Tech-enabled interpersonal abuse (IPA) is a pervasive problem. Abusers, often intimate partners, use tools such as spyware to surveil and harass victim-survivors. Unfortunately …
Victim-survivors of intimate partner violence (IPV) are facing a new technological threat: Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS …
Q Zhang, D Liu, X Zhang, Z Cao, F Zeng… - 33rd USENIX Security …, 2024 - usenix.org
In this paper, we present ESauron—the first proof-of-concept system that can detect diverse forms of spy cameras (ie, wireless, wired and offline devices) and quickly pinpoint their …
Hidden cameras in sensitive locations have become an increasing threat to personal privacy all over the world. Because the camera is small and camouflaged, it is difficult to detect the …
R Ceccio, S Stephenson, V Chadha… - 32nd USENIX Security …, 2023 - usenix.org
Recent anecdotal evidence suggests that abusers have begun to use covert spy devices such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …
With the deployment of a growing number of smart home IoT devices, privacy leakage has become a growing concern. Prior work on privacy-invasive device localization, classification …
Y He, Q He, S Fang, Y Liu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Wireless security cameras may deter intruders. Accompanying the hardware, consumers may pay recurring monthly fees for recording videos to the cloud, or use the free tier offering …
The proliferation of IoT devices has created risks of their abuse for unauthorized sensing/monitoring of our daily activities. Especially, the leakage of images taken by …
Y Gu, J Chen, C Wu, K He, Z Zhao, R Du - Proceedings of the ACM on …, 2024 - dl.acm.org
Unlawful wireless cameras are often hidden to secretly monitor private activities. However, existing methods to detect and localize these cameras are interactively complex or require …