{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T19:53:05Z","timestamp":1775850785430,"version":"3.50.1"},"reference-count":91,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2019,9,9]]},"abstract":"<jats:p>Modern Internet-enabled smart lights promise energy efficiency and many additional capabilities over traditional lamps. However, these connected lights also create a new attack surface, which can be maliciously used to violate users' privacy and security. In this paper, we design and evaluate novel attacks that take advantage of light emitted by modern smart bulbs, in order to infer users' private data and preferences. The first two attacks are designed to infer users' audio and video playback by a systematic observation and analysis of the multimedia-visualization functionality of smart light bulbs. The third attack utilizes the infrared capabilities of such smart light bulbs to create a covert-channel, which can be used as a gateway to exfiltrate user's private data out of their secured home or office network. A comprehensive evaluation of these attacks in various real-life settings confirms their feasibility and affirms the need for new privacy protection mechanisms.<\/jats:p>","DOI":"10.1145\/3351256","type":"journal-article","created":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T15:58:26Z","timestamp":1568131106000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Light Ears"],"prefix":"10.1145","volume":"3","author":[{"given":"Anindya","family":"Maiti","sequence":"first","affiliation":[{"name":"Institute for Cyber Security, University of Texas at San Antonio, San Antonio, Texas, USA"}]},{"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Texas at San Antonio, San Antonio, Texas, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Building a LIFX Packet. https:\/\/lan.developer.lifx.com\/docs\/building-a-lifx-packet. Online","year":"2018"},{"key":"e_1_2_1_2_1","volume-title":"Healthcare, Defense, Private Data Networks, and Other Applications: Global Industry Perspective, Comprehensive Analysis and Forecast","year":"2016"},{"key":"e_1_2_1_3_1","volume-title":"d.}. Go Direct Light and Color Sensor User Manual - Vernier. https:\/\/www.vernier.com\/files\/manuals\/gdx-lc\/gdx-lc.pdf. Online","year":"2018"},{"key":"e_1_2_1_4_1","volume-title":"d.}. hueDynamic. https:\/\/www.huedynamic.com. Online","year":"2018"},{"key":"e_1_2_1_5_1","volume-title":"d.}. IFTTT. https:\/\/ifttt.com. Online","year":"2018"},{"key":"e_1_2_1_6_1","volume-title":"d.}. LIFX Color A19. https:\/\/www.lifx.com\/products\/lifx-e26. Online","year":"2018"},{"key":"e_1_2_1_7_1","volume-title":"d.}. LIFX Tile Kit. https:\/\/www.lifx.com\/products\/lifx-tile. Online","year":"2018"},{"key":"e_1_2_1_8_1","volume-title":"d.}. Light DJ. https:\/\/lightdjapp.com. Online","year":"2018"},{"key":"e_1_2_1_9_1","volume-title":"d.}. Nanoleaf. https:\/\/nanoleaf.me. Online","year":"2018"},{"key":"e_1_2_1_10_1","volume-title":"d.}. Netflix. https:\/\/www.netflix.com\/. Online","year":"2018"},{"key":"e_1_2_1_11_1","volume-title":"Death & Robots'. https:\/\/techcrunch.com\/2019\/03\/19\/love-death-robots-experiment. Online","year":"2019"},{"key":"e_1_2_1_12_1","volume-title":"d.}. Phillips Hue. https:\/\/www.meethue.com. Online","year":"2018"},{"key":"e_1_2_1_13_1","volume-title":"d.}. Smart home devices and controllers wholesale unit sales in the United States from 2014 to","year":"2017"},{"key":"e_1_2_1_14_1","volume-title":"d.}. Stringify. https:\/\/www.stringify.com. Online","year":"2018"},{"key":"e_1_2_1_15_1","unstructured":"{n.d.}. TSOP48 Product Information. http:\/\/www.vishay.com\/product?docid=82459. Online; accessed 2018-10-30.  {n.d.}. TSOP48 Product Information. http:\/\/www.vishay.com\/product?docid=82459. Online; accessed 2018-10-30."},{"key":"e_1_2_1_16_1","volume-title":"d.}. Worldwide intelligent lighting controls market size from 2016 to","year":"2023"},{"key":"e_1_2_1_17_1","unstructured":"{n. d.}. Zigbee Light Link. http:\/\/www.zigbee.org\/zigbee-for-developers\/applicationstandards\/zigbee-light-link. Online; accessed 2018-10-30.  {n. d.}. Zigbee Light Link. http:\/\/www.zigbee.org\/zigbee-for-developers\/applicationstandards\/zigbee-light-link. Online; accessed 2018-10-30."},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Dakshi Agrawal Bruce Archambeault Josyula R Rao and Pankaj Rohatgi. 2002. The EM Side-channel(s). In Cryptographic Hardware and Embedded Systems.   Dakshi Agrawal Bruce Archambeault Josyula R Rao and Pankaj Rohatgi. 2002. The EM Side-channel(s). In Cryptographic Hardware and Embedded Systems.","DOI":"10.1007\/3-540-36400-5_4"},{"key":"e_1_2_1_19_1","volume-title":"Privacy threats through ultrasonic side channels on mobile devices","author":"Arp Daniel"},{"key":"e_1_2_1_20_1","volume-title":"Keyboard Acoustic Emanations","author":"Asonov Dmitri"},{"key":"e_1_2_1_21_1","volume-title":"Multilevel amplitude shift keying in dispersion uncompensated optical systems. OptoElectronics 153, 3","author":"Avlonitis N","year":"2006"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.20"},{"key":"e_1_2_1_23_1","volume-title":"Acoustic Side-Channel Attacks on Printers. In USENIX Security Symposium.","author":"Backes Michael","year":"2010"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.25"},{"key":"e_1_2_1_25_1","volume-title":"Sniffing Keystrokes with Lasers\/Voltmeters. Black Hat USA","author":"Barisani Andrea","year":"2009"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.60"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1513601.1513604"},{"key":"e_1_2_1_29_1","volume-title":"TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. HotSec 11","author":"Cai Liang","year":"2011"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053005"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601097.2601119"},{"key":"e_1_2_1_32_1","volume-title":"USENIX Workshop on Offensive Technologies.","author":"Deshotels Luke","year":"2014"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815317.2815342"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"e_1_2_1_35_1","volume-title":"When AES blinks: introducing optical side channel. IET Information Security 2, 3","author":"Ferrigno Julie","year":"2008"},{"key":"e_1_2_1_36_1","volume-title":"Tempest: A Signal Problem. NSA Cryptologic Spectrum","author":"Friedman Jeffrey","year":"1972"},{"key":"e_1_2_1_37_1","volume-title":"An occupancy problem. The American Statistician 23, 2","author":"Gittelsohn Alan M","year":"1969"},{"key":"e_1_2_1_38_1","volume-title":"aIR-Jumper: Covert Air-Gap Exfiltration\/Infiltration via Security Cameras & Infrared (IR). arXiv preprint arXiv:1709.05742","author":"Guri Mordechai","year":"2017"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906933"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_6"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055088"},{"key":"e_1_2_1_42_1","volume-title":"Effects of four psychological primary colors on anxiety state. Perceptual and Motor Skills 41, 1","author":"Jacobs Keith W","year":"1975"},{"key":"e_1_2_1_43_1","volume-title":"Theory of brightness and color contrast in human vision. Vision Research 4, 1","author":"Jameson Dorothea","year":"1964"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501972"},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","volume-title":"Leveraging Wearables for Steering and Driver Tracking","author":"Karatas Cagdas","DOI":"10.1109\/INFOCOM.2016.7524544"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_2_1_47_1","series-title":"Lecture Notes in Computer Science.","volume-title":"Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. In Information Hiding","author":"Kuhn Markus G","year":"1998"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.47"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813668"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545189"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897905"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212498"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2802083.2808397"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2794984"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428065"},{"key":"e_1_2_1_57_1","volume-title":"USENIX Security Symposium.","author":"Michalevsky Yan","year":"2014"},{"key":"e_1_2_1_58_1","volume-title":"PowerSpy: Location Tracking Using Mobile Device Power Analysis. In USENIX Security Symposium.","author":"Michalevsky Yan","year":"2015"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2014.2314358"},{"key":"e_1_2_1_60_1","volume-title":"Information retrieval for music and motion","author":"M\u00fcller Meinard"},{"key":"e_1_2_1_61_1","first-page":"317","article-title":"Voice monitoring system using laser beam","volume":"6","author":"Nakao Masashi","year":"2001","journal-title":"US Patent"},{"key":"e_1_2_1_62_1","volume-title":"Kenneth Block, and Guevara Noubir","author":"Narain Sashank","year":"2016"},{"key":"e_1_2_1_63_1","first-page":"245","article-title":"Directional microphone","volume":"7","author":"Niederdraenk Torsten","year":"2007","journal-title":"US Patent"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804253"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.942280"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.1999.832349"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.5555\/646803.705980"},{"key":"e_1_2_1_68_1","volume-title":"Extended functionality attacks on IoT devices: The case of smart lights","author":"Ronen Eyal"},{"key":"e_1_2_1_69_1","volume-title":"The arrangement of the three cone classes in the living human eye. Nature 397, 6719","author":"Roorda Austin","year":"1999"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.19-14-06145.1999"},{"key":"e_1_2_1_71_1","volume-title":"IEEE recommended practice for speech quality measurements","author":"Rothauser EH","year":"1969"},{"key":"e_1_2_1_72_1","volume-title":"Ripple: Communicating through physical vibration. In USENIX NSDI.","author":"Roy Nirupam","year":"2015"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906415"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2693430"},{"key":"e_1_2_1_75_1","unstructured":"SC Magazine UK. 2014. Light-based printer attack overcomes air-gapped computer security. (2014).  SC Magazine UK. 2014. Light-based printer attack overcomes air-gapped computer security. (2014)."},{"key":"e_1_2_1_76_1","unstructured":"Klaus Warner Schaie and Robert Heiss. 1964. Color and Personality. (1964).  Klaus Warner Schaie and Robert Heiss. 1964. Color and Personality. (1964)."},{"key":"e_1_2_1_77_1","volume-title":"Identifying TV channels & on-demand videos using ambient light sensors. Pervasive and Mobile Computing","author":"Schwittmann Lorenz","year":"2016"},{"key":"e_1_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Lorenz Schwittmann Viktor Matkovic Torben Weis etal 2016. Video recognition using ambient light sensors. In IEEE PerCom.  Lorenz Schwittmann Viktor Matkovic Torben Weis et al. 2016. Video recognition using ambient light sensors. In IEEE PerCom.","DOI":"10.1109\/PERCOM.2016.7456511"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90157-O"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"e_1_2_1_81_1","unstructured":"Martin Vuagnoux and Sylvain Pasini. 2009. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. In USENIX Security.   Martin Vuagnoux and Sylvain Pasini. 2009. Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. In USENIX Security."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897847"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790119"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2009.08.005"},{"key":"e_1_2_1_86_1","volume-title":"Amplitude shift keying. Encyclopedia of RF and Microwave Engineering","author":"Xiong Fuqin","year":"2005"},{"key":"e_1_2_1_87_1","volume-title":"Differences in media preference mediate the link between personality and political orientation. Political Psychology 38, 1","author":"Xu Xiaowen","year":"2017"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660358"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742658"},{"key":"e_1_2_1_91_1","volume-title":"IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals. arXiv preprint arXiv.1801.03218","author":"Zhou Zheng","year":"2018"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:51Z","timestamp":1750206351000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351256"}},"subtitle":["Information Leakage via Smart Lights"],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":91,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9,9]]}},"alternative-id":["10.1145\/3351256"],"URL":"https:\/\/doi.org\/10.1145\/3351256","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}