{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:42:21Z","timestamp":1771980141633,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484775","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1900-1914","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED"],"prefix":"10.1145","author":[{"given":"Ben","family":"Nassi","sequence":"first","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]},{"given":"Yaron","family":"Pirutin","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]},{"given":"Tomer","family":"Galor","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]},{"given":"Boris","family":"Zadov","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Be'er Sheva, Israel"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Creative Pebble Speakers. https:\/\/us.creative.com\/p\/speakers\/creativepebble"},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Facts About Speech Intelligibility. https:\/\/www.dpamicrophones.com\/micuniversity\/facts-about-speech-intelligibility."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Google-home. https:\/\/store.google.com\/us\/product\/google_nest_mini?hl=en-US"},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. Intelligibility. https:\/\/en.wikipedia.org\/wiki\/Intelligibility_(communication)."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Logitech S-120. https:\/\/www.amazon.com\/Logitech-S120--2-0-Stereo-Speakers\/dp\/B000R9AAJA\/"},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. MIRACASE MHUB500 USB Hub Splitter. https:\/\/www.amazon.com\/TPLink-Portable-Ethernet-Notebooks-UE330\/dp\/B01N9M32TA\/"},{"key":"e_1_3_2_1_7_1","unstructured":"[n.d.]. MPU 6050 GY-521 3 Axis Gyro Accelerometer Sensor Module Arduino. http:\/\/xtcomp.co.za\/image\/catalog\/GY-521.pdf"},{"key":"e_1_3_2_1_8_1","unstructured":"[n.d.]. NI 9234 Datasheet. https:\/\/www.ni.com\/pdf\/manuals\/374238a_02.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"[n.d.]. PDA100A2. https:\/\/www.thorlabs.com\/thorproduct.cfm?partnumber=PDA100A2"},{"key":"e_1_3_2_1_10_1","unstructured":"[n.d.]. TP-Link UE330 USB. https:\/\/www.amazon.com\/TP-Link-Portable-Ethernet-Notebooks-UE330\/dp\/B01N9M32TA\/"},{"key":"e_1_3_2_1_11_1","unstructured":"[n.d.]. Winner Desktop Speakers. http:\/\/www.tonewinner.com\/english\/"},{"key":"e_1_3_2_1_12_1","volume-title":"International workshop on cryptographic hardware and embedded systems. Springer, 29--45","author":"Agrawal Dakshi","year":"2002","unstructured":"Dakshi Agrawal, Bruce Archambeault, Josyula R Rao, and Pankaj Rohatgi. 2002. The EM side-channel (s). In International workshop on cryptographic hardware and embedded systems. Springer, 29--45."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00004"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24076"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.20"},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security symposium","volume":"10","author":"Backes Michael","year":"2010","unstructured":"Michael Backes, Markus D\u00fcrmuth, Sebastian Gerling, Manfred Pinkal, and Caroline Sporleder. 2010. Acoustic Side-Channel Attacks on Printers.. In USENIX Security symposium, Vol. 10. 307--322."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.25"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.28"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2013.6678486"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243802"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417241"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Abe Davis Michael Rubinstein NealWadhwa Gautham J Mysore Fr\u00e9do Durand and William T Freeman. 2014. The visual microphone: passive recovery of sound from video. (2014).","DOI":"10.1145\/2601097.2601119"},{"key":"e_1_3_2_1_25_1","first-page":"76","article-title":"Tempest: A signal problem","volume":"35","author":"Friedman Jeffrey","year":"1972","unstructured":"Jeffrey Friedman. 1972. Tempest: A signal problem. NSA Cryptologic Spectrum 35 (1972), 76.","journal-title":"NSA Cryptologic Spectrum"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/648254.752700"},{"key":"e_1_3_2_1_27_1","first-page":"27403","article-title":"DARPA TIMIT acoustic-phonetic continous speech corpus CD-ROM. NIST speech disc 1--1.1","volume":"93","author":"Garofolo John S","year":"1993","unstructured":"John S Garofolo, Lori F Lamel, William M Fisher, Jonathan G Fiscus, and David S Pallett. 1993. DARPA TIMIT acoustic-phonetic continous speech corpus CD-ROM. NIST speech disc 1--1.1. STIN 93 (1993), 27403.","journal-title":"STIN"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00074"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_1_30_1","volume-title":"Leaky noise: New side-channel attack vectors in mixed-signal IoT devices. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Gnad Dennis RE","year":"2019","unstructured":"Dennis RE Gnad, Jonas Krautter, and Mehdi B Tahoori. 2019. Leaky noise: New side-channel attack vectors in mixed-signal IoT devices. IACR Transactions on Cryptographic Hardware and Embedded Systems (2019), 305--339."},{"key":"e_1_3_2_1_31_1","unstructured":"Fran\u00e7ois Grondin A Vakili and L Demers. 2014. Guitar Pitch Shifter. http:\/\/www.guitarpitchshifter.com\/about.html."},{"key":"e_1_3_2_1_32_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Guri Mordechai","year":"2017","unstructured":"Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici. 2017. SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit. In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/guri"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00118"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514196"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_8"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978323"},{"key":"e_1_3_2_1_37_1","first-page":"455","article-title":"Speech bandwidth extension method and apparatus","volume":"5","author":"Iyengar Vasu","year":"1995","unstructured":"Vasu Iyengar, Rafi Rabipour, Paul Mermelstein, and Brian R Shelton. 1995. Speech bandwidth extension method and apparatus. US Patent 5,455,888.","journal-title":"US Patent"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(03)00082-3"},{"key":"e_1_3_2_1_39_1","article-title":"Luminous Intensity of an LED as a Function of Input Power","volume":"2","author":"King Sean","year":"2008","unstructured":"Sean King. 2008. Luminous Intensity of an LED as a Function of Input Power. ISB J. Phys 2, 2 (2008), Paper--number.","journal-title":"ISB J. Phys"},{"key":"e_1_3_2_1_40_1","volume-title":"Annual international cryptology conference","author":"Kocher Paul","unstructured":"Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Annual international cryptology conference. Springer, 388--397."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004358"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00008"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MP.2005.1549751"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462588"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813668"},{"key":"e_1_3_2_1_47_1","volume-title":"Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. arXiv preprint arXiv:2011.09877","author":"Liu Zhuoran","year":"2020","unstructured":"Zhuoran Liu, Niels Samwel, L\u00e9o Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, and Martha Larson. 2020. Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. arXiv preprint arXiv:2011.09877 (2020)."},{"key":"e_1_3_2_1_48_1","volume-title":"Optical TEMPEST. In 2018 International Symposium on Electromagnetic Compatibility (EMC EUROPE). IEEE, 172--177","author":"Loughry Joe","year":"2018","unstructured":"Joe Loughry. 2018. Optical TEMPEST. In 2018 International Symposium on Electromagnetic Compatibility (EMC EUROPE). IEEE, 172--177."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545189"},{"key":"e_1_3_2_1_50_1","volume-title":"Power analysis attacks: Revealing the secrets of smart cards","author":"Mangard Stefan","unstructured":"Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2008. Power analysis attacks: Revealing the secrets of smart cards. Vol. 31. Springer Science & Business Media."},{"key":"e_1_3_2_1_51_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 1053--1067. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/michalevsky"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 5th USENIX conference on Offensive technologies. 6--6.","author":"Mowery Keaton","year":"2011","unstructured":"Keaton Mowery, Sarah Meiklejohn, and Stefan Savage. 2011. Heat of the moment: Characterizing the efficacy of thermal camera-based attacks. In Proceedings of the 5th USENIX conference on Offensive technologies. 6--6."},{"key":"e_1_3_2_1_53_1","first-page":"412","article-title":"Laser microphone","volume":"4","author":"Muscatell Ralph P","year":"1983","unstructured":"Ralph P Muscatell. 1983. Laser microphone. US Patent 4,412,105.","journal-title":"US Patent"},{"key":"e_1_3_2_1_54_1","unstructured":"Ben Nassi Yaron Pirutin Adi Shamir Yuval Elovici and Boris Zadov. [n.d.]. Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations. Technical Report. Cryptology ePrint Archive."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2118206"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2199110"},{"key":"e_1_3_2_1_57_1","volume-title":"Thomas Pinkney Barnwell, and Mark A Clements","author":"Quackenbush Schuyler R","year":"1988","unstructured":"Schuyler R Quackenbush, Thomas Pinkney Barnwell, and Mark A Clements. 1988. Objective measures of speech quality. Prentice Hall."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45418-7_17"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.16"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906415"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430781"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660360"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978300"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2114881"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.06.066"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","unstructured":"G. Wang Y. Zou Z. Zhou K. Wu and L. M. Ni. 2016. We Can Hear You with Wi-Fi! IEEE Transactions on Mobile Computing 15 11 (Nov 2016) 2907--2920. https:\/\/doi.org\/10.1109\/TMC.2016.2517630","DOI":"10.1109\/TMC.2016.2517630"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790119"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516709"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660288"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742658"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484775","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:46Z","timestamp":1763499046000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484775"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":74,"alternative-id":["10.1145\/3460120.3484775","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484775","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}