Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation

Published: 23 November 2024 Publication History

Abstract

Unauthorized covert voice recording presents a significant threat to privacy-sensitive scenarios, such as confidential meetings and private conversations. Due to their miniaturization and disguise characteristics, hidden voice recorders are difficult to notice. In this article, we present DeHiREC, the first proof-of-concept system capable of detecting offline hidden voice recorders from their electromagnetic radiations (EMR). We first characterize the unique patterns of the emanated EMR signals and then locate the EMR source, i.e., the analog-to-digital converter module embedded in the mixed signal system-on-chips. Since these unintentional EMR signals can be extremely noisy and weak, accurately detecting them can be challenging. To address this challenge, we design an EMR Catalyzing method to actively stimulate the EMR signals and then employ an adaptive-folding algorithm to improve the signal-to-noise ratio of the sensed EMRs. We evaluate the performance of DeHiREC on 18 commercial voice recorders under various impacts, including interference from other devices. Experimental results reveal that DeHiREC is effective in detecting all 18 voice recorders and achieves an overall success rate of 94.72% and a recall rate of 92.03% at a distance of 0.2 m.

References

[1]
Actions. 2010. ATJ331x Datasheet. Retrieved from https://datasheetspdf.com/pdf-file/774998/Actions/ATJ331x/1
[2]
Actions. 2012. ATJ2127 Datasheet. Retrieved from http://www.datasheetcafe.com/atj2127-datasheet-pdf/
[3]
Huseyin Aniktar, Dursun Baran, Enes Karav, Eren Akkaya, Y. Serdar Birecik, and Mehmet Sezgin. 2015. Getting the bugs out: A portable harmonic radar system for electronic countersurveillance applications. IEEE Microw. Mag. 16, 10 (2015), 40–52.
[4]
Matt Blaze. 2021. Testing Phone-Sized Faraday Bags. Retrieved from https://www.mattblaze.org/blog/faraday/
[5]
Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, and Aurélien Francillon. 2018. Screaming channels: When electromagnetic side channels meet radio transceivers. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 163–177.
[6]
Anadi Chaman, Jiaming Wang, Jiachen Sun, Haitham Hassanieh, and Romit Roy Choudhury. 2018. Ghostbuster: Detecting the presence of hidden eavesdroppers. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. 337–351.
[7]
Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu. 2018. Dewicam: Detecting hidden wireless cameras via smartphones. In Proceedings of the Asia Conference on Computer and Communications Security. 1–13.
[8]
Yushi Cheng, Xiaoyu Ji, Tianyang Lu, and Wenyuan Xu. 2019. On detecting hidden wireless cameras: A traffic pattern-based approach. IEEE Trans. Mobile Comput. 19, 4 (2019), 907–921.
[9]
Jieun Choi, Hae-Yong Yang, and Dong-Ho Cho. 2020. TEMPEST comeback: A realistic audio eavesdropping threat on mixed-signal SoCs. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 1085–1101.
[10]
D. Drab. 2003. Economic Espionage and Trade Secret Theft: Defending against the Pickpockets of the New Millennium. Retrieved from https://www.xerox.com/downloads/wpaper/x/xgs_business_insight_economic_espionage.pdf
[11]
Ettus Research. 2004. USRP B200/B210 Networked Series. Retrieved from https://www.ettus.com/wp-content/uploads/2019/01/b200-b210_spec_sheet.pdf
[12]
Ettus Research. 2017. USRP N200/N210 Networked Series. Retrieved from https://www.ettus.com/wp-content/uploads/2019/01/07495_Ettus_N200-210_DS_Flyer_HR_1.pdf
[13]
Ayman Fayed and Mohammed Ismail. 2006. Adaptive Techniques for Mixed Signal System on Chip. Vol. 872. Springer Science & Business Media.
[14]
Granite Island Group. 2002. Non Linear Junction Detector Review and Tutorial. Retrieved from http://www.tscm.com/tmdenljd.html
[15]
Yuichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, and Hideaki Sone. 2014. A threat for tablet pcs in public space: Remote visualization of screen images using em emanation. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 954–965.
[16]
Yan He, Qiuye He, Song Fang, and Yao Liu. 2021. MotionCompass: Pinpointing wireless camera via motion-activated traffic. In Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services. 215–227.
[18]
Ming Jin, Ruoxi Jia, Zhaoyi Kang, Ioannis C. Konstantakopoulos, and Costas J. Spanos. 2014. Presencesense: Zero-training algorithm for individual presence detection based on power monitoring. In Proceedings of the 1st ACM Conference on Embedded Systems for Energy-efficient Buildings. 1–10.
[19]
Markus Guenther Kuhn. 2002. Compromising Emanations: Eavesdropping Risks of Computer Displays. Ph. D. Dissertation. Citeseer.
[20]
Markus G. Kuhn. 2002. Optical time-domain eavesdropping risks of CRT displays. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 3–18.
[21]
Markus G. Kuhn. 2004. Electromagnetic eavesdropping risks of flat-panel displays. In Proceedings of the International Workshop on Privacy Enhancing Technologies. Springer, 88–107.
[22]
Denis Foo Kune, John Backes, Shane S. Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. 2013. Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 145–159.
[23]
Tian Liu, Ziyu Liu, Jun Huang, Rui Tan, and Zhen Tan. 2018. Detecting wireless spy cameras via stimulating and probing. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’18). 243–255.
[24]
Ziwei Liu, Feng Lin, Chao Wang, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, and Kui Ren. 2023. CamRadar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations. Proc. ACM Interact. Mob. Wear. Ubiq. Technol. 6, 4 (2023), 1–25.
[25]
Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, and Martha Larson. 2020. Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel. arXiv:2011.09877. Retrieved from https://arxiv.org/abs/2011.09877
[26]
Yan Long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, and Kevin Fu. 2024. EM Eye: Characterizing electromagnetic side-channel eavesdropping on embedded cameras. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS’24).
[27]
P. L. Lui. 1990. Passive intermodulation interference in communication systems. Electr. Commun. Eng. J. 2, 3 (1990), 109–118.
[28]
Gregory J. Mazzaro. 2020. Nonlinear junction detection vs. electronics: System design and improved linearity. In Proceedings of the IEEE International Radar Conference (RADAR’20). IEEE, 654–658.
[29]
MediaTek. 2017. MT2523 Series Datasheet. Retrieved from https://datasheetspdf.com/pdf-file/1343677/MediaTek/MT2523/1
[30]
Amitav Mukherjee and A. Lee Swindlehurst. 2012. Detecting passive eavesdroppers in the MIMO wiretap channel. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’12). IEEE, 2809–2812.
[31]
Tao Ni, Jianfeng Li, Xiaokuan Zhang, Chaoshun Zuo, Wubing Wang, Weitao Xu, Xiapu Luo, and Qingchuan Zhao. 2023. Exploiting contactless side channels in wireless charging power banks for user privacy inference via few-shot learning. In Proceedings of the 29th Annual International Conference on Mobile Computing and Networking. 1–15.
[32]
Tao Ni, Xiaokuan Zhang, and Qingchuan Zhao. 2023. Recovering fingerprints from in-display fingerprint sensors via electromagnetic side channel. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 253–267.
[33]
Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, and Qingchuan Zhao. 2023. Uncovering user interactions on smartphones via contactless wireless charging side channels. In Proceedings of the IEEE Symposium on Security and Privacy (SP’23). IEEE, 3399–3415.
[34]
Sanghoon Park, Lawrence E. Larson, and Laurence B. Milstein. 2006. Hidden mobile terminal device discovery in a UWB environment. In Proceedings of the IEEE International Conference on Ultra-Wideband. IEEE, 417–421.
[35]
Sanghoon Park, Lawrence E. Larson, and Laurence B. Milstein. 2010. An RF receiver detection technique for cognitive radio coexistence. IEEE Trans. Circ. Syst. II: Expr. Briefs 57, 8 (2010), 652–656.
[36]
Zhengyu Peng and Changzhi Li. 2018. Intermodulation FMCW (IM-FMCW) radar for nonlinear wearable targets detection. In Proceedings of the United States National Committee of URSI National Radio Science Meeting (USNC-URSI NRSM’18). IEEE, 1–2.
[37]
Radiocommunication Sector of ITU. 2021. Technical and Operating Parameters and Spectrum use for Short-range Radiocommunication Devices. Retrieved from https://www.itu.int/dms_pub/itu-r/opb/rep/R-REP-SM.2153-8-2021-PDF-E.pdf
[38]
Soundarya Ramesh, Ghozali Suhariyanto Hadi, Sihun Yang, Mun Choon Chan, and Jun Han. 2022. TickTock: Detecting microphone status in laptops leveraging electromagnetic leakage of clock signals. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 2475–2489.
[39]
Jérémy Raoult, Alexandre Martorell, Laurent Chusseau, and Christian Carel. 2018. Intermodulation radar for RF receiver detections. In Proceedings of the 15th European Radar Conference (EuRAD’18). IEEE, 273–276.
[40]
REALTEK. 2019. General Description of RTL8722CSM. Retrieved from https://www.realtek.com/en/products/communications-network-ics/item/rtl8722csm
[41]
Jean-Michel Redouté and Michiel Steyaert. 2009. EMC of Analog Integrated Circuits. Springer Science & Business Media.
[42]
RF BAY, Inc.2018. LNA-650: 30KHz–600MHz Low Noise Amplifier. Retrieved from https://www.rfbayinc.com/upload/files/lna/lna-650.pdf
[43]
RF BAY Inc.2021. RF Amplifier MPA-10-40. Retrieved from http://mpl.jp/amplifier/MPA-10-40.pdf
[44]
Kirsten M. Robertson, David R. Hannah, and Brenda A. Lautsch. 2015. The secret to protecting trade secrets: How to create positive secrecy climates in organizations. Bus. Horiz. 58, 6 (2015), 669–677.
[45]
Marc Roessler. 2002. How to Find Hidden Cameras. March.
[46]
Pankaj Rohatgi. 2009. Electromagnetic attacks and countermeasures. Cryptogr. Eng. (2009), 407–430.
[47]
Dinesh Sathyamoorthy, Mohd Jalis Md Jelas, and Shalini Shafii. 2014. Wireless spy devices: A review of technologies and detection methods. Editorial Board 7, 11 (2014), 130.
[48]
Nader Sehatbakhsh, Baki Berkay Yilmaz, Alenka Zajic, and Milos Prvulovic. 2020. A new side-channel vulnerability on modern computers by exploiting electromagnetic emanations from the power management unit. In Proceedings of the IEEE International Symposium on High Performance Computer Architecture (HPCA’20). IEEE, 123–138.
[49]
Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, and Vyas Sekar. 2022. Lumos: Identifying and localizing diverse hidden IoT devices in an unfamiliar environment. In Proceedings of the 31st USENIX Security Symposium (USENIX Security’22).
[50]
Cheng Shen and Jun Huang. 2021. EarFisher: Detecting wireless eavesdroppers by stimulating and sensing memory EMR. In Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI’21). 873–886.
[51]
Cheng Shen, Jun Huang, Guangyu Sun, and Jingshu Chen. 2022. Electromagnetic fingerprinting of memory heartbeats: System and applications. Proc. ACM Interact. Mob. Wear. Ubiq. Technol. 6, 3 (2022), 1–23.
[52]
Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani Srivastava. 2021. I always feel like somebody’s sensing me! A framework to detect, identify, and localize clandestine wireless sensors. In Proceedings of the 30th USENIX Security Symposium (USENIX Security’21). 1829–1846.
[53]
Spyguy. 2020. Best Hidden Voice Recorders for 2021. Retrieved from https://www.spyguy.com/a/blog/best-hidden-voice-recorders
[54]
David H. Staelin. 1969. Fast folding algorithm for detection of periodic pulse trains. Proc. IEEE 57, 4 (1969), 724–725.
[55]
Toshihide Tosaka, Kazumasa Taira, Yukio Yamanaka, Atsuhiro Nishikata, and Mitsuo Hattori. 2006. Feasibility study for reconstruction of information from near field observations of the magnetic field of laser printer. In Proceedings of the 17th International Zurich Symposium on Electromagnetic Compatibility. IEEE, 630–633.
[56]
Cihan Ulaş, Ulaş Aşık, and Cantürk Karadeniz. 2016. Analysis and reconstruction of laser printer information leakages in the media of electromagnetic radiation, power, and signal lines. Comput. Secur. 58 (2016), 250–267.
[57]
Kevin Wu and Brent Lagesse. 2019. Do you see what I see? Detecting hidden streaming cameras through similarity of simultaneous observation. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom’19). IEEE, 1–10.
[58]
Hugh D. Young, Roger A. Freedman, T. R. Sandin, and A. Lewis Ford. 1996. University Physics. Vol. 9. Addison-Wesley Reading, MA.
[59]
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. 2017. Dolphinattack: Inaudible voice commands. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 103–117.
[60]
Qibo Zhang, Daibo Liu, Xinyu Zhang, Zhichao Cao, Fanzi Zeng, Hongbo Jiang, and Wenqiang Jin. 2024. Eye of sauron: Long-range hidden spy camera detection and positioning with inbuilt memory EM radiation. In Proceedings of the 33st USENIX Security Symposium (USENIX Security’24).
[61]
Ruochen Zhou, Xiaoyu Ji, Chen Yan, Yi-Chao Chen, Wenyuan Xu, and Chaohao Li. 2022. DeHiREC: Detecting hidden voice recorders via ADC electromagnetic radiation. In Proceedings of the IEEE Symposium on Security and Privacy (SP’22). IEEE Computer Society, 658–673.

Cited By

View all
  • (2024)Commodity Wi-Fi-Based Wireless Sensing Advancements over the Past Five YearsSensors10.3390/s2422719524:22(7195)Online publication date: 10-Nov-2024
  • (2024)Learning Hierarchical Visual Transformation for Domain Generalizable Visual Matching and RecognitionInternational Journal of Computer Vision10.1007/s11263-024-02106-7132:11(4823-4849)Online publication date: 1-Nov-2024

Index Terms

  1. Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Sensor Networks
    ACM Transactions on Sensor Networks  Volume 20, Issue 6
    November 2024
    422 pages
    EISSN:1550-4867
    DOI:10.1145/3613636
    • Editor:
    • Wen Hu
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 23 November 2024
    Online AM: 22 October 2024
    Accepted: 17 September 2024
    Revised: 03 July 2024
    Received: 20 March 2024
    Published in TOSN Volume 20, Issue 6

    Check for updates

    Author Tags

    1. Device detection
    2. electromagnetic radiation
    3. privacy protection

    Qualifiers

    • Research-article

    Funding Sources

    • National Natural Science Foundation of China (NSFC)

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)221
    • Downloads (Last 6 weeks)20
    Reflects downloads up to 28 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Commodity Wi-Fi-Based Wireless Sensing Advancements over the Past Five YearsSensors10.3390/s2422719524:22(7195)Online publication date: 10-Nov-2024
    • (2024)Learning Hierarchical Visual Transformation for Domain Generalizable Visual Matching and RecognitionInternational Journal of Computer Vision10.1007/s11263-024-02106-7132:11(4823-4849)Online publication date: 1-Nov-2024

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media