarios, such as confidential meetings and private conversations. Due to their …
IoT devices and other embedded systems are in-creasingly equipped with cameras that can sense critical information in private spaces. The data security of these cameras, however …