Corpus ID: 218538396

I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors

  title={I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors},
  author={Akash Deep Singh and Luis Garcia and Joseph Noor and M. Srivastava},
  booktitle={USENIX Security Symposium},
Author(s): Singh, Akash Deep | Advisor(s): Srivastava, Mani B | Abstract: The increasing ubiquity of low-cost wireless sensors in smart homes and buildings has enabled users to easily deploy systems to remotely monitor and control their environments. However, this raises privacy concerns for third-party occupants, such as a hotel room guest who may be unaware of deployed clandestine sensors. Previous methods focused on specific modalities such as detecting cameras but do not provide a… Expand
1 Citations
Intercepting a Stealthy Network
This work investigates an understudied threat: networks of stealthy routers (S-Routers), relaying messages to a hidden destination, relay communication along a path of multiple short-range, long-range routers. Expand


DeWiCam: Detecting Hidden Wireless Cameras via Smartphones
DeWiCam, a lightweight and effective detection mechanism using smartphones to utilize the intrinsic traffic patterns of flows from wireless cameras, and a human-assisted identification model to further identify whether a camera is in an interested room. Expand
Detecting Wireless Spy Cameras Via Stimulating and Probing
A stimulating-and-probing approach to detecting wireless spy cameras to actively alter the light condition of a private space to manipulate the spy camera's video scene, and then investigates the responsive variations of a packet flow to determine if it is produced by a wireless camera. Expand
Do You See What I See?Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation
  • Kevin Wu, Brent Lagesse
  • Computer Science
  • 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom
  • 2019
The concept of similarity of simultaneous observation is introduced where the user utilizes a camera to compare timing patterns of data transmitted by potentially hidden cameras and the timing patterns that are expected from the scene that the known camera is recording. Expand
RadHAR: Human Activity Recognition from Point Clouds Generated through a Millimeter-wave Radar
This paper proposes RadHAR, a framework that performs accurate HAR using sparse and non-uniform point clouds and utilizes a sliding time window to accumulate point clouds from a mmWave radar and generates a voxelized representation that acts as input to the classifiers. Expand
All Things Considered: An Analysis of IoT Devices on Home Networks
It is argued that IoT devices are here, but for most homes, the types of devices adopted are not the ones actively discussed, and by shedding light on this complex ecosystem, it is hoped that the security community develop solutions that are applicable to today’s homes. Expand
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers
It is demonstrated that a passive attacker, who can only eavesdrop encrypted traffic between a smart home speaker and a cloud server, can infer users' voice commands and compromise the privacy of millions of U.S. consumers. Expand
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping
This paper develops a new defense, “stochastic traffic padding” (STP), that makes it difficult for a passive network adversary to reliably distinguish genuine user activities from generated traffic patterns designed to look like user interactions. Expand
DeviceMien: network device behavior modeling for identifying unknown IoT devices
A probabilistic framework for providing meaningful feedback in device identification, particularly when the device has not been previously observed is introduced. Expand
Spy vs. Spy: A modern study of microphone bugs operation and detection
In 2015, artist Ai Weiwei was bugged in his home, presumably by government actors. This situation raised our awareness on the lack of research in our community about operating and detecting spyingExpand
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps
There is a fundamental flaw in the current design and implementation of the communication protocols between a BLE device and its companion mobile app, which allows an attacker to precisely fingerprint a Ble device with static UUIDs from the apps, and it is discovered that many BLE IoT devices adopt "just works" pairing, allowing attackers to actively connect with these devices if there is no app-level authentication. Expand