skip to main content
10.1145/3178876.3186100acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article
Free Access

I'm Listening to your Location! Inferring User Location with Acoustic Side Channels.

Published:23 April 2018Publication History

ABSTRACT

Electrical network frequency (ENF) signals have common patterns that can be used as signatures for identifying recorded time and location of videos and sound. To enable cost-efficient, reliable and scalable location inference, we created a reference map of ENF signals representing hundreds of locations world wide -- extracting real-world ENF signals from online multimedia streaming services (e.g., YouTube and Explore). Based on this reference map of ENF signals, we propose a novel side-channel attack that can identify the physical location of where a target video or sound was recorded or streamed from. Our attack does not require any expensive ENF signal receiver nor any software to be installed on a victim»s device -- all we need is the recorded video or sound files to perform the attack and they are collected from world wide web. The evaluation results show that our attack can infer the intra-grid location of the recorded audio files with an accuracy of $76$% when those files are $5$ minutes or longer. We also showed that our proposed attack works well even when video and audio data are processed within a certain distortion range with audio codecs used in real VoIP applications.

References

  1. M. Abe and J. O. Smith III. 2004. Design criteria for simple sinusoidal parameter estimation based on quadratic i5nterpolation of FFT magnitude peaks. In Audio Engineering Society Convention 117. Audio Engineering Society.Google ScholarGoogle Scholar
  2. Skype and/or Microsoft. 2017. Skype | Free calls to friends and family. (2017). https://www.skype.com/Google ScholarGoogle Scholar
  3. C. Bettini, X. S. Wang, and S. Jajodia. 2005. Protecting Privacy Against Locationbased Personal Identification. In Proceedings of the Second VDLB International Conference on Secure Data Management. Springer, Berlin, Heidelberg, 185--199. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Bykhovsky and A. Cohen. 2013. Electrical network frequency (ENF) maximumlikelihood estimation via a multitone harmonic model. IEEE Transactions on Information Forensics and Security 8, 5 (2013), 744--753. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Chai, F. Liu, Z. Yuan, R. W. Conners, and Y. Liu. 2013. Source of ENF in BatteryPowered Digital Recordings. In Audio Engineering Society Convention 135. AES, Convention, 1--7. http://www.aes.org/e-lib/browse.cfm?elib=17055Google ScholarGoogle Scholar
  6. F.-C. Chang and H.-C. Huang. 2010. Electrical network frequency as a tool for audio concealment process. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on. IEEE, 175--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Chen, P. Markham, C. Chen, and Y. Liu. 2011. Analysis of societal event impacts on the power system frequency using FNET measurements. In Power and Energy Society General Meeting. IEEE, Detroit, MI, USA, 1--8.Google ScholarGoogle Scholar
  8. W. H. Chuang, R. Garg, and M. Wu. 2013. Anti-Forensics and Countermeasures of Electrical Network Frequency Analysis. IEEE Transactions on Information Forensics and Security 8, 12 (2013), 2073--2088. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. J. Cooper. 2008. The electric network frequency (ENF) as an aid to authenticating forensic digital audio recordings--an automated approach. In Audio Engineering Society Conference: 33rd International Conference: Audio Forensics-Theory and Practice. Audio Engineering Society.Google ScholarGoogle Scholar
  10. A. J. Cooper. 2009. An automated approach to the Electric Network Frequency (ENF) criterion-Theory and practice. International Journal of Speech, Language and the Law 16, 2 (2009), 193--218.Google ScholarGoogle Scholar
  11. IBM Corporation. 2017. Live Streaming, Online Video & Hosting Services | Ustream. (2017). http://www.ustream.tv/Google ScholarGoogle Scholar
  12. B. Coskun and N. Memon. 2010. Tracking encrypted VoIP calls via robust hashing of network flows. In International Conference on Acoustics, Speech and Signal Processing. IEEE, Dallas, TX, USA, 1818--1821.Google ScholarGoogle Scholar
  13. Inc. EarthCam. 2017. EarthCam - Webcam Network. (2017). https://www. earthcam.com/Google ScholarGoogle Scholar
  14. Facebook. 2017. Facebook Live | Live Video Streaming. (2017). https://live.fb.com/Google ScholarGoogle Scholar
  15. Facebook. 2017. Messenger. (2017). https://www.facebook.com/messenger/Google ScholarGoogle Scholar
  16. The Annenberg Foundation. 2017. The largest live nature cam network on the planet World! (2017). http://explore.org/Google ScholarGoogle Scholar
  17. S. Gambs, M.-O. Killijian, and M. Nú nez Del Prado Cortez. 2014. Deanonymization Attack on Geolocated Data. J. Comput. System Sci. 80, 8 (2014), 1597--1614. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Garg, A. Hajj-Ahmad, and M. Wu. 2013. Geo-location estimation from Electrical Network Frequency signals. In ICASSP. IEEE, Vancouver, BC, Canada, 2862--2866.Google ScholarGoogle Scholar
  19. D. Goldschlag, M. Reed, and P. Syverson. 1999. Onion routing. Commun. ACM 42, 2 (1999), 39--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C. Grigoras. 2005. Digital audio recording analysis--the electric network frequency criterion. International Journal of Speech Language and the Law 12, 1 (2005), 63-- 76.Google ScholarGoogle ScholarCross RefCross Ref
  21. C. Grigoras. 2007. Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis. Forensic Science International 167, 2 (2007), 136-- 145.Google ScholarGoogle ScholarCross RefCross Ref
  22. J. Guo, Y. Ye, Y. Zhang, Y. Lei, and Y. Liu. 2014. Events associated power system oscillations observation based on distribution-level phasor measurements. In T & D Conference and Exposition. IEEE, Chicago, IL, USA, 1--5.Google ScholarGoogle Scholar
  23. H. Kim and Y. Jeon and J. W. Yoon. 2017. Construction of a National Scale ENF Map using Online Multimedia Data. In ACM International Conference on Information and Knowledge Management, (CIKM) 2017. ACM, Singapore. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Hajj-Ahmad, R. Garg, and M. Wu. 2012. Instantaneous frequency estimation and localization for ENF signals. In Signal & Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012 Asia-Pacific. IEEE, Hollywood, CA, USA, 1--10.Google ScholarGoogle Scholar
  25. A. Hajj-Ahmad, R. Garg, and M. Wu. 2013. ENF based location classification of sensor recordings. In 2013 International Workshop on Information Forensics and Security, WIFS 2013, Guangzhou, China, November 18--21, 2013. IEEE, Guangzhou, China, 138--143.Google ScholarGoogle ScholarCross RefCross Ref
  26. A. Hajj-Ahmad, R. Garg, and M. Wu. 2015. ENF-based region-of-recording identification for media signals. IEEE Transactions on Information Forensics and Security 10, 6 (2015), 1125--1136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. Huijbregtse and Z. Geradts. 2009. Using the ENF criterion for determining the time of recording of short digital audio recordings. In International Workshop on Computational Forensics. Springer, Berlin, Heidelberg, 116--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. WhatsApp Inc. 2017. WhatsApp. (2017). https://www.whatsapp.com/Google ScholarGoogle Scholar
  29. O. Ojowu Jr, J. Karlsson, J. Li, and Y. Liu. 2012. ENF extraction from digital recordings using adaptive techniques and frequency tracking. IEEE Transactions on Information Forensics and Security 7, 4 (2012), 1330--1338. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. S. Karapantazis and F.-N. Pavlidou. 2009. VoIP: A comprehensive survey on a promising technology. Computer Networks 53, 12 (2009), 2050--2090. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. R. Kohavi et al. 1995. A study of cross-validation and bootstrap for accuracy estimation and model selection. In Ijcai, Vol. 14. 1137--1145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Krebs on Security. {n. d.}. Skype Now Hides Your Internet Address. https:// krebsonsecurity.com/2016/01/skype-now-hides-your-internet-address/. ({n. d.}). Online; January 2016.Google ScholarGoogle Scholar
  33. Y. Liu and Y. Ye. 2012. Monitoring power system disturbances based on distribution-level phasor measurements, In PES Innovative Smart Grid Technologies (ISGT). Innovative Smart Grid Technologies 00, 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Y. Liu, Z. Yuan, P. N. Markham, R. W. Conners, and Y. Liu. 2011. Wide-area frequency as a criterion for digital audio recording authentication. In Power and Energy Society General Meeting. IEEE, Detroit, MI, USA, 1--7.Google ScholarGoogle Scholar
  35. G. Y. Lu and D. W. Wong. 2008. An adaptive inverse-distance weighting spatial interpolation technique. Computers & Geosciences 34, 9 (2008), 1044--1055. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Mann, L. Cuccovillo, P. Aichroth, and C. Dittmar. 2013. Combining ENF Phase Discontinuity Checking and Temporal Pattern Matching for Audio Tampering Detection. In GI-Jahrestagung (LNI), Matthias Horbach (Ed.), Vol. 220. GI, 2917=-- 2927.Google ScholarGoogle Scholar
  37. D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker. 2008. Shining light in dark places: Understanding the Tor network. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, Berlin, Heidelberg, 63--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Y. Michalevsky, A. Schulman, G. A. Veerapandian, D. Boneh, and G. Nakibly. 2015. PowerSpy: Location Tracking Using Mobile Device Power Analysis. In USENIX Security. USENIX Association, Washington, D.C., 785--800. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. S. Narain, T. D. Vo-Huu, K. Block, and G. Noubir. 2016. Inferring User Routes and Locations using Zero-Permission Mobile Sensors. In Symposium on Security and Privacy (S&P). IEEE Computer Society, San Jose, CA, USA, 397--413.Google ScholarGoogle Scholar
  40. D. W. Oard, M. Wu, K. Kraus, A. Hajj-Ahmad, H. Su, and R. Garg. 2014. It's About Time: Projecting Temporal Metadata for Historically Significant Recordings. iConference 2014 Proceedings (2014).Google ScholarGoogle Scholar
  41. A. V. Oppenheim. 1999. Discrete-time signal processing. Pearson Education India. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. B. Porat. 1994. Digital Processing of Random Signals: Theory and Methods. (1994). Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. H. Su, R. Garg, A. Hajj-Ahmad, and M. Wu. 2013. ENF analysis on recaptured audio recordings. In International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE Signal Processing Socieity, Vancouver, BC, Canada, 3018--3022.Google ScholarGoogle Scholar
  44. H. Su, A. Hajj-Ahmad, M. Wu, and D. W. Oard. 2014. Exploring the use of ENF for multimedia synchronization. In International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE Signal Processing Society, Florence, Italy, 4613--4617.Google ScholarGoogle Scholar
  45. J. Tabrikian, S. Dubnov, and Y. Dickalov. 2004. Maximum a-posteriori probability pitch tracking in noisy environments using harmonic model. IEEE Transactions on Speech and Audio Processing 12, 1 (2004), 76--87.Google ScholarGoogle ScholarCross RefCross Ref
  46. Inc. Twitch Interactive. 2017. Twitch. (2017). https://www.twitch.tv/Google ScholarGoogle Scholar
  47. Twitch Tips. {n. d.}. Protecting Yourself Online. https://twitchtips.com/ protecting-yourself/. ({n. d.}). Online; 21 January 2016.Google ScholarGoogle Scholar
  48. Twitter. 2017. Watch LIVE. (2017). https://www.periscope.tv/Google ScholarGoogle Scholar
  49. T. Uhl. 2004. Quality of service in VoIP communication. AEU-International Journal of Electronics and Communications 58, 3 (2004), 178--182.Google ScholarGoogle ScholarCross RefCross Ref
  50. S.r.l. VisioRay. 2017. SkylineWebcams | Live Cams around the World! (2017). https://www.skylinewebcams.com/Google ScholarGoogle Scholar
  51. K. Vos. 2011. SILK Speech Codec. (2011). https://tools.ietf.org/html/ draft-vos-silk-02Google ScholarGoogle Scholar
  52. L. Wang, J. Burgett, J. Zuo, C. C. Xu, B. J. Billian, R. W. Conners, and Y. Liu. 2007. Frequency disturbance recorder design and developments. In Power Engineering Society General Meeting. IEEE, Tampa, FL, USA, 1--7.Google ScholarGoogle Scholar
  53. X. Wang, S. Chen, and S. Jajodia. 2005. Tracking anonymous peer-to-peer VoIP calls on the internet. In Proceedings of the 12th ACM conference on Computer and communications security. ACM, New York, NY, USA, 81--91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. 2008. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. In Symposium on Security and Privacy (sp 2008). 35--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. LLC YouTube. 2017. YouTube. (2017). https://www.youtube.com/Google ScholarGoogle Scholar
  56. Z. Zhong, C. Xu, B. J. Billian, L. Zhang, S. S. Tsai, R. W. Conners, V. A. Centeno, A. G. Phadke, and Y. Liu. 2005. Power system frequency monitoring network (FNET) implementation. IEEE Transactions on Power Systems 20, 4 (2005), 1914-- 1921.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. I'm Listening to your Location! Inferring User Location with Acoustic Side Channels.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      WWW '18: Proceedings of the 2018 World Wide Web Conference
      April 2018
      2000 pages
      ISBN:9781450356398

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      International World Wide Web Conferences Steering Committee

      Republic and Canton of Geneva, Switzerland

      Publication History

      • Published: 23 April 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      WWW '18 Paper Acceptance Rate170of1,155submissions,15%Overall Acceptance Rate1,899of8,196submissions,23%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format