skip to main content
10.1145/3495243.3560543acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device

Authors Info & Claims
Published:14 October 2022Publication History

ABSTRACT

Earpiece mode of smartphones is often used for confidential communication. In this paper, we proposed a remote(>2m) and motion-resilient attack on smartphone earpiece. We developed an end-to-end eavesdropping system mmEve based on a commercial mmWave sensor to recover speech emitted from smartphone earpiece. The rationale of the attack is based on our observation that, soundwaves emitted from the smartphone's earpiece have a strong correlation with reflected mmWaves from the smartphone's rear. However, we find the recovered speech suffers from the sensor's self-noise and smartphone user's motion which limit attack distance to less than 2m, causing limited threats in real world. We modeled the motion interference under mmWave sensing and proposed a motion-resilient solution by optimizing the fitting function on I/Q plane. To achieve a practical attack with reasonable attack distance, we developed a GAN-based denoising scheme to eliminate the noise pattern of the sensor, which boosted the attack range to 6--8m. We evaluated mmEve with extensive experiments and find 23 different models of smartphones manufactured by Samsung, Huawei, etc. can be compromised by the proposed attack.

References

  1. Alankrita Aggarwal, Mamta Mittal, and Gopi Battineni. 2021. Generative adversarial network: An overview of theory and applications. International Journal of Information Management Data Insights 1, 1 (2021), 100004.Google ScholarGoogle ScholarCross RefCross Ref
  2. Amazon. 2022. Amazon Transcribe. https://aws.amazon.com/transcribe/Google ScholarGoogle Scholar
  3. Dario Amodei, Sundaram Ananthanarayanan, Rishita Anubhai, Jingliang Bai, Eric Battenberg, Carl Case, Jared Casper, Bryan Catanzaro, Qiang Cheng, Guoliang Chen, et al. 2016. Deep speech 2: End-to-end speech recognition in english and mandarin. In International conference on machine learning. PMLR, 173--182.Google ScholarGoogle Scholar
  4. S Abhishek Anand and Nitesh Saxena. 2018. Speechless: Analyzing the threat to speech privacy from smartphone motion sensors. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 1000--1017.Google ScholarGoogle ScholarCross RefCross Ref
  5. S Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, and Yingying Chen. 2021. Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 288--299.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, and Kui Ren. 2020. Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23--26, 2020. The Internet Society.Google ScholarGoogle Scholar
  7. S. Basak and M. Gowda. 2022. mmSpy: Spying Phone Calls using mmWave Radars. In 2022 2022 IEEE Symposium on Security and Privacy (SP) (SP). IEEE Computer Society, Los Alamitos, CA, USA, 995--1012. Google ScholarGoogle ScholarCross RefCross Ref
  8. Alexander Bunkowski, Bertram Bödeker, Stefan Bader, Michael Westhoff, Patric Litterst, and Jörg Ingo Baumbach. 2009. MCC/IMS signals in human breath related to sarcoidosis---results of a feasibility study using an automated peak finding procedure. Journal of Breath Research 3, 4 (2009), 046001.Google ScholarGoogle ScholarCross RefCross Ref
  9. John Cunnison Catford et al. 1988. A practical introduction to phonetics. Clarendon Press Oxford. 161 pages.Google ScholarGoogle Scholar
  10. Chi-Lung Cheng and Hans Schneeweiss. 1998. Polynomial regression with errors in the variables. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 60, 1 (1998), 189--199.Google ScholarGoogle ScholarCross RefCross Ref
  11. Jieun Choi, Hae-Yong Yang, and Dong-Ho Cho. 2020. TEMPEST Comeback: A Realistic Audio Eavesdropping Threat on Mixed-signal SoCs. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 1085--1101.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Abe Davis, Michael Rubinstein, Neal Wadhwa, Gautham J Mysore, Fredo Durand, and William T Freeman. 2014. The visual microphone: Passive recovery of sound from video. (2014).Google ScholarGoogle Scholar
  13. Philippa Demonte. 2019. HARVARD Speech Corpus---Audio Recording 2019. University of Salford Collection (2019).Google ScholarGoogle Scholar
  14. Szu-Wei Fu, Yu Tsao, Hsin-Te Hwang, and Hsin-Min Wang. 2018. Quality-Net: An end-to-end non-intrusive speech quality assessment model based on BLSTM. arXiv preprint arXiv:1808.05344 (2018).Google ScholarGoogle Scholar
  15. Szu-Wei Fu, Cheng Yu, Tsun-An Hsieh, Peter Plantinga, Mirco Ravanelli, Xugang Lu, and Yu Tsao. 2021. MetricGAN+: An Improved Version of MetricGAN for Speech Enhancement. arXiv preprint arXiv:2104.03538 (2021).Google ScholarGoogle Scholar
  16. Munther Gdeisat and Francis Lilley. 2011. One-dimensional phase unwrapping problem. signal 4 (2011), 6.Google ScholarGoogle Scholar
  17. Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici. 2017. SPEAKE (a) R: Turn speakers to microphones for fun and profit. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).Google ScholarGoogle Scholar
  18. HStatista. 2021. Smartphone users worldwide 2016-2021. Technical Report. New York, NY, USA.Google ScholarGoogle Scholar
  19. TeamViewer Inc. 2021. TeamViewer. https://www.teamviewer.com/Google ScholarGoogle Scholar
  20. Texas Instruments. 2020. AWR1843Boost. https://www.ti.com/lit/ug/spruim4b/spruim4b.pdf?ts=1638342429747Google ScholarGoogle Scholar
  21. Md Asif Iqbal, Mohammad AZ Al-Khateeb, Lukasz Krzczanowicz, Ian D Phillips, Paul Harper, and Wladek Forysiak. 2019. Linear and nonlinear noise characterisation of dual stage broadband discrete Raman amplifiers. Journal of Lightwave Technology 37, 14 (2019), 3679--3688.Google ScholarGoogle ScholarCross RefCross Ref
  22. Chengkun Jiang, Junchen Guo, Yuan He, Meng Jin, Shuai Li, and Yunhao Liu. 2020. mmVib: micrometer-level vibration measurement with mmwave radar. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking. 1--13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S Kumudini and R Sinha. 2015. Normalized least mean square (Nlms) adaptive filter for noise cancellation. International Journal of Progresses in Engineering, Management, Science and Humanities 1, 1 (2015), 49.Google ScholarGoogle Scholar
  24. Andrew Kwong, Wenyuan Xu, and Kevin Fu. 2019. Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone. In 2019 IEEE Symposium on Security and Privacy (SP). 905--919. Google ScholarGoogle ScholarCross RefCross Ref
  25. Christophe Leys, Christophe Ley, Olivier Klein, Philippe Bernard, and Laurent Licata. 2013. Detecting outliers: Do not use standard deviation around the mean, use absolute deviation around the median. Journal of experimental social psychology 49, 4 (2013), 764--766.Google ScholarGoogle ScholarCross RefCross Ref
  26. Dong Li, Jialin Liu, Sunghoon Ivan Lee, and Jie Xiong. 2022. LASense: Pushing the Limits of Fine-grained Activity Sensing Using Acoustic Signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 1 (2022), 1--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. William McGrath. 2005. Technique and device for through-the-wall audio surveillance. US Patent App. 11/095,122.Google ScholarGoogle Scholar
  28. Ephrem Tibebe Mekonnen, Alessio Brutti, and Daniele Falavigna. 2022. End-to-End Low Resource Keyword Spotting Through Character Recognition and Beam-Search Re-Scoring. In ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 8182--8186.Google ScholarGoogle Scholar
  29. Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing speech from gyroscope signals. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 1053--1067.Google ScholarGoogle Scholar
  30. Felix Modes. 2021. BMW Automotive sensors: assistance systems' sense organs. https://www.bmw.com/en/innovation/automotive-sensors.htmlGoogle ScholarGoogle Scholar
  31. Masanori Morise, Fumiya Yokomori, and Kenji Ozawa. 2016. WORLD: a vocoder-based high-quality speech synthesis system for real-time applications. IEICE TRANSACTIONS on Information and Systems 99, 7 (2016), 1877--1884.Google ScholarGoogle ScholarCross RefCross Ref
  32. Ralph P Muscatell. 1984. Laser microphone. The Journal of the Acoustical Society of America 76, 4 (1984), 1284--1284.Google ScholarGoogle ScholarCross RefCross Ref
  33. Ben Nassi, Yaron Pirutin, Tomer Galor, Yuval Elovici, and Boris Zadov. 2021. Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 1900--1914.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, and Boris Zadov. 2020. Lam-phone: Real-time passive sound recovery from light bulb vibrations. Cryptology ePrint Archive (2020).Google ScholarGoogle Scholar
  35. John Nolan, Kun Qian, and Xinyu Zhang. 2021. RoS: Passive Smart Surface for Roadside-to-Vehicle Communication. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference (Virtual Event, USA) (SIGCOMM '21). Association for Computing Machinery, New York, NY, USA, 165--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Tomofumi Oyama, Hisao Nakashima, Shoichiro Oda, Tomohiro Yamauchi, Zhenning Tao, Takeshi Hoshida, and Jens C Rasmussen. 2014. Robust and efficient receiver-side compensation method for intra-channel nonlinear effects. In OFC 2014. IEEE, 1--3.Google ScholarGoogle ScholarCross RefCross Ref
  37. Piya Pal and PP Vaidyanathan. 2009. Frequency invariant MVDR beamforming without filters and implementation using MIMO radar. In 2009 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2081--2084.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Pery Pearson. 1993. Sound Sampling. http://www.hitl.washington.edu/projects/knowledge_base/virtual-worlds/EVE/I.B.3.a.SoundSampling.htmlGoogle ScholarGoogle Scholar
  39. Sandeep Rao. 2017. Introduction to mmWave sensing: FMCW radars. Texas Instruments (TI) mmWave Training Series (2017).Google ScholarGoogle Scholar
  40. Wit Rigs. 2019. Samsung Galaxy Note10 Teardown. https://www.youtube.com/watch?v=RfHLb5TagS8Google ScholarGoogle Scholar
  41. Wit Rigs. 2020. Samsung Galaxy S20 Teardown. https://www.youtube.com/watch?v=zaZsd4Sz83QGoogle ScholarGoogle Scholar
  42. Vittorio Rizzoli, Diego Masotti, and Franco Mastri. 1994. Full nonlinear noise analysis of microwave mixers. In 1994 IEEE MTT-S International Microwave Symposium Digest (Cat. No. 94CH3389-4). IEEE, 961--964.Google ScholarGoogle ScholarCross RefCross Ref
  43. Nirupam Roy and Romit Roy Choudhury. 2016. Listening through a vibration motor. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. 57--69.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Sriram Sami, Yimin Dai, Sean Rui Xiang Tan, Nirupam Roy, and Jun Han. 2020. Spying with your robot vacuum cleaner: eavesdropping via lidar sensors. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems. 354--367.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Elahe Soltanaghaei, Avinash Kalyanaraman, and Kamin Whitehouse. 2017. Peripheral wifi vision: Exploiting multipath reflections for more sensitive human sensing. In Proceedings of the 4th International on Workshop on Physical Analytics. 13--18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Elahe Soltanaghaei, Akarsh Prabhakara, Artur Balanuta, Matthew Anderson, Jan M. Rabaey, Swarun Kumar, and Anthony Rowe. 2021. Millimetro: MmWave Retro-Reflective Tags for Accurate, Long Range Localization. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking (MobiCom '21). Association for Computing Machinery, New York, NY, USA, 69--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Andrew Sowter. 2003. The derivation of phase integer ambiguity from single InSAR pairs: implications for differential interferometry. In Proceedings of the 11th FIG Symposium on Deformation Measurements, Santorini, Greece. 149--156.Google ScholarGoogle Scholar
  48. Cees H Taal, Richard C Hendriks, Richard Heusdens, and Jesper Jensen. 2011. An algorithm for intelligibility prediction of time-frequency weighted noisy speech. IEEE Transactions on Audio, Speech, and Language Processing 19, 7 (2011), 2125--2136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Cassia Valentini-Botinhao et al. 2017. Noisy speech database for training speech enhancement algorithms and tts models. (2017).Google ScholarGoogle Scholar
  50. Chao Wang, Feng Lin, Tiantian Liu, Ziwei Liu, Yijie Shen, Wenyao Xu, and Kui Ren. 2022. mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect. In IEEE INFOCOM 2022 - IEEE Conference on Computer Communications.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Chen-Chia Wang, Sudhir Trivedi, and etc. 2009. High sensitivity pulsed laser vibrometer and its application as a laser microphone. Applied Physics Letters 94, 5 (2009), 051112.Google ScholarGoogle ScholarCross RefCross Ref
  52. Ziqi Wang, Zhe Chen, Akash Deep Singh, Luis Garcia, Jun Luo, and Mani B Srivastava. 2020. UWHear: through-wall extraction and separation of audio vibrations using wireless signals. In SenSys'20. 1--14.Google ScholarGoogle Scholar
  53. Teng Wei, Shu Wang, Anfu Zhou, and Xinyu Zhang. 2015. Acoustic eavesdropping through wireless vibrometry. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. ACM, New York, NY, USA, 130--141.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Wikipedia contributors. 2020. Word error rate --- Wikipedia, The Free Encyclopedia. https://en.wikipedia.org/w/index.php?title=Word_error_rate&oldid=939575741 [Online; accessed 6-August-2022].Google ScholarGoogle Scholar
  55. Chenhan Xu, Zhengxiong Li, Hanbin Zhang, Aditya Singh Rathore, Huining Li, Chen Song, Kun Wang, and Wenyao Xu. 2019. Waveear: Exploring a mmwave-based noise-resistant speech sensing for voice-user interface. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. 14--26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Bin Zhang, Min Kong, and Cong Bing WU. 2009. Research of spectrum leakage with window function. Informationization 11 (2009), 10--12.Google ScholarGoogle Scholar
  57. Li Zhang, Parth H Pathak, Muchen Wu, Yixin Zhao, and Prasant Mohapatra. 2015. Accelword: Energy efficient hotword detection through accelerometer. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. 301--315.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiCom '22: Proceedings of the 28th Annual International Conference on Mobile Computing And Networking
        October 2022
        932 pages
        ISBN:9781450391818
        DOI:10.1145/3495243

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 October 2022

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate440of2,972submissions,15%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader