PRACTICAL COMPROMISE Interleaving samples from multiple devices
27
EVALUATION Tested for the case of speaker dependent word recognition
28
FURTHER ATTACKS
29
SOURCE SEPARATION
30
AMBIENT SOUND RECOGNITION
31
SOFTWARE DEFENSES
32
HARDWARE DEFENSES
33
CONCLUSION
Description:
Explore a groundbreaking security research presentation that reveals how smartphone gyroscopes can be exploited for eavesdropping without microphone access. Delve into the technical details of how gyroscopes in modern smartphones are sensitive enough to capture acoustic signals, potentially allowing unauthorized apps and websites to listen in on nearby conversations. Learn about the experimental setup, speech analysis techniques, and machine learning classifiers used to demonstrate gender identification, speaker recognition, and isolated word detection using gyroscope data. Examine the implications of this vulnerability across various iOS and Android devices, and discover potential software and hardware defenses against such attacks. Gain insights into the broader security concerns surrounding sensor access in mobile devices and the importance of privacy-preserving measures in app development and web design.