Acoustic eavesdropping through wireless vibrometry
Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015•dl.acm.org
Loudspeakers are widely used in conferencing and infotainment systems. Private
information leakage from loudspeaker sound is often assumed to be preventable using
sound-proof isolators like walls. In this paper, we explore a new acoustic eavesdropping
attack that can subvert such protectors using radio devices. Our basic idea lies in an
acoustic-radio transformation (ART) algorithm, which recovers loudspeaker sound by
inspecting the subtle disturbance it causes to the radio signals generated by an adversary or …
information leakage from loudspeaker sound is often assumed to be preventable using
sound-proof isolators like walls. In this paper, we explore a new acoustic eavesdropping
attack that can subvert such protectors using radio devices. Our basic idea lies in an
acoustic-radio transformation (ART) algorithm, which recovers loudspeaker sound by
inspecting the subtle disturbance it causes to the radio signals generated by an adversary or …
Loudspeakers are widely used in conferencing and infotainment systems. Private information leakage from loudspeaker sound is often assumed to be preventable using sound-proof isolators like walls. In this paper, we explore a new acoustic eavesdropping attack that can subvert such protectors using radio devices. Our basic idea lies in an acoustic-radio transformation (ART) algorithm, which recovers loudspeaker sound by inspecting the subtle disturbance it causes to the radio signals generated by an adversary or by its co-located WiFi transmitter. ART builds on a modeling framework that distills key factors to determine the recovered audio quality. It incorporates diversity mechanisms and noise suppression algorithms that can boost the eavesdropping quality. We implement the ART eavesdropper on a software-radio platform and conduct experiments to verify its feasibility and threat level. When targeted at vanilla PC or smartphone loudspeakers, the attacker can successfully recover high-quality audio even when blocked by sound-proof walls. On the other hand, we propose several pragmatic countermeasures that can effectively reduce the attacker's audio recovery quality by orders of magnitude.
