Главная
Study mode:
on
1
Intro
2
INTRODUCTION - YAN MICHALEVSKY
3
MICROPHONE ACCESS
4
GYROSCOPE ACCESS BY A BROWSER JAVASCRIPT CODE EXAMPLE
5
MEMS GYROSCOPES
6
GYROSCOPES ARE SUSCEPTIBLE TO SOUND
7
GYROSCOPES ARE (LOUSY, BUT STILL) MICROPHONES
8
SOFTWARE LIMITATION OF THE SAMPLING RATE
9
SAMPLING FREQUENCY LIMITS
10
THE EFFECTS OF LOW SAMPLING FREQUENCY SPEECH SAMPLED AT 8,000HZ
11
WE CAN SENSE HIGH FREQUENCY SIGNALS DUE TO ALIASING
12
EXPERIMENTAL SETUP
13
SPEECH ANALYSIS USING A SINGLE GYROSCOPE
14
PREPROCESSING • All samples are converted to audio files in WAV format
15
FEATURES • MFCC-Mel-Frequency Cepstral Coefficients • Statistical features are used mean and variance
16
CLASSIFIERS
17
DYNAMIC TIME WARPING
18
GENDER IDENTIFICATION
19
WE CAN SUCCESSFULLY IDENTIFY GENDER
20
SPEAKER IDENTIFICATION
21
A GOOD CHANCE TO IDENTIFY THE SPEAKER
22
ISOLATED WORDS RECOGNITION SPEAKER INDEPENDENT
23
HOW CAN WE LEVERAGE EAVESDROPPING SIMULTANEOUSLY ON TWO DEVICES?
24
SIMILAR TO TIME-INTERLEAVED ADC's
25
NON-UNIFORM RECONSTRUCTION REQUIRES KNOWING PRECISE TIME-SKEWS
26
PRACTICAL COMPROMISE Interleaving samples from multiple devices
27
EVALUATION Tested for the case of speaker dependent word recognition
28
FURTHER ATTACKS
29
SOURCE SEPARATION
30
AMBIENT SOUND RECOGNITION
31
SOFTWARE DEFENSES
32
HARDWARE DEFENSES
33
CONCLUSION
Description:
Explore a groundbreaking security research presentation that reveals how smartphone gyroscopes can be exploited for eavesdropping without microphone access. Delve into the technical details of how gyroscopes in modern smartphones are sensitive enough to capture acoustic signals, potentially allowing unauthorized apps and websites to listen in on nearby conversations. Learn about the experimental setup, speech analysis techniques, and machine learning classifiers used to demonstrate gender identification, speaker recognition, and isolated word detection using gyroscope data. Examine the implications of this vulnerability across various iOS and Android devices, and discover potential software and hardware defenses against such attacks. Gain insights into the broader security concerns surrounding sensor access in mobile devices and the importance of privacy-preserving measures in app development and web design.

Gyrophone - Eavesdropping Using a Gyroscope

Black Hat
Add to list