Wearable Microphone Jamming

被引:52
作者
Chen, Yuxin [1 ]
Li, Huiying [1 ]
Teng, Shan-Yuan [1 ]
Nagels, Steven [1 ]
Li, Zhijing [1 ]
Lopes, Pedro [1 ]
Zhao, Ben Y. [1 ]
Zheng, Haitao [1 ]
机构
[1] Univ Chicago, Chicago, IL 60637 USA
来源
PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20) | 2020年
基金
美国国家科学基金会;
关键词
Wearable; microphone; jamming; privacy; ultrasound;
D O I
10.1145/3313831.3376304
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We engineered a wearable microphone jammer that is capable of disabling microphones in its user's surroundings, including hidden microphones. Our device is based on a recent exploit that leverages the fact that when exposed to ultrasonic noise, commodity microphones will leak the noise into the audible range. Unfortunately, ultrasonic jammers are built from multiple transducers and therefore exhibit blind spots, i.e., locations in which transducers destructively interfere and where a microphone cannot be jammed. To solve this, our device exploits a synergy between ultrasonic jamming and the naturally occurring movements that users induce on their wearable devices (e.g., bracelets) as they gesture or walk. We demonstrate that these movements can blur jamming blind spots and increase jamming coverage. Moreover, current jammers are also directional, requiring users to point the jammer to a microphone; instead, our wearable bracelet is built in a ring-layout that allows it to jam in multiple directions. This is beneficial in that it allows our jammer to protect against microphones hidden out of sight. We evaluated our jammer in a series of experiments and found that: (1) it jams in all directions, e.g., our device jams over 87% of the words uttered around it in any direction, while existing devices jam only 30% when not pointed directly at the microphone; (2) it exhibits significantly less blind spots; and, (3) our device induced a feeling of privacy to participants of our user study. We believe our wearable provides stronger privacy in a world in which most devices are constantly eavesdropping on our conversations.
引用
收藏
页数:12
相关论文
共 61 条
[21]  
BELLOTTI V, 1993, PROCEEDINGS OF THE THIRD EUROPEAN CONFERENCE ON COMPUTER-SUPPORTED COOPERATIVE WORK ( ECSCW 93 ), P77
[22]   Micromechanical microphone using sideband modulation of nonlinear resonators [J].
Boales, Joseph A. ;
Mateen, Farrukh ;
Mohanty, Pritiraj .
APPLIED PHYSICS LETTERS, 2017, 111 (09)
[23]  
Brocker M, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P337
[24]   AirLink: Sharing Files Between Multiple Devices Using In-Air Gestures [J].
Chen, Ke-Yu ;
Ashbrook, Daniel ;
Goel, Mayank ;
Lee, Sung-Hyuck ;
Patel, Shwetak .
UBICOMP'14: PROCEEDINGS OF THE 2014 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING, 2014, :565-569
[25]  
Chung H., 2018, INTELLIGENT VIRTUAL
[26]   Alexa, Can I Trust You? [J].
Chung, Hyunji ;
Iorga, Michaela ;
Voas, Jeffrey ;
Lee, Sangjin .
COMPUTER, 2017, 50 (09) :100-104
[27]  
Colton Gregg D, 1997, ESPIONAGE, V101
[28]  
De Russis Luigi, 2013, P ACM C PERV UB COMP
[29]  
Fischer Carl, 2008, P 1 ACM INT WORKSH M
[30]  
Gupta S., 2012, P SIGCHI C HUM FACT, P1911, DOI [10.1145/2207676.2208331, DOI 10.1145/2207676.2208331]