Phone snooping via gyroscope to be detailed at Usenix

Aug 15, 2014 by Nancy Owano weblog
Experimental setup

Put aside fears of phone microphones and cameras doing eavesdropping mischief for a moment, because there is another sensor that has been flagged. Researchers from Stanford and defense research group at Rafael will present their findings on the smartphones' gyroscopes to measure acoustic signals in the vicinity of the phone at the Usenix Security on Friday, August 22. Translation: Your smartphone could eavesdrop on conversations. They found that the gyroscopes were sensitive enough to allow them to pick up some sound waves, turning them into crude microphones, said a detailed report by Andy Greenberg this week about their work, in Wired. The team themselves said their work demonstrated "an unexpected threat resulting from the unmitigated access to the gyro: applications and active web content running on the phone can eavesdrop sound signals, including speech, in the vicinity of the phone."

What is more, in a video the researchers prepared for the upcoming Usenix event, Recognizing Speech from Gyroscope Signals, they said, gyroscopes are present in most of the modern smartphones. They measure angular velocity. Every application and website can access them without the user's consent. "We show that we can use gyroscopes to eavesdrop on speech without using the microphone at all, which can potentially risk private information such as identity, social security and ."

But how well does the researchers' snooping technique work? "It works just well enough to pick up a fraction of the words spoken near a phone," said Greenberg.

The team, in their paper, "Gyrophone: Recognizing Speech From Gyroscope Signals," wrote, "We show that the acoustic signal measured by the can reveal about the phone's environment such as who is speaking in the room and, to some extent, what is being said. We use signal processing and machine learning to analyze speech from very low frequency samples. With further work on low-frequency signal processing of this type it should be possible to further increase the quality of the information extracted from the gyro." As one cannot fully reconstruct a comprehensible speech from measurements of a single gyroscope, they stated, they resorted to . They extracted features from the gyroscope measurements using various methods and train machine learning algorithms for recognition.

This video is not supported by your browser at this time.

"We achieve about 50% success rate for speaker identification from a set of 10 speakers. We also show that while limiting ourselves to a small vocabulary consisting solely of digit pronunciations ("one","two", "three", ...) and achieve recognition success rate of 65% for the speaker dependent case and up to 26% recognition rate for the speaker independent case."

According to Wired, Dan Boneh, computer security professor at Stanford and part of the team, said, "Whenever you grant anyone access to sensors on a device, you're going to have unintended consequences." The authors wrote in their paper, "A general conclusion we suggest following this work is that access to all sensors should be controlled by the permissions framework, possibly differentiating between low and high sampling rates."

Explore further: New Chinese law to boost cyber security


Related Stories

Bionic speech recognition

Sep 09, 2010

As speech recognition systems become more commonplace - on the computer desktop top, at the call centre and even in the car - it is increasingly important to ensure that the voice signal is as clear as possible before it ...

Recommended for you

New Chinese law to boost cyber security

5 hours ago

China on Wednesday passed sweeping new legislation reinforcing government controls over cyberspace in the wake of what it describes as growing threats to Chinese networks and national security.

Feds shut down background check database over flaw

Jun 29, 2015

The federal personnel agency whose records were plundered by hackers linked to China announced on Monday the temporary shutdown of a massive database used to update and store background investigation records ...

US spy chief says China 'leading suspect' in hack

Jun 25, 2015

The head of US intelligence said Thursday that China is "the leading suspect" in a massive data breach of Washington's government personnel files, but that an investigation is ongoing.

IT failure may have triggered Polish airline meltdown

Jun 24, 2015

An IT failure may have triggered a computer systems meltdown at Polish flagship carrier LOT that grounded more than 1,400 passengers at Warsaw's Frederic Chopin Airport at the weekend, Polish prosecutors ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.