More

PC conflicts

None

Submitted

[PDF] Submission 12 Aug 2017 12:07:20am EDT · 4c289a835e9b50b812d671ef47b61db6ac3caee3ecea90c5b87cb462467d17594c289a83

Electrical network frequency (ENF) signals have common patterns that can be used as signatures for identifying recorded time and location of videos and sound. To enable cost-efficient, reliable and scalable location inference, we created a reference map of ENF signals representing hundreds of locations world wide -- extracting real-world ENF signals from online multimedia streaming services (e.g., YouTube and Explore). Based on this reference map of ENF signals, we propose a novel side-channel attack that can identify the physical location of where a target video or sound was recorded or streamed from. Our attack does not require any expensive ENF signal receiver nor any software to be installed on a victim's device -- all we need is the recorded video or sound file to perform the attack. The evaluation results show that our attack can infer the location of the recorded audio files with an accuracy of $76$\% when those files are $5$ minutes or longer. We also showed that our proposed attack works even when video and audio data are distorted through the use of anonymous networks like Tor.
Y. Jeon, M. Kim, H. Kim, H. Kim, J. Huh, J. Yoon [details]

Youngbae Jeon (School of Information Security, Korea University) <jyb9443@korea.ac.kr>

Minchul Kim (Korea University) <k.minchul95@gmail.com>

Hyunsoo Kim (School of Information Security, Korea University) <aitch25@naver.com>

Hyoungshick Kim (Sungkyunkwan University) <hyoung@skku.edu>

Jun Ho Huh (Software R&D Center, Samsung Electronics) <junho.huh@samsung.com>

Ji Won Yoon (School of Information Security, Korea University) <jiwon_yoon@korea.ac.kr>

Privacy and anonymity technologies

Options
✓ Student paper

To edit this submission, sign in using your email and password.
OveMerRelRanRevExpWriQua
Review #308A2313
Review #308B3222
Review #308C2233
Review #308D3322