资源描述:
《Watching_the_Watchers-Automatically_Inferring_TV_Content_from_Outdoor_Light_Effusions》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、WatchingtheWatchers:AutomaticallyInferringTVContentFromOutdoorLightEffusionsYiXu,Jan-MichaelFrahmandFabianMonroseDepartmentofComputerScience,UniversityofNorthCarolinaatChapelHillChapelHill,NorthCarolina,USA{yix,jmf,fabian}@cs.unc.eduABSTRACTrecentyears(e.g.,phone,tablet
2、andcomputerviewinghabitshavesteadilyincreased),nearlyeveryU.S.homestillownsatleastoneTheflickeringlightsofcontentplayingonTVscreensinourlivingTVand67%ofAmericansregularlywatchtelevisionwhilehav-roomsareanalltoofamiliarsightatnight—andonethatmanyingdinner[6].Theflickeringl
3、ightsofthescenesthatplayoutonofushavepaidlittleattentiontowithregardstotheamountofin-theseTVsareeasytoseewhenonewalksthroughthestreetatformationthesediffusionsmayleaktoaninquisitiveoutsider.Innights.Yet,manyofusmaynothavegivenasecondthoughttothethispaper,weintroduceanat
4、tackthatexploitstheemanationsofamountofinformationtheseflickeringpatterns(causedbychangeschangesinlight(e.g.,asseenthroughthewindowsandrecordedinbrightness)mightrevealabouttheprogramswewatch.over70metersaway)torevealtheprogramswewatch.Ourempir-Ourfindings,however,suggestt
5、hatthesecompromisingemis-icalresultsshowthattheattackissurprisinglyrobusttoavarietyofsionsofchangesofbrightnessprovideampleopportunitytocon-noisesignalsthatoccurinreal-worldsituations,andmoreover,canfirmwhatspecificcontentisbeingwatchedonaremoteTVscreen,successfullyidenti
6、fythecontentbeingwatchedamongareferenceevenfromgreatdistancesoutsidethehome.Thekeyintuitionbe-libraryoftensofthousandsofvideoswithinseveralseconds.Thehindwhythisthreattoprivacyispossibleliesinthefactthatmuchrobustnessandefficiencyoftheattackcanbeattributedtotheuseoftheco
7、ntentwewatchinducesflickeringpatternsthatuniquelyofnovelfeaturesetsandanelegantonlinealgorithmforperformingidentifyaparticularbroadcastonceasuitableamountoflightemis-index-basedmatches.sions(i.e.,ontheorderofafewminutes)hasbeenrecordedbyCategoriesandSubjectDescriptors:K.
8、4.1[ComputersandSo-theadversary.Thissurprisinglyeffectiveattackhassignificantpri-ciety]:Privacyvacyimplications