Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3607199.3607245acmotherconferencesArticle/Chapter ViewAbstractPublication PagesraidConference Proceedingsconference-collections
research-article
Open access

Phantom-CSI Attacks against Wireless Liveness Detection

Published: 16 October 2023 Publication History

Abstract

All systems monitoring human behavior in real time are, by their nature, attractive targets for spoofing. For example, misdirecting live-feed security cameras or voice-controllable Internet-of-Things (IoT) systems (e.g., Amazon Alexa and Google Assistant) has immediately intuitive benefits, so there is a consequent need for detecting liveness of the human(s) whose behavior is being monitored. Emerging research lines have focused on analyzing changes in prevalent wireless signals to detect video or voice spoofing attacks, as wireless-based techniques do not require the user to carry any additional device or sensor for liveness detection. Video/voice streaming and coexisting wireless signals convey different aspects of the same overall contextual information related to human activities, and the presence of spoofing attacks on the former breaks this relationship, so the latter performs well as liveness detection to augment the former. However, we recognize and herein evaluate how to spoof the latter as well to defeat this liveness detection. In our attack, an adversary can easily create phantom wireless signals and synchronize them with spoofed video/voice signals, such that the legitimate user can no longer distinguish real from fake human activity. Real-world experimental results on top of software-defined radio platforms validate the possibility of generating fake CSI flows and demonstrate that with the phantom-CSI attack, the true positive rates (TPRs) of wireless liveness detection systems for video and voice decrease from 100% spoofing detection to just 4.4% and 0, respectively.

References

[1]
Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, and Hyoungshick Kim. 2020. Void: A fast and light voice liveness detection system. In 29th USENIX Security Symposium (USENIX Security 20). 2685–2702.
[2]
Kamran Ali, Alex X Liu, Wei Wang, and Muhammad Shahzad. 2015. Keystroke recognition using WiFi signals. In Proceedings of the 21st annual international conference on mobile computing and networking. 90–102.
[3]
Kamran Ali, Alex X Liu, Wei Wang, and Muhammad Shahzad. 2017. Recognizing keystrokes using WiFi devices. IEEE Journal on Selected Areas in Communications 35, 5 (2017), 1175–1190.
[4]
Zach Banks and Eric Van Albert. 2015. Looping Surveillance Cameras through Live Editing of Network Streams. https://infocondb.org/con/def-con/def-con-23/looping-surveillance-cameras-through-live-editing-of-network-streams.
[5]
Logan Blue, Luis Vargas, and Patrick Traynor. 2018. Hello, is it me you’re looking for? Differentiating between human and electronic speakers for voice interface security. In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. 123–133.
[6]
Steven Boll. 1979. Suppression of acoustic noise in speech using spectral subtraction. IEEE Transactions on acoustics, speech, and signal processing 27, 2 (1979), 113–120.
[7]
Zhe Cao, Gines Hidalgo, Tomas Simon, Shih-En Wei, and Yaser Sheikh. 2019. OpenPose: realtime multi-person 2D pose estimation using Part Affinity Fields. IEEE transactions on pattern analysis and machine intelligence 43, 1 (2019), 172–186.
[8]
Edgar Cervantes. 2021. The best Siri commands for productivity, information, laughter, and more. https://www.androidauthority.com/best-siri-commands-1094484/.
[9]
Shaxun Chen, Amit Pande, and Prasant Mohapatra. 2014. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services. 109–122.
[10]
CODi. 2021. FALCO HD 1080P Auto Focus Webcam. https://www.codiworldwide.com/mobile-accessories/falco-hd-1080p-webcam/.
[11]
Laurie Davies and Ursula Gather. 1993. The identification of multiple outliers. J. Amer. Statist. Assoc. 88, 423 (1993), 782–792.
[12]
Wenrui Diao, Xiangyu Liu, Zhe Zhou, and Kehuan Zhang. 2014. Your voice assistant is mine: How to abuse speakers to steal information and control your phone. In Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. 63–74.
[13]
Ettus Research. 2021. SBX 400-4400 MHz Rx/Tx (120 MHz, X Series only). https://www.ettus.com/all-products/sbx120/.
[14]
Ettus Research. 2021. USRP X300. https://www.ettus.com/all-products/x300-kit/.
[15]
Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu. 2018. No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (Toronto, Canada) (CCS ’18). ACM, New York, NY, USA, 1747–1760.
[16]
Huan Feng, Kassem Fawaz, and Kang G. Shin. 2017. Continuous Authentication for Voice Assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (Snowbird, Utah, USA) (MobiCom ’17). Association for Computing Machinery, New York, NY, USA, 343–355.
[17]
Andrea Goldsmith. 2005. Wireless Communications. Cambridge University Press, New York, NY, USA.
[18]
Francesco Gringoli, Matthias Schulz, Jakob Link, and Matthias Hollick. 2019. Free your CSI: A channel state information extraction platform for modern Wi-Fi chipsets. In Proceedings of the 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization. 21–28.
[19]
Yan He, Qiuye He, Song Fang, and Yao Liu. 2021. MotionCompass: Pinpointing Wireless Camera via Motion-Activated Traffic. In Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys). Association for Computing Machinery, New York, NY, USA, 215–227.
[20]
Craig Heffners. 2013. Exploiting Network Surveillance Cameras Like a Hollywood Hacker. https://www.youtube.com/watch?v=B8DjTcANBx0.
[21]
Peter Hillyard, Anh Luong, Alemayehu Solomon Abrar, Neal Patwari, Krishna Sundar, Robert Farney, Jason Burch, Christina Porucznik, and Sarah Hatch Pollard. 2018. Experience: Cross-technology radio respiratory monitoring performance study. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. 487–496.
[22]
Chenyu Huang, Huangxun Chen, Lin Yang, and Qian Zhang. 2018. BreathLive: Liveness detection for heart sound authentication with deep breathing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 1 (2018), 1–25.
[23]
Yong Huang, Xiang Li, Wei Wang, Tao Jiang, and Qian Zhang. 2021. Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information. IEEE Transactions on Wireless Communications 21, 6 (2021), 4340–4349.
[24]
Yong Huang, Xiang Li, Wei Wang, Tao Jiang, and Qian Zhang. 2021. Towards Cross-Modal Forgery Detection and Localization on Live Surveillance Videos. In Proceedings of the IEEE International Conference on Computer Communications(INFOCOM ’21).
[25]
Weijia Jia, Hongjian Peng, Na Ruan, Zhiqing Tang, and Wei Zhao. 2020. WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features. IEEE Transactions on Big Data 6, 2 (2020), 269–282.
[26]
Jesse S Jin, Changsheng Xu, Min Xu, Dai-Kyung Hyun, Min-Jeong Lee, Seung-Jin Ryu, Hae-Yeoun Lee, and Heung-Kyu Lee. 2013. Forgery detection for surveillance video. In The Era of Interactive Media. Springer, 25–36.
[27]
Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, and Yuval Elovici. 2020. The security of IP-based video surveillance systems. Sensors 20, 17 (2020), 4806.
[28]
Tomi Kinnunen, Md Sahidullah, Héctor Delgado, Massimiliano Todisco, Nicholas Evans, Junichi Yamagishi, and Kong Aik Lee. 2017. The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection. (2017).
[29]
Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han, and Jong Taek Lee. 2019. SurFi: detecting surveillance camera looping attacks with Wi-Fi channel state information. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks(WiSec ’19).
[30]
Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han, and Jong Taek Lee. 2019. SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (Extended Version). arXiv preprint arXiv:1904.01350 (2019).
[31]
J. Liu, H. Liu, Y. Chen, Y. Wang, and C. Wang. 2020. Wireless Sensing for Human Activity: A Survey. IEEE Communications Surveys & Tutorials 22, 3 (2020), 1629–1645.
[32]
Jian Liu, Yan Wang, Yingying Chen, Jie Yang, Xu Chen, and Jerry Cheng. 2015. Tracking Vital Signs During Sleep Leveraging Off-the-Shelf WiFi. In Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Hangzhou, China) (MobiHoc ’15). Association for Computing Machinery, New York, NY, USA, 267–276.
[33]
Changqing Luo, Jinlong Ji, Qianlong Wang, Xuhui Chen, and Pan Li. 2020. Channel State Information Prediction for 5G Wireless Communications: A Deep Learning Approach. IEEE Transactions on Network Science and Engineering 7, 1 (2020), 227–236.
[34]
Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, and Yuan Tian. 2022. Your microphone array retains your identity: A robust voice liveness detection system for smart speaker. In USENIX Security.
[35]
Yan Meng, Zichang Wang, Wei Zhang, Peilin Wu, Haojin Zhu, Xiaohui Liang, and Yao Liu. 2018. WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment(Mobihoc ’18). Association for Computing Machinery, New York, NY, USA, 81–90.
[36]
Yan Meng, Haojin Zhu, Jinlei Li, Jin Li, and Yao Liu. 2020. Liveness detection for voice user interface via wireless signals in IoT environment. IEEE Transactions on Dependable and Secure Computing (2020).
[37]
Dibya Mukhopadhyay, Maliheh Shirvanian, and Nitesh Saxena. 2015. All your voices are belong to us: Stealing voices to fool humans and machines. In European Symposium on Research in Computer Security. Springer, 599–621.
[38]
Eduardo F. Nakamura and Antonio A. F. Loureiro. 2008. Information Fusion in Wireless Sensor Networks. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data (Vancouver, Canada) (SIGMOD ’08). Association for Computing Machinery, New York, NY, USA, 1365–1372.
[39]
Muhammed Zahid Ozturk, Chenshu Wu, Beibei Wang, and KJ Liu. 2021. RadioMic: Sound Sensing via mmWave Signals. arXiv preprint arXiv:2108.03164 (2021).
[40]
Sameera Palipana, David Rojas, Piyush Agrawal, and Dirk Pesch. 2018. FallDeFi: Ubiquitous Fall Detection Using Commodity Wi-Fi Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 4, Article 155 (Jan. 2018), 25 pages.
[41]
R.K. Pearson. 2002. Outliers in process modeling and identification. IEEE Transactions on Control Systems Technology 10, 1 (2002), 55–63.
[42]
Swadhin Pradhan, Wei Sun, Ghufran Baig, and Lili Qiu. 2019. Combating replay attacks against voice assistants. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 1–26.
[43]
Kun Qian, Chenshu Wu, Zheng Yang, Yunhao Liu, Fugui He, and Tianzhang Xing. 2018. Enabling contactless detection of moving humans with dynamic speeds using CSI. ACM Transactions on Embedded Computing Systems (TECS) 17, 2 (2018), 1–18.
[44]
Muhammad Salman, Nguyen Dao, Uichin Lee, and Youngtae Noh. 2022. CSI:DeSpy: Enabling Effortless Spy Camera Detection via Passive Sensing of User Activities and Bitrate Variations. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6, 2, Article 72 (jul 2022), 27 pages.
[45]
Souvik Sen, Božidar Radunovic, Romit Roy Choudhury, and Tom Minka. 2012. You Are Facing the Mona Lisa: Spot Localization Using PHY Layer Information. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (Low Wood Bay, Lake District, UK) (MobiSys ’12). Association for Computing Machinery, New York, NY, USA, 183–196.
[46]
Jiacheng Shang and Jie Wu. 2022. Voice Liveness Detection for Voice Assistants through Ear Canal Pressure Monitoring. IEEE Transactions on Network Science and Engineering (2022).
[47]
Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 1–10.
[48]
Jonathon Shlens. 2014. A tutorial on principal component analysis. arXiv preprint arXiv:1404.1100 (2014).
[49]
Steven W Smith. 1999. The scientist and engineer’s guide to digital signal processing, Second Edition. (1999).
[50]
Lin Sun, WaiBin Huang, and MingHui Wu. 2011. TIR/VIS correlation for liveness detection in face recognition. In International Conference on Computer Analysis of Images and Patterns. Springer, 114–121.
[51]
Benjamin Tag, Junichi Shimizu, Chi Zhang, Kai Kunze, Naohisa Ohta, and Kazunori Sugiura. 2016. In the Eye of the Beholder: The Impact of Frame Rate on Human Eye Blink. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (San Jose, California, USA) (CHI EA ’16). Association for Computing Machinery, New York, NY, USA, 2321–2327.
[52]
Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, and Srdjan Capkun. 2011. On the Requirements for Successful GPS Spoofing Attacks. In Proceedings of the 18th ACM Conference on Computer and Communications Security (Chicago, Illinois, USA) (CCS ’11). Association for Computing Machinery, New York, NY, USA, 75–86.
[53]
Bang Tran, Shenhui Pan, Xiaohui Liang, and Honggang Zhang. 2021. Exploiting Physical Presence Sensing to Secure Voice Assistant Systems. In ICC 2021 - IEEE International Conference on Communications. 1–6.
[54]
Jesus Villalba and Eduardo Lleida. 2011. Preventing replay attacks on speaker verification systems. In 2011 Carnahan Conference on Security Technology. IEEE, 1–8.
[55]
Aditya Virmani and Muhammad Shahzad. 2017. Position and orientation agnostic gesture recognition using wifi. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. 252–264.
[56]
Guanhua Wang, Yongpan Zou, Zimu Zhou, Kaishun Wu, and Lionel M. Ni. 2014. We Can Hear You with Wi-Fi!. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (Maui, Hawaii, USA) (MobiCom ’14). Association for Computing Machinery, New York, NY, USA, 593–604.
[57]
Hao Wang, Daqing Zhang, Junyi Ma, Yasha Wang, Yuxiang Wang, Dan Wu, Tao Gu, and Bing Xie. 2016. Human Respiration Detection with Commodity Wifi Devices: Do User Location and Body Orientation Matter?. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Heidelberg, Germany) (UbiComp ’16). Association for Computing Machinery, New York, NY, USA, 25–36.
[58]
Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, and Xiangyang Luo. 2019. VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 2062–2070.
[59]
Shu Wang, Jiahao Cao, Xu He, Kun Sun, and Qi Li. 2020. When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 1103–1119.
[60]
Wei Wang, Alex X. Liu, and Muhammad Shahzad. 2016. Gait Recognition Using Wifi Signals. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Heidelberg, Germany) (UbiComp ’16). Association for Computing Machinery, New York, NY, USA, 363–373.
[61]
Xuyu Wang, Chao Yang, and Shiwen Mao. 2020. On CSI-based vital sign monitoring using commodity WiFi. ACM Transactions on Computing for Healthcare 1, 3 (2020), 1–27.
[62]
Yan Wang, Jian Liu, Yingying Chen, Marco Gruteser, Jie Yang, and Hongbo Liu. 2014. E-Eyes: Device-Free Location-Oriented Activity Identification Using Fine-Grained WiFi Signatures. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (Maui, Hawaii, USA) (MobiCom ’14). Association for Computing Machinery, New York, NY, USA, 617–628.
[63]
Bo Wei, Wen Hu, Mingrui Yang, and Chun Tung Chou. 2019. From real to complex: Enhancing radio-based activity recognition using complex-valued CSI. ACM Transactions on Sensor Networks (TOSN) 15, 3 (2019), 1–32.
[64]
C. Wu, Z. Yang, Z. Zhou, X. Liu, Y. Liu, and J. Cao. 2015. Non-Invasive Detection of Moving and Stationary Human With WiFi. IEEE Journal on Selected Areas in Communications 33, 11 (2015), 2329–2342.
[65]
Kaishun Wu, Jiang Xiao, Youwen Yi, Dihu Chen, Xiaonan Luo, and Lionel M. Ni. 2013. CSI-Based Indoor Localization. IEEE Transactions on Parallel and Distributed Systems 24, 7 (2013), 1300–1309.
[66]
Libing Wu, Jingxiao Yang, Man Zhou, Yanjiao Chen, and Qian Wang. 2020. LVID: A Multimodal Biometrics Authentication System on Smartphones. IEEE Transactions on Information Forensics and Security 15 (2020), 1572–1585.
[67]
Edwin Yang, Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu. 2022. Wireless Training-Free Keystroke Inference Attack and Defense. IEEE/ACM Transactions on Networking 30, 4 (2022), 1733–1748.
[68]
Edwin Yang, Qiuye He, and Song Fang. 2022. WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (Los Angeles, CA, USA) (CCS ’22). Association for Computing Machinery, New York, NY, USA, 3033–3047.
[69]
Jide Yuan, Hien Quoc Ngo, and Michail Matthaiou. 2020. Machine Learning-Based Channel Prediction in Massive MIMO With Channel Aging. IEEE Transactions on Wireless Communications 19, 5 (2020), 2960–2973.
[70]
Mustafa Harun Yılmaz and Hüseyin Arslan. 2015. A survey: Spoofing attacks in physical layer security. In 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops). 812–817.
[71]
Yunze Zeng, Parth H. Pathak, and Prasant Mohapatra. 2016. WiWho: WiFi-Based Person Identification in Smart Spaces. In 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN). 1–12.
[72]
Youwei Zeng, Dan Wu, Ruiyang Gao, Tao Gu, and Daqing Zhang. 2018. FullBreathe: Full Human Respiration Detection Exploiting Complementarity of CSI Phase and Amplitude of WiFi Signals. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 3, Article 148 (sep 2018), 19 pages.
[73]
Linghan Zhang, Sheng Tan, Zi Wang, Yili Ren, Zhi Wang, and Jie Yang. 2020. VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment. In Annual Computer Security Applications Conference. 884–896.
[74]
Linghan Zhang, Sheng Tan, Jie Yang, and Yingying Chen. 2016. Voicelive: A phoneme localization based liveness detection for voice authentication on smartphones. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1080–1091.
[75]
Zhaohe (John) Zhang, Edwin Yang, and Song Fang. 2021. CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech. In Annual Computer Security Applications Conference (Virtual Event, USA) (ACSAC ’21). Association for Computing Machinery, New York, NY, USA, 720–731.
[76]
Cui Zhao, Zhenjiang Li, Han Ding, Wei Xi, Ge Wang, and Jizhong Zhao. 2021. Anti-Spoofing Voice Commands: A Generic Wireless Assisted Design. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 3, Article 139 (sep 2021), 22 pages.

Index Terms

  1. Phantom-CSI Attacks against Wireless Liveness Detection

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    RAID '23: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
    October 2023
    769 pages
    ISBN:9798400707650
    DOI:10.1145/3607199
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 October 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. CSI
    2. human motion
    3. liveness detection
    4. spoofing attacks

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    Conference

    RAID 2023

    Acceptance Rates

    Overall Acceptance Rate 43 of 173 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 373
      Total Downloads
    • Downloads (Last 12 months)373
    • Downloads (Last 6 weeks)53
    Reflects downloads up to 30 Sep 2024

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media