Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3210240.3210332acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Detecting Wireless Spy Cameras Via Stimulating and Probing

Published: 10 June 2018 Publication History

Abstract

The rapid proliferation of wireless video cameras has raised serious privacy concerns. In this paper, we propose a stimulating-and-probing approach to detecting wireless spy cameras. The core idea is to actively alter the light condition of a private space to manipulate the spy camera's video scene, and then investigates the responsive variations of a packet flow to determine if it is produced by a wireless camera. Following this approach, we develop Blink and Flicker -- two practical systems for detecting wireless spy cameras. Blink is a lightweight app that can be deployed on off-the-shelf mobile devices. It asks the user to turn on/off the light of her private space, and then uses the light sensor and the wireless radio of the mobile device to identify the response of wireless cameras. Flicker is a robust and automated system that augments Blink to detect wireless cameras in both live and offline streaming modes. Flicker employs a cheap and portable circuit, which harnesses daily used LEDs to stimulate wireless cameras using human-invisible flickering. The time series of stimuli is further encoded using FEC to combat ambient light and uncontrollable packet flow variations that may degrade detection performance. Extensive experiments show that Blink and Flicker can accurately detect wireless cameras under a wide range of network and environmental conditions.

Supplementary Material

WEBM File (p243-liu.webm)

References

[1]
Divx. http://www.divx.com/.
[2]
H.264. http://www.itu.int/rec/T-REC-H.264.
[3]
Jammerall. https://www.jammerall.com.
[4]
Jd.com. https://jd.com.
[5]
LTE. https://tinyurl.com/l67mdc9.
[6]
Pimall. http://www.pimall.com.
[7]
The signal jammer. https://www.thesignaljammer.com.
[8]
Spygadgets. http://www.spygadgets.com/counter-surveillance/.
[9]
Xvid. https://www.xvid.com/.
[10]
Ieee standard for information technology-telecommunications and information exchange between systems local and metropolitan area networks-speciic requirements - part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012), 2016.
[11]
AirBnb. Electronic surveilance devices. https://www.airbnb.com/help/article/887/.
[12]
D. Boniglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli. Revealing skype traffic: When randomness plays with you. ACM SIGCOMM, 2007.
[13]
X. Cai, X. C. Zhang, B. Joshi, and R. Johnson. Touching from a distance: Website fingerprinting attacks and defenses. ACM CCS, 2012.
[14]
G. Casella and B. Roger. Statistical Inference. Duxbury, 2nd edition, 1990.
[15]
Cisco. Vni global fixed and mobile internet traffic forecasts. http://www.pimall.com.
[16]
M. Conti, L. V. Mancini, R. Spolaor, and N. V. Verde. Can't you hear me knocking: Identification of user actions on android apps via traffic analysis. ACM CODASPY, 2015.
[17]
Dailymail. Couple horrified to discover they are being recorded with hidden cameras while renting an airbnb apartment. http://www.dailymail.co.uk/news/article-4791366/.
[18]
R.Fisher. Statistical Methods for Research Workers. Oliver and Boyd (Edinburgh), 1925.
[19]
X. Gong, N. Kiyavash, and N. Borisov. Fingerprinting websites using remote traffic analysis. ACM CCS, 2010.
[20]
Y. Jiang, K. Zhou, and S. He. Human visual cortex responds to invisible chromatic flicker. 10:657--62, 05 2007.
[21]
W. Li and A. W. Moore. A machine learning approach for efficient traffic classification. MASCOTS, 2007.
[22]
Z. Li, Z. Xiao, Y. Zhu, I. Pattarachanyakul, B. Y. Zhao, and H. Zheng. Adversarial localization against wireless cameras. ACM HotMobile, 2018.
[23]
B. Nassi, R. Ben-Netanel, A. Shamir, and Y. Elovici. Game of drones - detecting streamed POI from encrypted FPV channel. CoRR, 2018.
[24]
P. Nguyen, H. Truong, M. Ravindranathan, A. Nguyen, R. Han, and T. Vu. Matthan: Drone presence detection by identifying physical signatures in the drone's rf communication. ACM MobiSys, 2017.
[25]
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. ACM MobiCom, 2007.
[26]
A. Rao, A. Legout, Y.-s. Lim, D. Towsley, C. Barakat, and W. Dabbous. Network characteristics of video streaming traffic. ACM CoNEXT, 2011.
[27]
B. Saltaformaggio, H. Choi, K. Johnson, Y. Kwon, Q. Zhang, X. Zhang, D. Xu, and J. Qian. Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. Usenix WOOT, 2016.
[28]
S. Siby, R. R. Maiti, and N. O. Tippenhauer. Iotscanner: Detecting privacy threats in iot neighborhoods. IoTPTS, 2017.
[29]
C. Tyler. Analysis of visual modulation sensitivity. ii. peripheral retina and the role of photoreceptor dimensions. 2:393--8, 04 1985.
[30]
N. Williams, S. Zander, and G. Armitage. A preliminary performance comparison of five machine learning algorithms for practical ip traffic low classification. SIGCOMM Comput. Commun. Rev., 2006.
[31]
C. V. Wright, F. Monrose, and G. M. Masson. On inferring application protocol behaviors in encrypted network traffic. J. Mach. Learn. Res., 2006.
[32]
W. Zai-jian, Y. n. Dong, H. x. Shi, Y. Lingyun, and T. Pingping. Internet video traffic classification using qos features. ICNC, 2016.
[33]
S. Zhu, C. Zhang, and X. Zhang. Automating visual privacy protection using a smart led. ACM MobiCom, 2017.

Cited By

View all
  • (2024)Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar EnvironmentsProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695040(109-123)Online publication date: 20-Nov-2024
  • (2024)LocCamsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314327:4(1-24)Online publication date: 12-Jan-2024
  • (2024)Precise Wireless Camera Localization Leveraging Traffic-Aided Spatial AnalysisIEEE Transactions on Mobile Computing10.1109/TMC.2023.333327223:6(7256-7269)Online publication date: Jun-2024
  • Show More Cited By

Index Terms

  1. Detecting Wireless Spy Cameras Via Stimulating and Probing

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiSys '18: Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services
      June 2018
      560 pages
      ISBN:9781450357203
      DOI:10.1145/3210240
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 10 June 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      MobiSys '18
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 274 of 1,679 submissions, 16%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)102
      • Downloads (Last 6 weeks)17
      Reflects downloads up to 20 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar EnvironmentsProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695040(109-123)Online publication date: 20-Nov-2024
      • (2024)LocCamsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314327:4(1-24)Online publication date: 12-Jan-2024
      • (2024)Precise Wireless Camera Localization Leveraging Traffic-Aided Spatial AnalysisIEEE Transactions on Mobile Computing10.1109/TMC.2023.333327223:6(7256-7269)Online publication date: Jun-2024
      • (2024)Wireless Spy Camera Spotter System With Real-Time Traffic Similarity Analysis and WiFi Signal TracingIEEE Access10.1109/ACCESS.2024.335017512(4459-4470)Online publication date: 2024
      • (2023)Sneaky spy devices and defective detectorsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620245(123-140)Online publication date: 9-Aug-2023
      • (2023)Fingerprinting IoT Devices Using Latent Physical Side-ChannelsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962477:2(1-26)Online publication date: 12-Jun-2023
      • (2023)IoTBeholderProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35808907:1(1-26)Online publication date: 28-Mar-2023
      • (2023)Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming CharacteristicsACM Transactions on Cyber-Physical Systems10.1145/35799997:2(1-29)Online publication date: 19-Apr-2023
      • (2023)When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud SubscriptionProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623083(651-665)Online publication date: 15-Nov-2023
      • (2023)Rethinking Privacy Risks from Wireless Surveillance CameraACM Transactions on Sensor Networks10.1145/357050419:3(1-21)Online publication date: 1-Mar-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media