Detecting Wireless Spy Cameras Via Stimulating and Probing

The rapid proliferation of wireless video cameras has raised serious privacy concerns. In this paper, we propose a stimulating-and-probing approach to detecting wireless spy cameras. The core idea is to actively alter the light condition of a private space to manipulate the spy camera's video scene, and then investigates the responsive variations of a packet flow to determine if it is produced by a wireless camera. Following this approach, we develop Blink and Flicker -- two practical systems for detecting wireless spy cameras. Blink is a lightweight app that can be deployed on off-the-shelf mobile devices. It asks the user to turn on/off the light of her private space, and then uses the light sensor and the wireless radio of the mobile device to identify the response of wireless cameras. Flicker is a robust and automated system that augments Blink to detect wireless cameras in both live and offline streaming modes. Flicker employs a cheap and portable circuit, which harnesses daily used LEDs to stimulate wireless cameras using human-invisible flickering. The time series of stimuli is further encoded using FEC to combat ambient light and uncontrollable packet flow variations that may degrade detection performance. Extensive experiments show that Blink and Flicker can accurately detect wireless cameras under a wide range of network and environmental conditions.

[1]  Dario Rossi,et al.  Revealing skype traffic: when randomness plays with you , 2007, SIGCOMM '07.

[2]  Adi Shamir,et al.  Game of Drones - Detecting Streamed POI from Encrypted FPV Channel , 2018, ArXiv.

[3]  Xun Gong,et al.  Fingerprinting websites using remote traffic analysis , 2010, CCS '10.

[4]  Robert L. Wolpert,et al.  Statistical Inference , 2019, Encyclopedia of Social Network Analysis and Mining.

[5]  Qi Zhang,et al.  Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic , 2016, WOOT.

[6]  Marco Mellia,et al.  Revealing skype traffic: when randomness plays with you , 2007, SIGCOMM 2007.

[7]  Brijesh Joshi,et al.  Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.

[8]  Walid Dabbous,et al.  Network characteristics of video streaming traffic , 2011, CoNEXT '11.

[9]  Nino Vincenzo Verde,et al.  Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis , 2014, CODASPY.

[10]  C W Tyler,et al.  Analysis of visual modulation sensitivity. II. Peripheral retina and the role of photoreceptor dimensions. , 1985, Journal of the Optical Society of America. A, Optics and image science.

[11]  Charles V. Wright,et al.  On Inferring Application Protocol Behaviors in Encrypted Network Traffic , 2006, J. Mach. Learn. Res..

[12]  Ke Zhou,et al.  Human visual cortex responds to invisible chromatic flicker , 2007, Nature Neuroscience.

[13]  Sebastian Zander,et al.  A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.

[14]  Richard Han,et al.  Matthan: Drone Presence Detection by Identifying Physical Signatures in the Drone's RF Communication , 2017, MobiSys.

[15]  Lingyun Yang,et al.  Internet video traffic classification using QoS features , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).

[16]  Chi Zhang,et al.  Automating Visual Privacy Protection Using a Smart LED , 2017, MobiCom.

[17]  Andrew W. Moore,et al.  A Machine Learning Approach for Efficient Traffic Classification , 2007, 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[18]  Ben Y. Zhao,et al.  Adversarial Localization against Wireless Cameras , 2018, HotMobile.

[19]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[20]  Nils Ole Tippenhauer,et al.  IoTScanner: Detecting Privacy Threats in IoT Neighborhoods , 2017, IoTPTS@AsiaCCS.