TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals

09/07/2022
by   Soundarya Ramesh, et al.
0

We are witnessing a heightened surge in remote privacy attacks on laptop computers. These attacks often exploit malware to remotely gain access to webcams and microphones in order to spy on the victim users. While webcam attacks are somewhat defended with widely available commercial webcam privacy covers, unfortunately, there are no adequate solutions to thwart the attacks on mics despite recent industry efforts. As a first step towards defending against such attacks on laptop mics, we propose TickTock, a novel mic on/off status detection system. To achieve this, TickTock externally probes the electromagnetic (EM) emanations that stem from the connectors and cables of the laptop circuitry carrying mic clock signals. This is possible because the mic clock signals are only input during the mic recording state, causing resulting emanations. We design and implement a proof-of-concept system to demonstrate TickTock's feasibility. Furthermore, we comprehensively evaluate TickTock on a total of 30 popular laptops executing a variety of applications to successfully detect mic status in 27 laptops. Of these, TickTock consistently identifies mic recording with high true positive and negative rates.

READ FULL TEXT

page 2

page 5

page 7

page 10

page 11

research
07/04/2022

Decidability of One-Clock Weighted Timed Games with Arbitrary Weights

Weighted Timed Games (WTG for short) are the most widely used model to d...
research
10/24/2019

Regional Clock Tree Generation by Abutment in Synchoros VLSI Design

Synchoros VLSI design style has been proposed as an alternative to stand...
research
11/21/2018

Encryption is Futile: Delay Attacks on High-Precision Clock Synchronization

Clock synchronization has become essential to modern societies since man...
research
09/07/2020

One-Clock Priced Timed Games with Arbitrary Weights

Priced timed games are two-player zero-sum games played on priced timed ...
research
04/02/2019

SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (Extended Version)

The proliferation of surveillance cameras has greatly improved the physi...
research
02/21/2023

Speech Privacy Leakage from Shared Gradients in Distributed Learning

Distributed machine learning paradigms, such as federated learning, have...

Please sign up or login with your details

Forgot password? Click here to reset