Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
41 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
41 tokens/sec
o3 Pro
7 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors (1810.10109v4)

Published 23 Oct 2018 in cs.CR

Abstract: Our work demonstrates a new set of silent reconnaissance attacks, which leverages the presence of commodity WiFi devices to track users inside private homes and offices, without compromising any WiFi network, data packets, or devices. We show that just by sniffing existing WiFi signals, an adversary can accurately detect and track movements of users inside a building. This is made possible by our new signal model that links together human motion near WiFi transmitters and variance of multipath signal propagation seen by the attacker sniffer outside of the property. The resulting attacks are cheap, highly effective, and yet difficult to detect. We implement the attack using a single commodity smartphone, deploy it in 11 real-world offices and residential apartments, and show it is highly effective. Finally, we evaluate potential defenses, and propose a practical and effective defense based on AP signal obfuscation.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Yanzi Zhu (3 papers)
  2. Zhujun Xiao (5 papers)
  3. Yuxin Chen (195 papers)
  4. Zhijing Li (9 papers)
  5. Max Liu (3 papers)
  6. Ben Y. Zhao (48 papers)
  7. Haitao Zheng (49 papers)
Citations (51)
X Twitter Logo Streamline Icon: https://streamlinehq.com