Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping

J Hu, H Wang, T Zheng, J Hu, Z Chen… - Proceedings of the 2023 …, 2023 - dl.acm.org
The contact-free sensing nature of Wi-Fi has been leveraged to achieve privacy breaches,
yet existing attacks relying on Wi-Fi CSI (channel state information) demand hacking Wi-Fi …

Eye of Sauron:{Long-Range} Hidden Spy Camera Detection and Positioning with Inbuilt Memory {EM} Radiation

Q Zhang, D Liu, X Zhang, Z Cao, F Zeng… - 33rd USENIX Security …, 2024 - usenix.org
In this paper, we present ESauron—the first proof-of-concept system that can detect diverse
forms of spy cameras (ie, wireless, wired and offline devices) and quickly pinpoint their …

Revealing Hidden IoT Devices through Passive Detection, Fingerprinting, and Localization

W Sun, H Givehchian, D Bharadia - Proceedings on Privacy …, 2025 - petsymposium.org
Internet-of-things (IoT) devices (eg, micro camera and microphone) are usually small form
factor, low-cost, and low-power, which makes them easy to conceal and deploy in the indoor …

LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices

Y Gu, J Chen, C Wu, K He, Z Zhao, R Du - Proceedings of the ACM on …, 2024 - dl.acm.org
Unlawful wireless cameras are often hidden to secretly monitor private activities. However,
existing methods to detect and localize these cameras are interactively complex or require …

MuKI-Fi: Multi-person Keystroke Inference with BFI-enabled Wi-Fi Sensing

H Wang, J Hu, T Zheng, J Hu, Z Chen… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The contact-free sensing nature of Wi-Fi has been leveraged to achieve privacy breaches
such as keystroke inference (KI). However, the use of channel state information (CSI) in …

GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations

Y Li, Z Yan, W Jin, Z Ning, D Liu, Z Qin, Y Liu… - Proceedings of the …, 2024 - dl.acm.org
The escalating threat of hidden GPS tracking devices poses significant risks to personal
privacy and security. Featured by their miniaturization and misleading appearances, GPS …

RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound Reflection

P Wang, J Hu, C Liu, J Luo - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Password inference attacks by covert wireless side-channels jeopardize information safety,
even for people with high security awareness and vigilance against snoopers. Yet, with …

CamShield: Tracing Electromagnetics to Steer Ultrasound Against Illegal Cameras

Q Zhang, P Wang, Y Li, J Hu, H Zheng… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
To balance venue safety with public photography rights, this article presents CamShield—a
novel system for selective defense against unauthorized photography. Amid dense …

Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation

R Zhou, X Ji, H Chen, C Yan, W Xu - ACM Transactions on Sensor …, 2024 - dl.acm.org
Unauthorized covert voice recording presents a significant threat to privacy-sensitive
scenarios, such as confidential meetings and private conversations. Due to their …

[PDF][PDF] EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras

Y Long, Q Jiang, C Yan, T Alam, X Ji… - Proceedings of ACM …, 2024 - ndss-symposium.org
IoT devices and other embedded systems are in-creasingly equipped with cameras that can
sense critical information in private spaces. The data security of these cameras, however …