Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

WaveSpy - Remote and Through-Wall Screen Attack via mmWave Sensing

IEEE via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking security vulnerability in digital screens through this IEEE conference talk. Delve into WaveSpy, an innovative through-wall screen attack system that uses millimeter-wave sensing to remotely infer screen content, even in isolated environments. Learn about the relationship between screen content and liquid crystal states, and how this can be exploited to bypass traditional security measures. Examine the system's components, including a low-cost mmWave probe, and its effectiveness in recognizing screen content types and retrieving sensitive information. Analyze the evaluation results across various scenarios and discuss potential countermeasures to mitigate such attacks. Gain insights into the implications of this research for screen security and the need for new protective strategies in the digital age.

Syllabus

Intro
Agenda
Current Practice Compromising Reflections
Isolation secure ?
Attack Scenario: Remote and Through-wall
Screen Mechanism
Technique Challenges
Liquid Crystal Nonlinear Effects
Sensing Frequency Estimation
Preliminary Study (1/4)
Preliminary Study: PIN Theft
System Concept: WaveSpy
System Overview
The Wavelet Analysis on LCS Response
Screen Content Type Recognition
Sensitive Information Retrieval
General Security Information Inference
Evaluation Setup
On the Overall Accuracy
Impact of Display Resolution
Impact of Cover Material
Countermeasures
Discussion
Take-away

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of WaveSpy - Remote and Through-Wall Screen Attack via mmWave Sensing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.