Lumos: Identifying and localizing diverse hidden {IoT} devices in an unfamiliar environment

RA Sharma, E Soltanaghaei, A Rowe… - 31st USENIX Security …, 2022 - usenix.org
Hidden IoT devices are increasingly being used to snoop on users in hotel rooms or
AirBnBs. We envision empowering users entering such unfamiliar environments to identify …

Abuse Vectors: A Framework for Conceptualizing {IoT-Enabled} Interpersonal Abuse

S Stephenson, M Almansoori, P Emami-Naeini… - 32nd USENIX Security …, 2023 - usenix.org
Tech-enabled interpersonal abuse (IPA) is a pervasive problem. Abusers, often intimate
partners, use tools such as spyware to surveil and harass victim-survivors. Unfortunately …

" It's the Equivalent of Feeling Like You're in {Jail”}: Lessons from Firsthand and Secondhand Accounts of {IoT-Enabled} Intimate Partner Abuse

S Stephenson, M Almansoori, P Emami-Naeini… - 32nd USENIX Security …, 2023 - usenix.org
Victim-survivors of intimate partner violence (IPV) are facing a new technological threat:
Abusers are leveraging IoT devices such as smart thermostats, hidden cameras, and GPS …

Eye of Sauron:{Long-Range} Hidden Spy Camera Detection and Positioning with Inbuilt Memory {EM} Radiation

Q Zhang, D Liu, X Zhang, Z Cao, F Zeng… - 33rd USENIX Security …, 2024 - usenix.org
In this paper, we present ESauron—the first proof-of-concept system that can detect diverse
forms of spy cameras (ie, wireless, wired and offline devices) and quickly pinpoint their …

Camradar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations

Z Liu, F Lin, C Wang, Y Shen, Z Ba, L Lu, W Xu… - Proceedings of the …, 2023 - dl.acm.org
Hidden cameras in sensitive locations have become an increasing threat to personal privacy
all over the world. Because the camera is small and camouflaged, it is difficult to detect the …

Sneaky spy devices and defective detectors: the ecosystem of intimate partner surveillance with covert devices

R Ceccio, S Stephenson, V Chadha… - 32nd USENIX Security …, 2023 - usenix.org
Recent anecdotal evidence suggests that abusers have begun to use covert spy devices
such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …

Iotbeholder: A privacy snooping attack on user habitual behaviors from smart home wi-fi traffic

Q Zou, Q Li, R Li, Y Huang, G Tyson, J Xiao… - Proceedings of the ACM …, 2023 - dl.acm.org
With the deployment of a growing number of smart home IoT devices, privacy leakage has
become a growing concern. Prior work on privacy-invasive device localization, classification …

When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription

Y He, Q He, S Fang, Y Liu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Wireless security cameras may deter intruders. Accompanying the hardware, consumers
may pay recurring monthly fees for recording videos to the cloud, or use the free tier offering …

Are there wireless hidden cameras spying on me?

J Heo, S Gil, Y Jung, J Kim, D Kim, W Park… - Proceedings of the 38th …, 2022 - dl.acm.org
The proliferation of IoT devices has created risks of their abuse for unauthorized
sensing/monitoring of our daily activities. Especially, the leakage of images taken by …

LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices

Y Gu, J Chen, C Wu, K He, Z Zhao, R Du - Proceedings of the ACM on …, 2024 - dl.acm.org
Unlawful wireless cameras are often hidden to secretly monitor private activities. However,
existing methods to detect and localize these cameras are interactively complex or require …