SlideShare a Scribd company logo
1 of 74
Download to read offline
Lamphone
Real-Time Passive Sound Recovery Using
Light Emitted from a Hanging Bulb
Ben Nassi
About Me
⮚Computer Scientist & Former Employee
⮚Ph.D. Student @ Ben-Gurion University of the Negev, Israel
⮚Researcher at CBG (Cyber @ BGU)
⮚Research Focus:
⮚Privacy (side-channel attacks, covert channel attacks)
⮚Security of IoT devices (drones, advanced driver-assistance systems, etc.)
⮚Read more about my research at www.nassiben.com
2
Researchers
3
Ben Nassi Prof. Adi Shamir Prof. Yuval Elovici Dr. Boris ZadovYaron Pirutin
This talk is based on paper that can be found here
Agenda
4
⮚Research Question
⮚Background
⮚What is sound?
⮚What is eavesdropping?
⮚Related sound recovery research
⮚Lamphone’s Threat Model
⮚Bulbs as Microphones
⮚Evaluation
⮚Potential Improvements
⮚Primary Takeaway
⮚Q&A
A Hanging Bulb as a Microphone?
5
A Hanging Bulb as a Microphone?
6
⮚Question: Can a hanging bulb be used as a microphone?
A Hanging Bulb as a Microphone?
7
⮚Question: Can a hanging bulb be used as a microphone?
⮚Answer: By using scientific tools to analyze the vibrations of a
hanging bulb, attackers can recover high quality speech and non-
speech audio.
A Hanging Bulb as a Microphone?
8
⮚Warning: Turning a hanging light bulb into a microphone is
challenging.
A Hanging Bulb as a Microphone?
9
⮚Warning: Turning a hanging light bulb into a microphone is
challenging.
⮚Primary reason: Light bulbs were not designed
to be used as microphones.
10
Background
Sound Wave
11
1. A sound wave is air traveling through space.
2. The source is some object that causes a vibration, for example, a
person's vocal chords.
3. Acoustic waves that have frequencies from around 20 Hz to 20 kHz can
be heard by humans.
Eavesdropping
12
The act of secretly recovering sound from a target/victim without
his/her consent (Wikipedia).
Eavesdropping
13
The act of secretly recovering sound from a target/victim without
his/her consent (Wikipedia).
Eavesdropping can be performed digitally and physically.
Physical eavesdropping relies on objects that are located in physical
proximity to the sound source:
1. When a sound wave hits the surface of an object, it
causes the object to vibrate.
2. By analyzing the object’s response to sound (the vibrations)
with a proper device/sensor, sound can be recovered.
How do Microphones Work?
14
Microphones are used to convert sound waves to
electrical signals using three primary components:
How do Microphones Work?
15
Microphones are used to convert sound waves to
electrical signals using three primary components:
1. Diaphragm: a diaphragm is a thin piece of material
(e.g., plastic, aluminum) that vibrates when it is
struck by sound waves.
How do Microphones Work?
16
Microphones are used to convert sound waves to
electrical signals using three primary components:
1. Diaphragm: a diaphragm is a thin piece of material
(e.g., plastic, aluminum) that vibrates when it is
struck by sound waves.
2. Transducer: the diaphragm’s vibrations are
converted to current.
How do Microphones Work?
17
Microphones are used to convert sound waves to
electrical signals using three primary components:
1. Diaphragm: a diaphragm is a thin piece of material
(e.g., plastic, aluminum) that vibrates when it is
struck by sound waves.
2. Transducer: the diaphragm’s vibrations are
converted to current.
3. ADC (analog-to-digital converter): the analog electric
signal is sampled at standard audio sample rates
(e.g., 44.1 kHz).
Eavesdropping Related Research
18
⮚In recent years, the scientific community has suggested various ways
to recover sound.
⮚There are two categories of methods:
Internal Methods External Methods
Internal Methods
19
⮚Methods that rely on data obtained by a
device located in proximity to a victim
Internal Methods
20
⮚Methods that rely on data obtained by a
device located in proximity to a victim
Motion Sensors
Gyroscope [1]
Accelerometer [2-4]
Misc.
Hard Drive [7]
Output Devices
Speakers [5]
Vibration Motor [6]
Internal Methods
21
⮚Methods that rely on data obtained by a
device located in proximity to a victim
Motion Sensors
Gyroscope [1]
Accelerometer [2-4]
Output Devices
Speakers [5]
Vibration Motor [6]
Misc.
Hard Drive [7]
From the eavesdropper’s perspective, these methods
• Are permission-less - applications that implement these methods do not require
any permissions to obtain data from the devices
• Require the attacker to place a malware compromised device near a victim in
order to obtain and exfiltrate data
External Methods
22
⮚Methods that rely on data obtained by a
device that is not located near a victim
External Methods
23
⮚Methods that rely on data obtained by a
device that is not located near a victim
Laser Microphone [8]
Uses a laser transceiver
to recover sound by
directing a laser beam at
an object and analyzing
the object’s response to
sound.
From the eavesdropper’s perspective, this method
• Is external - does not require placing a malware
compromised device near the victim
• Can be applied in real time
• Is active - the laser beam can be detected by
victims/organizations by using an optical sensor
External Methods
24
From the eavesdropper’s perspective, this method
• Is external - does not require placing a malware
compromised device near the victim
• Is passive - making its detection very difficult for
victims/organizations
• Cannot be applied in real time - requires heavy
computational resources (it takes a few hours to
reconstruct a few seconds of sound)
Visual Microphone [9]
Uses a high frequency
video camera (~2000 FPS)
to recover sound by
analyzing the object’s
(e.g., a bag of chips)
response to sound.
⮚Methods that rely on data obtained by a
device that is not located near a victim
Summary of Related Work
25
Visual MicrophoneLaser Microphone
External MethodsInternal Methods
From the eavesdropper’s perspective, each method is limited by one of the following:
• Relies on a remotely controlled device - eavesdroppers must compromise a device with a
malware
• Active - which makes it easier for the victim to detect the use of the method
• Cannot be applied in real time - because it requires heavy computational resources
Motion Sensors Output Devices Misc.
26
Lamphone’s
Threat Model
Lamphone’s Threat Model
27
snd(t)
1
2
Victim
We assume that a hanging light bulb exists in a target room.
A sound (1) snd(t) in the room (which can be the result of a conversation) creates fluctuations on the surface of the
hanging bulb (the diaphragm) (2).
Lamphone’s Threat Model
28
The eavesdropper directs an electro-optical sensor (the transducer) at the hanging bulb via a telescope (3). The
optical signal opt(t) is sampled from the electro-optical sensor via an ADC (4) and processed using a dedicated
sound recovery algorithm into an acoustic signal snd∗(t) (5).
Lamphone’s Threat Model
29
From an eavesdropper’s perspective, Lamphone’s threat model
is external, passive, and can be applied in real time.
30
Light Bulbs as
Microphones
⮚A sound wave is air traveling through space.
A Hanging Bulb as a Microphone
31
⮚A sound wave is air traveling through space.
⮚The air causes a hanging light bulb to vibrate.
A Hanging Bulb as a Microphone
32
⮚A sound wave is air traveling through space
⮚The air causes a hanging light bulb to vibrate.
⮚However, a bulb’s vibrations are so small that they are invisible to
the human eye.
A Hanging Bulb as a Microphone
33
⮚Sound wave is air traveling through space
⮚The air causes a hanging light to vibrate.
⮚However, a bulb’s vibrations are so small that they are invisible to
the human eye.
A Hanging Bulb as a Microphone
34
Measuring a Bulb’s Vibrations
35
Experiment
• We attached a gyroscope to the bottom of hanging
bulb (E27, 12 watts).
• We produced various sound waves (100-400 Hz) at
different volumes (70, 95, 115) from speakers.
• We sampled the gyroscope at 800 Hz (using RP 3).
Gyroscope
Speakers
RP 3
Measuring a Bulb’s Vibrations
36
Results
We computed the angle as the function of the frequency (the sine wave that
was played) for Phi and Theta.
Measuring a Bulb’s Vibrations
37
By analyzing the results, we conclude that the angle of vibrations:
• is in millidegrees (0.005-0.06 degrees)
• is not equal - changes as a function of the frequency
• increases as the volume increases
Measuring a Bulb’s Vibrations
38
Based on the known formula of the spherical coordinate system,
we computed the total movement, taking into account: Phi, Theta, and distance
between the ceiling and the bottom of the hanging bulb.
Measuring a Bulb’s Vibrations
39
Results
Sound affected the hanging bulb, causing it to vibrate at 300-950 microns
between the range of 100-400 Hz.
Measuring a Bulb’s Vibrations
40
Results
Sound affected the hanging bulb, causing it to vibrate in n 300-950 microns
between the range of 100-400 Hz.
Intensity of Light vs. the Bulb’s Angle
41
Experiment
• We directed an electro-optical
sensor toward a hanging light bulb
(when illuminated).
• We measured the voltage that was
produced by the electro-optical
sensor from various distances (100-
950 cm).
Intensity of Light vs. the Bulb’s Angle
42
Results
A different amount of voltage is
produced by the electro-optical
sensor when the sensor is placed 200
cm (3.5 V) than is produced when the
sensor is 600 cm (0.5 V) from the
bulb.
Intensity of Light vs. the Bulb’s Angle
43
Results
A different amount of voltage is
produced by the electro-optical
sensor when the sensor is placed 200
cm (3.5 V) than is produced when the
sensor is 600 cm (0.5 V) from the
bulb.
However, we are interested in
measuring small movements of the
bulb rather than large movements of
the sensor.
Intensity of Light vs. the Bulb’s Angle
44
Experiment
We directed an electro-optical
sensor to a hanging light bulb from
various distances (100-950 cm).
Results
For a difference of centimeter, a different
amount of voltage is produced by the
electro-optical sensor.
Setting the Criteria
45
• We computed linear equations
between two consecutive points
on the graph.
Setting the Criteria
46
• We computed linear equations
between two consecutive points
on the graph.
• Based on the linear equations, we
computed the expected voltage
resulting from displacements of
300 microns (0.3 mm) and
1000 microns (1 mm).
Setting the Criteria
47
• A 16-bit ADC provides a sensitivity of 300 microvolts:
Setting the Criteria
48
• A 16-bit ADC provides a sensitivity of 300 microvolts.
• Conclusion 1: A sensitivity of 300 microvolts is sufficient to recover the entire
spectrum (100-400 Hz) from a distance of 200-300 cm, because the smallest
vibration of 0.3 mm produces a difference of 300 microvolts.
Setting the Criteria
49
• A 16-bit ADC provides a sensitivity of 300 microvolts.
• Conclusion 1: A sensitivity of 300 microvolts is sufficient to recover the entire
spectrum (100-400 Hz) from a distance of 200-300 cm, because the smallest vibration
of 0.3 mm produces a difference of 300 microvolts.
• Conclusion 2: In order to detect a bulb’s vibration from 300 cm away: 1) the
sensitivity of the system needs to be increased, or 2) the signal obtained needs to be
amplified.
50
Evaluation
in a Real Setup
Experimental Setup
51
• We evaluated Lamphone’s performance for recovering sound from a bridge
located 25 meters from an office.
• The office contains a 12 watt E27 hanging light bulb.
Experimental Setup
52
The sound that was
played inside the office
cannot be heard from
the bridge.
Characterizing the Baseline
53
Experiment
Obtaining optical measurements
via the electro-optical sensor when
no sound is played in the office.
Results
54
No curtain walls
Results
• The LED bulb works at 100 Hz.
There are peaks on the FFT graph at
each of the harmonics (200 Hz, 300
Hz, etc.).
 We need to filter this noise with
bandstop filters.
• There is noise at low frequencies
(below 50 Hz).
 We need to filter this noise with a
highpass filter.
Analyzing the Frequency Response
55
Experiment
Obtaining optical measurements
via the electro-optical sensor when a
frequency scan is played via speakers
in proximity to a hanging bulb.
Results
56
Conclusion 1: The SNR improves when a telescope with a bigger lens is used.
Conclusion 2: The SNR is not equal across the spectrum so an equalizer needs to be
applied in order to balance the frequency response of the recovered signal.
Recovering Non-Speech Audio
57
Experiment
• We played two famous songs inside the office:
• "Let it Be” (The Beatles)
• "Clocks” (Coldplay)
• We obtained the optical measurements.
• We recovered the signals.
Recovering Non-Speech Audio
58
Results
Clocks - opt (t) Clocks - snd* (t) Clocks - snd (t)
Let it be - opt (t) Let it be - snd* (t) Let it be - snd (t)
Frequency(kHz)Frequency(kHz)
Time (s) Time (s) Time (s)
Recovering Non-Speech Audio
59
Results
We Shazamed the recovered
signals.
Recovering Speech Audio
60
Experiment
• We played a famous statement made by Donald Trump:
• “We will make America great again!”
• We obtained the optical measurements.
• We recovered the signals.
Evaluation
Results
Time (s) Time (s) Time (s)
Frequency(kHz)
“We will make America…”– opt (t) “We will make America…” - snd*(t) “We will make America…” - snd (t)“We will make America…” - opt (t)
Evaluation
62
Results
We investigated whether the recovered signal could be transcribed by Google’s
Speech-to-Text engine.
63
Potential
Improvements
Potential Improvements
1. Telescope
• Using a telescope with a larger lens diameter (r).
2. Electro-Optical Sensor
• Using a better (more sensitive) electro-optical sensor than the one we used (PDA100A2).
• Using multiple electro-optical sensors for multi-channel audio recovery.
3. ADC
• Using an ADC with a lower noise level.
• Using a 24/32-bit ADC instead of a 16-bit ADC.
4. Recovery Algorithm
• Using advanced filtering techniques to filter noise (e.g., deep learning).
65
Takeaways
Primary Takeaway
Although it is now August 2020, please mark August 2026 on your calendars.
Why?
Let’s examine Gyrophone’s [1] scientific progress.
Primary Takeaway
Although it is now August 2020, please mark August 2026 on your calendars.
Why?
Let’s examine Gyrophone’s [1] scientific progress.
• 2014 – The attack vector of eavesdropping via
motion sensors is revealed.
 A classification model to classify isolated words
that yields results which are only slight better
than a random guess
 The attack vector relied on speech at
high volume.
67 Time
Practicality
Gyrophone [1]
2014
Primary Takeaway
Although it is now August 2020, please mark August 2026 on your calendars.
Why?
Let’s examine Gyrophone’s [1] scientific progress.
• 2014 – The attack vector of eavesdropping via
motion sensors is revealed.
• 2015 to 2018 – Increased understanding
regarding this attack vector is gained.
 The accuracy of the classification model
improves.
 Better understanding regarding
the experimental setup is gained.
68 Time
Practicality
AccelWord [2]
Speechless [3]
2014 2015 2017
Gyrophone [1]
Primary Takeaway
69
Although it is now August 2020, please mark August 2026 on your calendars.
Why?
Let’s examine Gyrophone’s [1] scientific progress.
• 2014 – The attack vector of eavesdropping via
motion sensors is revealed.
• 2015 to 2018 – Increased understanding
regarding this attack vector is gained.
• 2020 – The attack vector is improved to
make it a real and practical threat to privacy.
 A classification model with excellent accuracy.
 The attack vector relies on speech at
normal volume.
Time
Practicality
Learning-based
smartphone
eavesdropping [4]
2014 2015 2017 2020
AccelWord [2]
Speechless [3]
Gyrophone [1]
Primary Takeaway
70
Conclusion: It took scientists six years to
improve Gyrophone, to the point that it
now poses a real threat to privacy.
Primary Takeaway
71
Conclusion: It took scientists six years to
improve Gyrophone, to the point that it
now poses a real threat to privacy.
My Forecast: I expect that by 2026,
scientists will have improved Lamphone
so that it too poses a real threat to
privacy.
Time
Practicality
Lamphone
2014 2020 2026
Visual
Microphone
?????
Thank You!
72
Questions?
Bibliography
[1] Y. Michalevsky, D. Boneh, and G. Nakibly, “Gyrophone: Recognizing speech from gyroscope signals,”
in 23rd USENIX Security Symposium (USENIX Security 14). San Diego, CA: USENIX Association, 2014, pp.
1053–1067.
[2] L. Zhang, P. H. Pathak, M. Wu, Y. Zhao, and P. Mohapatra, “Accelword: Energy efficient hotword
detection through accelerometer,” in Proceedings of the 13th Annual International Conference on
Mobile Systems, Applications, and Services. ACM, 2015, pp. 301–315.
[3] S. A. Anand and N. Saxena, “Speechless: Analyzing the threat to speech privacy from smartphone
motion sensors,” in 2018 IEEE Symposium on Security and Privacy (SP), vol. 00, pp. 116–133. [Online].
[4] Z. Ba, T. Zheng, X. Zhang, Z. Qin, B. Li, X. Liu, and K. Ren, “Learning-based practical smartphone
eavesdropping with built-in accelerometer.” Proceedings of the Network and Distributed Systems
Security (NDSS) Symposium 2020.
[5] M. Guri, Y. Solewicz, A. Daidakulov, and Y. Elovici, “Speake(a)r: Turn speakers to microphones for fun
and profit,” in 11th USENIX Workshop on Offensive Technologies (WOOT 17). Vancouver, BC: USENIX
Association, 2017. [Online]. 14.
73
Bibliography
[6] N. Roy and R. Roy Choudhury, “Listening through a vibration motor,” in Proceedings of the 14th
Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys ‘16. New
York, NY, USA: ACM, 2016, pp. 57–69.
[7] A. Kwong, W. Xu, and K. Fu, “Hard drive of hearing: Disks that eavesdrop with a synthesized
microphone,” in 2019 2019 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA: IEEE
Computer Society, May 2019.
[8] R. P. Muscatell, “Laser microphone,” Oct. 25 1983, US Patent 4,412,105.
[9] Davis, A., Rubinstein, M., Wadhwa, N., Mysore, G. J., Durand, F., & Freeman, W. T. (2014). The visual
microphone: Passive recovery of sound from video.
74

More Related Content

What's hot

Night vision technology
Night vision technologyNight vision technology
Night vision technologypadma gade
 
Night vision report
Night vision reportNight vision report
Night vision reportdeepakmarndi
 
1.Binaural Recording Techniques-Recording with a DIY dummy head
1.Binaural Recording Techniques-Recording with a DIY dummy head1.Binaural Recording Techniques-Recording with a DIY dummy head
1.Binaural Recording Techniques-Recording with a DIY dummy headzeynep jane bozok
 
Loudspeaker-Types, designs, Application & Crossover
Loudspeaker-Types, designs, Application & CrossoverLoudspeaker-Types, designs, Application & Crossover
Loudspeaker-Types, designs, Application & CrossoverSankaranarayanan K B
 

What's hot (6)

Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Night vision report
Night vision reportNight vision report
Night vision report
 
1.Binaural Recording Techniques-Recording with a DIY dummy head
1.Binaural Recording Techniques-Recording with a DIY dummy head1.Binaural Recording Techniques-Recording with a DIY dummy head
1.Binaural Recording Techniques-Recording with a DIY dummy head
 
Loudspeaker-Types, designs, Application & Crossover
Loudspeaker-Types, designs, Application & CrossoverLoudspeaker-Types, designs, Application & Crossover
Loudspeaker-Types, designs, Application & Crossover
 
Lecture 2 a instrumentation used in the measurement of acoustic signals and a...
Lecture 2 a instrumentation used in the measurement of acoustic signals and a...Lecture 2 a instrumentation used in the measurement of acoustic signals and a...
Lecture 2 a instrumentation used in the measurement of acoustic signals and a...
 
Audio spotlighting
Audio spotlightingAudio spotlighting
Audio spotlighting
 

Similar to [CB20] Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations by Ben Nassi

Under the Hood: Native Audio Plugins for Unity
Under the Hood: Native Audio Plugins for UnityUnder the Hood: Native Audio Plugins for Unity
Under the Hood: Native Audio Plugins for UnityNick Thompson
 
Poster presentations Silent Siren
Poster presentations Silent SirenPoster presentations Silent Siren
Poster presentations Silent SirenZahir_Shari
 
Project PPT BLINDMAN FINAL.pptx
Project PPT BLINDMAN FINAL.pptxProject PPT BLINDMAN FINAL.pptx
Project PPT BLINDMAN FINAL.pptxARIJITPAL29
 
Night vision technology
Night vision technologyNight vision technology
Night vision technologyshreedevi456
 
Third Eye for Blind Ultrasonic Vibration Gloves.pptx
Third Eye for Blind Ultrasonic Vibration Gloves.pptxThird Eye for Blind Ultrasonic Vibration Gloves.pptx
Third Eye for Blind Ultrasonic Vibration Gloves.pptxkayvyyyy
 
CSP microproject (join all india polytechnic AICTE telegram group (SONAR sys...
CSP microproject  (join all india polytechnic AICTE telegram group (SONAR sys...CSP microproject  (join all india polytechnic AICTE telegram group (SONAR sys...
CSP microproject (join all india polytechnic AICTE telegram group (SONAR sys...VivekSharma34623
 
Night vision-tech-sanketh
Night vision-tech-sankethNight vision-tech-sanketh
Night vision-tech-sankethSanketh Gowda
 
Ultrasonic testing
Ultrasonic testingUltrasonic testing
Ultrasonic testingShahzad Baig
 
Night vision technology
Night vision technology Night vision technology
Night vision technology Rabinath jha
 
Physics investigatory project on ir based security system
Physics investigatory project on ir based security systemPhysics investigatory project on ir based security system
Physics investigatory project on ir based security systemAkash dixit
 

Similar to [CB20] Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations by Ben Nassi (20)

Under the Hood: Native Audio Plugins for Unity
Under the Hood: Native Audio Plugins for UnityUnder the Hood: Native Audio Plugins for Unity
Under the Hood: Native Audio Plugins for Unity
 
Smart Sensors, Control of electrical fire using sensors
Smart Sensors, Control of electrical fire using sensorsSmart Sensors, Control of electrical fire using sensors
Smart Sensors, Control of electrical fire using sensors
 
Poster presentations Silent Siren
Poster presentations Silent SirenPoster presentations Silent Siren
Poster presentations Silent Siren
 
Project PPT BLINDMAN FINAL.pptx
Project PPT BLINDMAN FINAL.pptxProject PPT BLINDMAN FINAL.pptx
Project PPT BLINDMAN FINAL.pptx
 
ThereminReport
ThereminReportThereminReport
ThereminReport
 
Data logging (2)
Data logging (2)Data logging (2)
Data logging (2)
 
Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Smart Sensors , Crowding and the future , IDM9
Smart Sensors , Crowding and the future , IDM9Smart Sensors , Crowding and the future , IDM9
Smart Sensors , Crowding and the future , IDM9
 
Third Eye for Blind Ultrasonic Vibration Gloves.pptx
Third Eye for Blind Ultrasonic Vibration Gloves.pptxThird Eye for Blind Ultrasonic Vibration Gloves.pptx
Third Eye for Blind Ultrasonic Vibration Gloves.pptx
 
Lecture3 - VR Technology
Lecture3 - VR TechnologyLecture3 - VR Technology
Lecture3 - VR Technology
 
Smart Sensors, Parking Protection from Parasitism IDM13
Smart Sensors, Parking Protection from Parasitism IDM13Smart Sensors, Parking Protection from Parasitism IDM13
Smart Sensors, Parking Protection from Parasitism IDM13
 
Data logging
Data loggingData logging
Data logging
 
Data logging final!!
Data logging final!!Data logging final!!
Data logging final!!
 
CSP microproject (join all india polytechnic AICTE telegram group (SONAR sys...
CSP microproject  (join all india polytechnic AICTE telegram group (SONAR sys...CSP microproject  (join all india polytechnic AICTE telegram group (SONAR sys...
CSP microproject (join all india polytechnic AICTE telegram group (SONAR sys...
 
REU Poster 2012
REU Poster 2012REU Poster 2012
REU Poster 2012
 
Night vision-tech-sanketh
Night vision-tech-sankethNight vision-tech-sanketh
Night vision-tech-sanketh
 
Night Vision
Night VisionNight Vision
Night Vision
 
Ultrasonic testing
Ultrasonic testingUltrasonic testing
Ultrasonic testing
 
Night vision technology
Night vision technology Night vision technology
Night vision technology
 
Physics investigatory project on ir based security system
Physics investigatory project on ir based security systemPhysics investigatory project on ir based security system
Physics investigatory project on ir based security system
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo PupilloCODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxlionnarsimharajumjf
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 

Recently uploaded (17)

Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 

[CB20] Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations by Ben Nassi

  • 1. Lamphone Real-Time Passive Sound Recovery Using Light Emitted from a Hanging Bulb Ben Nassi
  • 2. About Me ⮚Computer Scientist & Former Employee ⮚Ph.D. Student @ Ben-Gurion University of the Negev, Israel ⮚Researcher at CBG (Cyber @ BGU) ⮚Research Focus: ⮚Privacy (side-channel attacks, covert channel attacks) ⮚Security of IoT devices (drones, advanced driver-assistance systems, etc.) ⮚Read more about my research at www.nassiben.com 2
  • 3. Researchers 3 Ben Nassi Prof. Adi Shamir Prof. Yuval Elovici Dr. Boris ZadovYaron Pirutin This talk is based on paper that can be found here
  • 4. Agenda 4 ⮚Research Question ⮚Background ⮚What is sound? ⮚What is eavesdropping? ⮚Related sound recovery research ⮚Lamphone’s Threat Model ⮚Bulbs as Microphones ⮚Evaluation ⮚Potential Improvements ⮚Primary Takeaway ⮚Q&A
  • 5. A Hanging Bulb as a Microphone? 5
  • 6. A Hanging Bulb as a Microphone? 6 ⮚Question: Can a hanging bulb be used as a microphone?
  • 7. A Hanging Bulb as a Microphone? 7 ⮚Question: Can a hanging bulb be used as a microphone? ⮚Answer: By using scientific tools to analyze the vibrations of a hanging bulb, attackers can recover high quality speech and non- speech audio.
  • 8. A Hanging Bulb as a Microphone? 8 ⮚Warning: Turning a hanging light bulb into a microphone is challenging.
  • 9. A Hanging Bulb as a Microphone? 9 ⮚Warning: Turning a hanging light bulb into a microphone is challenging. ⮚Primary reason: Light bulbs were not designed to be used as microphones.
  • 11. Sound Wave 11 1. A sound wave is air traveling through space. 2. The source is some object that causes a vibration, for example, a person's vocal chords. 3. Acoustic waves that have frequencies from around 20 Hz to 20 kHz can be heard by humans.
  • 12. Eavesdropping 12 The act of secretly recovering sound from a target/victim without his/her consent (Wikipedia).
  • 13. Eavesdropping 13 The act of secretly recovering sound from a target/victim without his/her consent (Wikipedia). Eavesdropping can be performed digitally and physically. Physical eavesdropping relies on objects that are located in physical proximity to the sound source: 1. When a sound wave hits the surface of an object, it causes the object to vibrate. 2. By analyzing the object’s response to sound (the vibrations) with a proper device/sensor, sound can be recovered.
  • 14. How do Microphones Work? 14 Microphones are used to convert sound waves to electrical signals using three primary components:
  • 15. How do Microphones Work? 15 Microphones are used to convert sound waves to electrical signals using three primary components: 1. Diaphragm: a diaphragm is a thin piece of material (e.g., plastic, aluminum) that vibrates when it is struck by sound waves.
  • 16. How do Microphones Work? 16 Microphones are used to convert sound waves to electrical signals using three primary components: 1. Diaphragm: a diaphragm is a thin piece of material (e.g., plastic, aluminum) that vibrates when it is struck by sound waves. 2. Transducer: the diaphragm’s vibrations are converted to current.
  • 17. How do Microphones Work? 17 Microphones are used to convert sound waves to electrical signals using three primary components: 1. Diaphragm: a diaphragm is a thin piece of material (e.g., plastic, aluminum) that vibrates when it is struck by sound waves. 2. Transducer: the diaphragm’s vibrations are converted to current. 3. ADC (analog-to-digital converter): the analog electric signal is sampled at standard audio sample rates (e.g., 44.1 kHz).
  • 18. Eavesdropping Related Research 18 ⮚In recent years, the scientific community has suggested various ways to recover sound. ⮚There are two categories of methods: Internal Methods External Methods
  • 19. Internal Methods 19 ⮚Methods that rely on data obtained by a device located in proximity to a victim
  • 20. Internal Methods 20 ⮚Methods that rely on data obtained by a device located in proximity to a victim Motion Sensors Gyroscope [1] Accelerometer [2-4] Misc. Hard Drive [7] Output Devices Speakers [5] Vibration Motor [6]
  • 21. Internal Methods 21 ⮚Methods that rely on data obtained by a device located in proximity to a victim Motion Sensors Gyroscope [1] Accelerometer [2-4] Output Devices Speakers [5] Vibration Motor [6] Misc. Hard Drive [7] From the eavesdropper’s perspective, these methods • Are permission-less - applications that implement these methods do not require any permissions to obtain data from the devices • Require the attacker to place a malware compromised device near a victim in order to obtain and exfiltrate data
  • 22. External Methods 22 ⮚Methods that rely on data obtained by a device that is not located near a victim
  • 23. External Methods 23 ⮚Methods that rely on data obtained by a device that is not located near a victim Laser Microphone [8] Uses a laser transceiver to recover sound by directing a laser beam at an object and analyzing the object’s response to sound. From the eavesdropper’s perspective, this method • Is external - does not require placing a malware compromised device near the victim • Can be applied in real time • Is active - the laser beam can be detected by victims/organizations by using an optical sensor
  • 24. External Methods 24 From the eavesdropper’s perspective, this method • Is external - does not require placing a malware compromised device near the victim • Is passive - making its detection very difficult for victims/organizations • Cannot be applied in real time - requires heavy computational resources (it takes a few hours to reconstruct a few seconds of sound) Visual Microphone [9] Uses a high frequency video camera (~2000 FPS) to recover sound by analyzing the object’s (e.g., a bag of chips) response to sound. ⮚Methods that rely on data obtained by a device that is not located near a victim
  • 25. Summary of Related Work 25 Visual MicrophoneLaser Microphone External MethodsInternal Methods From the eavesdropper’s perspective, each method is limited by one of the following: • Relies on a remotely controlled device - eavesdroppers must compromise a device with a malware • Active - which makes it easier for the victim to detect the use of the method • Cannot be applied in real time - because it requires heavy computational resources Motion Sensors Output Devices Misc.
  • 27. Lamphone’s Threat Model 27 snd(t) 1 2 Victim We assume that a hanging light bulb exists in a target room. A sound (1) snd(t) in the room (which can be the result of a conversation) creates fluctuations on the surface of the hanging bulb (the diaphragm) (2).
  • 28. Lamphone’s Threat Model 28 The eavesdropper directs an electro-optical sensor (the transducer) at the hanging bulb via a telescope (3). The optical signal opt(t) is sampled from the electro-optical sensor via an ADC (4) and processed using a dedicated sound recovery algorithm into an acoustic signal snd∗(t) (5).
  • 29. Lamphone’s Threat Model 29 From an eavesdropper’s perspective, Lamphone’s threat model is external, passive, and can be applied in real time.
  • 31. ⮚A sound wave is air traveling through space. A Hanging Bulb as a Microphone 31
  • 32. ⮚A sound wave is air traveling through space. ⮚The air causes a hanging light bulb to vibrate. A Hanging Bulb as a Microphone 32
  • 33. ⮚A sound wave is air traveling through space ⮚The air causes a hanging light bulb to vibrate. ⮚However, a bulb’s vibrations are so small that they are invisible to the human eye. A Hanging Bulb as a Microphone 33
  • 34. ⮚Sound wave is air traveling through space ⮚The air causes a hanging light to vibrate. ⮚However, a bulb’s vibrations are so small that they are invisible to the human eye. A Hanging Bulb as a Microphone 34
  • 35. Measuring a Bulb’s Vibrations 35 Experiment • We attached a gyroscope to the bottom of hanging bulb (E27, 12 watts). • We produced various sound waves (100-400 Hz) at different volumes (70, 95, 115) from speakers. • We sampled the gyroscope at 800 Hz (using RP 3). Gyroscope Speakers RP 3
  • 36. Measuring a Bulb’s Vibrations 36 Results We computed the angle as the function of the frequency (the sine wave that was played) for Phi and Theta.
  • 37. Measuring a Bulb’s Vibrations 37 By analyzing the results, we conclude that the angle of vibrations: • is in millidegrees (0.005-0.06 degrees) • is not equal - changes as a function of the frequency • increases as the volume increases
  • 38. Measuring a Bulb’s Vibrations 38 Based on the known formula of the spherical coordinate system, we computed the total movement, taking into account: Phi, Theta, and distance between the ceiling and the bottom of the hanging bulb.
  • 39. Measuring a Bulb’s Vibrations 39 Results Sound affected the hanging bulb, causing it to vibrate at 300-950 microns between the range of 100-400 Hz.
  • 40. Measuring a Bulb’s Vibrations 40 Results Sound affected the hanging bulb, causing it to vibrate in n 300-950 microns between the range of 100-400 Hz.
  • 41. Intensity of Light vs. the Bulb’s Angle 41 Experiment • We directed an electro-optical sensor toward a hanging light bulb (when illuminated). • We measured the voltage that was produced by the electro-optical sensor from various distances (100- 950 cm).
  • 42. Intensity of Light vs. the Bulb’s Angle 42 Results A different amount of voltage is produced by the electro-optical sensor when the sensor is placed 200 cm (3.5 V) than is produced when the sensor is 600 cm (0.5 V) from the bulb.
  • 43. Intensity of Light vs. the Bulb’s Angle 43 Results A different amount of voltage is produced by the electro-optical sensor when the sensor is placed 200 cm (3.5 V) than is produced when the sensor is 600 cm (0.5 V) from the bulb. However, we are interested in measuring small movements of the bulb rather than large movements of the sensor.
  • 44. Intensity of Light vs. the Bulb’s Angle 44 Experiment We directed an electro-optical sensor to a hanging light bulb from various distances (100-950 cm). Results For a difference of centimeter, a different amount of voltage is produced by the electro-optical sensor.
  • 45. Setting the Criteria 45 • We computed linear equations between two consecutive points on the graph.
  • 46. Setting the Criteria 46 • We computed linear equations between two consecutive points on the graph. • Based on the linear equations, we computed the expected voltage resulting from displacements of 300 microns (0.3 mm) and 1000 microns (1 mm).
  • 47. Setting the Criteria 47 • A 16-bit ADC provides a sensitivity of 300 microvolts:
  • 48. Setting the Criteria 48 • A 16-bit ADC provides a sensitivity of 300 microvolts. • Conclusion 1: A sensitivity of 300 microvolts is sufficient to recover the entire spectrum (100-400 Hz) from a distance of 200-300 cm, because the smallest vibration of 0.3 mm produces a difference of 300 microvolts.
  • 49. Setting the Criteria 49 • A 16-bit ADC provides a sensitivity of 300 microvolts. • Conclusion 1: A sensitivity of 300 microvolts is sufficient to recover the entire spectrum (100-400 Hz) from a distance of 200-300 cm, because the smallest vibration of 0.3 mm produces a difference of 300 microvolts. • Conclusion 2: In order to detect a bulb’s vibration from 300 cm away: 1) the sensitivity of the system needs to be increased, or 2) the signal obtained needs to be amplified.
  • 51. Experimental Setup 51 • We evaluated Lamphone’s performance for recovering sound from a bridge located 25 meters from an office. • The office contains a 12 watt E27 hanging light bulb.
  • 52. Experimental Setup 52 The sound that was played inside the office cannot be heard from the bridge.
  • 53. Characterizing the Baseline 53 Experiment Obtaining optical measurements via the electro-optical sensor when no sound is played in the office.
  • 54. Results 54 No curtain walls Results • The LED bulb works at 100 Hz. There are peaks on the FFT graph at each of the harmonics (200 Hz, 300 Hz, etc.).  We need to filter this noise with bandstop filters. • There is noise at low frequencies (below 50 Hz).  We need to filter this noise with a highpass filter.
  • 55. Analyzing the Frequency Response 55 Experiment Obtaining optical measurements via the electro-optical sensor when a frequency scan is played via speakers in proximity to a hanging bulb.
  • 56. Results 56 Conclusion 1: The SNR improves when a telescope with a bigger lens is used. Conclusion 2: The SNR is not equal across the spectrum so an equalizer needs to be applied in order to balance the frequency response of the recovered signal.
  • 57. Recovering Non-Speech Audio 57 Experiment • We played two famous songs inside the office: • "Let it Be” (The Beatles) • "Clocks” (Coldplay) • We obtained the optical measurements. • We recovered the signals.
  • 58. Recovering Non-Speech Audio 58 Results Clocks - opt (t) Clocks - snd* (t) Clocks - snd (t) Let it be - opt (t) Let it be - snd* (t) Let it be - snd (t) Frequency(kHz)Frequency(kHz) Time (s) Time (s) Time (s)
  • 59. Recovering Non-Speech Audio 59 Results We Shazamed the recovered signals.
  • 60. Recovering Speech Audio 60 Experiment • We played a famous statement made by Donald Trump: • “We will make America great again!” • We obtained the optical measurements. • We recovered the signals.
  • 61. Evaluation Results Time (s) Time (s) Time (s) Frequency(kHz) “We will make America…”– opt (t) “We will make America…” - snd*(t) “We will make America…” - snd (t)“We will make America…” - opt (t)
  • 62. Evaluation 62 Results We investigated whether the recovered signal could be transcribed by Google’s Speech-to-Text engine.
  • 64. Potential Improvements 1. Telescope • Using a telescope with a larger lens diameter (r). 2. Electro-Optical Sensor • Using a better (more sensitive) electro-optical sensor than the one we used (PDA100A2). • Using multiple electro-optical sensors for multi-channel audio recovery. 3. ADC • Using an ADC with a lower noise level. • Using a 24/32-bit ADC instead of a 16-bit ADC. 4. Recovery Algorithm • Using advanced filtering techniques to filter noise (e.g., deep learning).
  • 66. Primary Takeaway Although it is now August 2020, please mark August 2026 on your calendars. Why? Let’s examine Gyrophone’s [1] scientific progress.
  • 67. Primary Takeaway Although it is now August 2020, please mark August 2026 on your calendars. Why? Let’s examine Gyrophone’s [1] scientific progress. • 2014 – The attack vector of eavesdropping via motion sensors is revealed.  A classification model to classify isolated words that yields results which are only slight better than a random guess  The attack vector relied on speech at high volume. 67 Time Practicality Gyrophone [1] 2014
  • 68. Primary Takeaway Although it is now August 2020, please mark August 2026 on your calendars. Why? Let’s examine Gyrophone’s [1] scientific progress. • 2014 – The attack vector of eavesdropping via motion sensors is revealed. • 2015 to 2018 – Increased understanding regarding this attack vector is gained.  The accuracy of the classification model improves.  Better understanding regarding the experimental setup is gained. 68 Time Practicality AccelWord [2] Speechless [3] 2014 2015 2017 Gyrophone [1]
  • 69. Primary Takeaway 69 Although it is now August 2020, please mark August 2026 on your calendars. Why? Let’s examine Gyrophone’s [1] scientific progress. • 2014 – The attack vector of eavesdropping via motion sensors is revealed. • 2015 to 2018 – Increased understanding regarding this attack vector is gained. • 2020 – The attack vector is improved to make it a real and practical threat to privacy.  A classification model with excellent accuracy.  The attack vector relies on speech at normal volume. Time Practicality Learning-based smartphone eavesdropping [4] 2014 2015 2017 2020 AccelWord [2] Speechless [3] Gyrophone [1]
  • 70. Primary Takeaway 70 Conclusion: It took scientists six years to improve Gyrophone, to the point that it now poses a real threat to privacy.
  • 71. Primary Takeaway 71 Conclusion: It took scientists six years to improve Gyrophone, to the point that it now poses a real threat to privacy. My Forecast: I expect that by 2026, scientists will have improved Lamphone so that it too poses a real threat to privacy. Time Practicality Lamphone 2014 2020 2026 Visual Microphone ?????
  • 73. Bibliography [1] Y. Michalevsky, D. Boneh, and G. Nakibly, “Gyrophone: Recognizing speech from gyroscope signals,” in 23rd USENIX Security Symposium (USENIX Security 14). San Diego, CA: USENIX Association, 2014, pp. 1053–1067. [2] L. Zhang, P. H. Pathak, M. Wu, Y. Zhao, and P. Mohapatra, “Accelword: Energy efficient hotword detection through accelerometer,” in Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 2015, pp. 301–315. [3] S. A. Anand and N. Saxena, “Speechless: Analyzing the threat to speech privacy from smartphone motion sensors,” in 2018 IEEE Symposium on Security and Privacy (SP), vol. 00, pp. 116–133. [Online]. [4] Z. Ba, T. Zheng, X. Zhang, Z. Qin, B. Li, X. Liu, and K. Ren, “Learning-based practical smartphone eavesdropping with built-in accelerometer.” Proceedings of the Network and Distributed Systems Security (NDSS) Symposium 2020. [5] M. Guri, Y. Solewicz, A. Daidakulov, and Y. Elovici, “Speake(a)r: Turn speakers to microphones for fun and profit,” in 11th USENIX Workshop on Offensive Technologies (WOOT 17). Vancouver, BC: USENIX Association, 2017. [Online]. 14. 73
  • 74. Bibliography [6] N. Roy and R. Roy Choudhury, “Listening through a vibration motor,” in Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys ‘16. New York, NY, USA: ACM, 2016, pp. 57–69. [7] A. Kwong, W. Xu, and K. Fu, “Hard drive of hearing: Disks that eavesdrop with a synthesized microphone,” in 2019 2019 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA: IEEE Computer Society, May 2019. [8] R. P. Muscatell, “Laser microphone,” Oct. 25 1983, US Patent 4,412,105. [9] Davis, A., Rubinstein, M., Wadhwa, N., Mysore, G. J., Durand, F., & Freeman, W. T. (2014). The visual microphone: Passive recovery of sound from video. 74