mmEcho: A mmWave-based Acoustic Eavesdropping Method
Abstract
References
Recommendations
Acoustic Eavesdropping through Wireless Vibrometry
MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and NetworkingLoudspeakers are widely used in conferencing and infotainment systems. Private information leakage from loudspeaker sound is often assumed to be preventable using sound-proof isolators like walls. In this paper, we explore a new acoustic eavesdropping ...
mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect
IEEE INFOCOM 2022 - IEEE Conference on Computer CommunicationsMore and more people turn to online voice communication with loudspeaker-equipped devices due to its convenience. To prevent speech leakage, soundproof rooms are often adopted. This paper presents mmPhone, a novel acoustic eavesdropping system that ...
LidarPhone: acoustic eavesdropping using a lidar sensor: poster abstract
SenSys '20: Proceedings of the 18th Conference on Embedded Networked Sensor SystemsPrivate conversations are an attractive target for malicious actors intending to conduct audio eavesdropping attacks. Previous works discovered unexpected vectors for these attacks, such as analyzing high-speed video of objects adjacent to sound sources,...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Poster
- Research
- Refereed limited
Funding Sources
- National Natural Science Foundation of China
- Shandong Science Fund for Excellent Young Scholars
- Future Young Scholars Project of Shandong University
- National Key Research and Development Program of China
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 209Total Downloads
- Downloads (Last 12 months)209
- Downloads (Last 6 weeks)10
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format