Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/INFOCOM48880.2022.9796834guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers

Published: 02 May 2022 Publication History

Abstract

Covert eavesdropping via microphones has always been a major threat to user privacy. Benefiting from the acoustic non-linearity property, the ultrasonic microphone jammer (UMJ) is effective in resisting this long-standing attack. However, prior UMJ researches underestimate adversary’s attacking capability in reality and miss critical metrics for a thorough evaluation. The strong assumptions of adversary unable to retrieve information under low word recognition rate, and adversary’s weak denoising abilities in the threat model make these works overlook the vulnerability of existing UMJs. As a result, their UMJs’ resilience is overestimated. In this paper, we refine the adversary model and completely investigate potential eavesdropping threats. Correspondingly, we define a total of 12 metrics that are necessary for evaluating UMJs’ resilience. Using these metrics, we propose a comprehensive framework to quantify UMJs’ practical resilience. It fully covers three perspectives that prior works ignored in some degree, i.e., ambient information, semantic comprehension, and collaborative recognition. Guided by this framework, we can thoroughly and quantitatively evaluate the resilience of existing UMJs towards eavesdroppers. Our extensive assessment results reveal that most existing UMJs are vulnerable to sophisticated adverse approaches. We further outline the key factors influencing jammers’ performance and present constructive suggestions for UMJs’ future designs.

References

[1]
VRT NWS, “Google employees are eavesdropping, even in your living room,” https://www.vrt.be/vrtnws/en/2019/07/10/google-employees-are-eavesdropping-even-in-flemish-living-rooms/, 2019.
[2]
S. Maheshwari, “Hey, alexa, what can you hear? and what will you do with it?” https://www.nytimes.com/2018/03/31/business/media/amazon-google-privacy-digital-assistants, 2018.
[3]
R. Kiberd, “Hey siri! stop recording and sharing my private conversations,” https://www.theguardian.com/commentisfree/2019/jul/30/apple-siri-voice-assistants-privacy/, 2019.
[4]
Y. Chen, H. Li, S.-Y. Teng, S. Nagels, Z. Li, P. Lopes, B. Y. Zhao, and H. Zheng, “Wearable microphone jamming,” in International Conference on Human Factors in Computing Systems, 2020.
[5]
L. Li, M. Liu, Y. Yao, F. Dang, Z. Cao, and Y. Liu, “Patronus: Preventing unauthorized speech recordings with support for selective unscrambling,” in International Conference on Embedded Networked Sensor Systems, 2020.
[6]
K. Sun, C. Chen, and X. Zhang, “‘Alexa, stop spying on me!’: Speech privacy protection against voice assistants,” in International Conference on Embedded Networked Sensor Systems, 2020.
[7]
N. Roy, H. Hassanieh, and R. Roy Choudhury, “Backdoor: Making microphones hear inaudible sounds,” in International Conference on Mobile Systems, Applications, and Services, 2017.
[8]
Y. Chen, H. Li, S. Nagels, Z. Li, P. Lopes, B. Y. Zhao, and H. Zheng, “Understanding the effectiveness of ultrasonic microphone jammer,” CoRR, vol. abs/1904.08490, 2019.
[9]
H. Shen, W. Zhang, H. Fang, Z. Ma, and N. Yu, “Jamsys: Coverage optimization of a microphone jamming system based on ultrasounds,” IEEE Access, vol. 7, pp. 67 483–67 496, 2019.
[10]
D. Kune, J. Backes, S. Clark, D. Kramer, M. Reynolds, K. Fu, Y. Kim, and W. Xu, “Ghost talk: Mitigating emi signal injection attacks against analog sensors,” in IEEE Symposium on Security and Privacy, 2013.
[11]
M. Abuelma’atti, “Analysis of the effect of radio frequency interference on the dc performance of bipolar operational amplifiers,” IEEE Transactions on Electromagnetic Compatibility, vol. 45, pp. 453–458, 2003.
[12]
G. K. C. Chen and J. J. Whalen, “Comparative rfi performance of bipolar operational amplifiers,” in IEEE International Symposium on Electromagnetic Compatibility, 1981.
[13]
J. Gago, J. Balcells, D. GonzÁlez, M. Lamich, J. Mon, and A. Santolaria, “Emi susceptibility model of signal conditioning circuits based on operational amplifiers,” IEEE Transactions on Electromagnetic Compatibility, vol. 49, no. 4, pp. 849–859, 2007.
[14]
Google Cloud, “Speech-to-text: Automatic speech recognition,” https://cloud.google.com/speech-to-text, 2021.
[15]
D. Huggins-Daines, M. Kumar, A. Chan, A. W. Black, M. Ravishankar, and A. I. Rudnicky, “Pocketsphinx: A free, real-time continuous speech recognition system for hand-held devices,” in IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, 2006.
[16]
Iflytek CO.,LTD, “iflytek open platform- an artificial intelligence platform focusing on intelligent speech interaction wihch provides solutions for global developers,” https://global.xfyun.cn/, 2021.
[17]
V. Këpuska and G. Bohouta, “Comparing speech recognition systems (microsoft api, google api and cmu sphinx),” Int. J. Eng. Res. Appl, vol. 7, no. 03, pp. 20–24, 2017.
[18]
J. H. L. Hansen and B. L. Pellom, “An effective quality evaluation protocol for speech enhancement algorithms,” in International Conference on Spoken Language Processing, 1998.
[19]
Y. Hu and P. C. Loizou, “Evaluation of objective quality measures for speech enhancement,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 16, no. 1, pp. 229–238, 2008.
[20]
D. Klatt, “Prediction of perceived phonetic distance from critical-band spectra: A first step,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, 1982.
[21]
S. R. Quackenbush, T. P. Barnwell, and M. A. Clements, Objective measures of speech quality. Prentice Hall, 1988.
[22]
R. L. Goldsworthy and J. E. Greenberg, “Analysis of speech-based speech transmission index methods with implications for nonlinear operations,” The Journal of the Acoustical Society of America, vol. 116, no. 6, pp. 3679–3689, 2004.
[23]
J. M. Kates and K. H. Arehart, “Coherence and the speech intelligibility index,” The journal of the acoustical society of America, vol. 117, no. 4, pp. 2224–2237, 2005.
[24]
A. W. Rix, J. G. Beerends, M. P. Hollier, and A. P. Hekstra, “Perceptual evaluation of speech quality (PESQ)-a new method for speech quality assessment of telephone networks and codecs,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001.
[25]
C. H. Taal, R. C. Hendriks, R. Heusdens, and J. Jensen, “A short-time objective intelligibility measure for time-frequency weighted noisy speech,” in IEEE International Conference on Acoustics, Speech and Signal Processing, 2010.
[26]
[27]
G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang, and W. Xu, “Dolphinattack: Inaudible voice commands,” in ACM conference on computer and communications security, 2017.
[28]
M. R. Schroeder, B. S. Atal, and J. L. Hall, “Optimizing digital speech coders by exploiting masking properties of the human ear,” The Journal of the Acoustical Society of America, vol. 66, pp. 1647–1652, 1979.
[29]
L. Kohnfelder and P. Garg, “The threats to our products,” Microsoft Corporation 33, 1999.
[30]
S. Makino, T.-W. Lee, S. S. Makino, and H. Sawada, Blind speech separation, 1st ed. Dordrecht: Springer Netherlands, 2007.
[31]
Y. He, J. Bian, X. Tong, Z. Qian, W. Zhu, X. Tian, and X. Wang, “Canceling inaudible voice commands against voice control systems,” in International Conference on Mobile Computing and Networking, 2019.
[32]
M. Wu and D. Wang, “A two-stage algorithm for one-microphone reverberant speech enhancement,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 14, no. 3, pp. 774–784, 2006.
[33]
A. Pandey and D. Wang, “A new framework for cnn-based speech enhancement in the time domain,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 27, no. 7, pp. 1179–1188, 2019.
[34]
J. Ma, Y. Hu, and P. C. Loizou, “Objective measures for predicting speech intelligibility in noisy conditions based on new band-importance functions,” The Journal of the Acoustical Society of America, vol. 125, no. 5, pp. 3387–3405, 2009.
[35]
E. Vincent, R. Gribonval, and C. Févotte, “Performance measurement in blind audio source separation,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 14, no. 4, pp. 1462–1469, 2006.
[36]
Y. Hu and P. C. Loizou, “A comparative intelligibility study of single-microphone noise reduction algorithms,” The Journal of the Acoustical Society of America, vol. 122, no. 3, pp. 1777–1786, 2007.
[37]
K. P. F.R.S., “On lines and planes of closest fit to systems of points in space,” The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, vol. 2, no. 11, pp. 559–572, 1901.
[38]
S. G. M. and A. R. A Jr., “Analyzing and interpreting data from likert-type scales,” Journal of graduate medical education, p. 541, 2013.
[39]
Jinci Technologies, “Product review,” http://www.jinci.cn/en/goods/112.html, 2021.
[40]
SIGLENT Technologies, “Sdg1000 series function/arbitrary waveform generators,” https://www.siglenteu.com/waveform-generators/, 2021.
[41]
S. Becker, M. Ackermann, S. Lapuschkin, K.-R. Müller, and W. Samek, “Interpreting and explaining deep neural networks for classification of audio signals,” arXiv preprint arXiv:1807.03418, 2018.
[42]
V. Panayotov, G. Chen, D. Povey, and S. Khudanpur, “Librispeech: An asr corpus based on public domain audio books,” in IEEE International Conference on Acoustics, Speech and Signal Processing, 2015.
[43]
J. Herault and C. Jutten, “Space or time adaptive signal processing by neural models,” in AIP Netural Networks for Computing, 1987.
[44]
M. H. Hayes, Statistical Digital Signal Processing and Modeling. Wiley, 1996.
[45]
W. Chen, J. Zhuang, W. Yu, and Z. Wang, “Measuring complexity using fuzzyen, apen, and sampen,” Medical Engineering & Physics, vol. 31, no. 1, pp. 61–68, 2009.
[46]
W. Chen, Z. Wang, H. Xie, and W. Yu, “Characterization of surface emg signal based on fuzzy entropy,” IEEE Transactions on Neural Systems and Rehabilitation Engineering, vol. 15, no. 2, pp. 266–272, 2007.
[47]
G. Zhang, X. Ji, X. Li, G. Qu, and W. Xu, “Eararray: Defending against dolphinattack via acoustic attenuation,” in Annual Network and Distributed System Security Symposium, 2021.
[48]
Oeler Industries, “Sound masking device,” https://www.oeler.com/sound-masking-systems/, 2021.
[49]
N. Roy, S. Shen, H. Hassanieh, and R. R. Choudhury, “Inaudible voice commands: The long-range attack and defense,” in USENIX Symposium on Networked Systems Design and Implementation, 2018.
[50]
L. Song and P. Mittal, “Poster: Inaudible voice commands,” in ACM conference on computer and communications security, 2017.

Cited By

View all
  • (2024)DEMO: Towards A Novel Ultrasonic Side-channel Attack on Mobile DevicesProceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos10.1145/3672202.3673730(101-103)Online publication date: 4-Aug-2024
  • (2023)Cancelling Speech Signals for Speech Privacy Protection against Microphone EavesdroppingProceedings of the 29th Annual International Conference on Mobile Computing and Networking10.1145/3570361.3592502(1-16)Online publication date: 2-Oct-2023

Index Terms

  1. Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image Guide Proceedings
            IEEE INFOCOM 2022 - IEEE Conference on Computer Communications
            May 2022
            2237 pages

            Publisher

            IEEE Press

            Publication History

            Published: 02 May 2022

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 13 Nov 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)DEMO: Towards A Novel Ultrasonic Side-channel Attack on Mobile DevicesProceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos10.1145/3672202.3673730(101-103)Online publication date: 4-Aug-2024
            • (2023)Cancelling Speech Signals for Speech Privacy Protection against Microphone EavesdroppingProceedings of the 29th Annual International Conference on Mobile Computing and Networking10.1145/3570361.3592502(1-16)Online publication date: 2-Oct-2023

            View Options

            View options

            Get Access

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media