PC conflicts



[PDF] Submission 12 Aug 2017 12:07:20am EDT · 4c289a835e9b50b812d671ef47b61db6ac3caee3ecea90c5b87cb462467d1759

Electrical network frequency (ENF) signals have common patterns that can be used as signatures for identifying recorded time and location of videos and sound. To enable cost-efficient, reliable and scalable location inference, we created a reference map of ENF signals representing hundreds of locations world wide -- extracting real-world ENF signals from online multimedia streaming services (e.g., YouTube and Explore). Based on this reference map of ENF signals, we propose a novel side-channel attack that can identify the physical location of where a target video or sound was recorded or streamed from. Our attack does not require any expensive ENF signal receiver nor any software to be installed on a victim's device -- all we need is the recorded video or sound file to perform the attack. The evaluation results show that our attack can infer the location of the recorded audio files with an accuracy of $76$\% when those files are $5$ minutes or longer. We also showed that our proposed attack works even when video and audio data are distorted through the use of anonymous networks like Tor.
Y. Jeon, M. Kim, H. Kim, H. Kim, J. Huh, J. Yoon [details]

Youngbae Jeon (School of Information Security, Korea University) <>

Minchul Kim (Korea University) <>

Hyunsoo Kim (School of Information Security, Korea University) <>

Hyoungshick Kim (Sungkyunkwan University) <>

Jun Ho Huh (Software R&D Center, Samsung Electronics) <>

Ji Won Yoon (School of Information Security, Korea University) <>

Privacy and anonymity technologies

✓ Student paper

To edit this submission, sign in using your email and password.
Review #308A2313
Review #308B3222