{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:20:55Z","timestamp":1758846055910,"version":"3.44.0"},"reference-count":69,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["No. 62172277?62072304"],"award-info":[{"award-number":["No. 62172277?62072304"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shanghai East Talents Program","award":["No. 177"],"award-info":[{"award-number":["No. 177"]}]},{"name":"Seed Funding for Collaborative Research Grants of HKBU","award":["No. RC-SFCRG\/23-24\/R2\/SCI\/06"],"award-info":[{"award-number":["No. RC-SFCRG\/23-24\/R2\/SCI\/06"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2025,9,3]]},"abstract":"<jats:p>When sound signals are transmitted via audio cables in form of current signals, detectable electromagnetic leakage is emitted around the cables, which could reveal the sound content being transmitted. This paper presents a sound eavesdropping system, EMTap, which senses electromagnetic variation around audio cables leveraging an RFID tag attached to an audio cable for sound content recovery. In some audiovisual scenarios with audio cables, such as offices and meeting rooms, it is assumed that attackers secretly attach a small, battery-free RFID tag to an audio cable without being noticed. Meanwhile, RFID readers are camouflaged as decorations\/public facilities placed in\/out of rooms to transmit and receive RF signals. When the sound signals are transmitted via audio cables, EMTap first activates the RFID tag to capture the electromagnetic variation patterns around audio cables upon RF signals. Then, EMTap reconstructs sound spectrograms from RF signal-based electromagnetic variation patterns utilizing a designed cross-modal Generative model, Nonlinear Stable Diffusion Model (NSDM). Finally, EMTap converts the sound spectrograms to sound content through sound recognition API. Extensive experiments demonstrate that EMTap achieves an average Mel-Cepstral Distortion (MCD) of 5.49 and Word Error Rate (WER) of 16.19% for eavesdropping on sound transmitted via audio cables.<\/jats:p>","DOI":"10.1145\/3749459","type":"journal-article","created":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T17:15:45Z","timestamp":1756919745000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["EMTap: Eavesdropping on Sound Transmitted via Audio Cables by Sensing Electromagnetic Variation Using RFID"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2389-4188","authenticated-orcid":false,"given":"Yunzhong","family":"Chen","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0207-9643","authenticated-orcid":false,"given":"Jiadi","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0871-9795","authenticated-orcid":false,"given":"Hao","family":"Kong","sequence":"additional","affiliation":[{"name":"Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3812-1225","authenticated-orcid":false,"given":"Daqiang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Easun Technology Co., Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6406-4992","authenticated-orcid":false,"given":"Yanmin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6165-4196","authenticated-orcid":false,"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[{"name":"Hong Kong Baptist University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0782-4953","authenticated-orcid":false,"given":"Yi-Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9266-3044","authenticated-orcid":false,"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,9,3]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Robert A Adams and Christopher Essex. 2018. Calculus: a complete course. Pearson."},{"key":"e_1_2_1_2_1","volume-title":"Audio Engineering Society Convention.","author":"Ajemian Ronald G","year":"2007","unstructured":"Ronald G Ajemian. 2007. A Tutorial: Fiber Optic Cables and Connectors for Pro-Audio. In Audio Engineering Society Convention."},{"key":"e_1_2_1_3_1","unstructured":"Andre-Marie Ampere. 1826. Theorie des phenomenes electro-dynamiques uniquement deduite del experience. Mequignon-Marvis."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24076"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833568"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1979.1163209"},{"key":"e_1_2_1_7_1","volume-title":"Signal-to-noise ratios, performance criteria, and transformations. 30, 1","author":"Box George","year":"1988","unstructured":"George Box. 1988. Signal-to-noise ratios, performance criteria, and transformations. 30, 1 (1988), 1--17."},{"key":"e_1_2_1_8_1","unstructured":"BUGHUNTER. 2023. Microphone jammer BugHunter DAudio bda-3 Voices with 7 ultrasonic transducers. [Online]. Available: https:\/\/www.amazon.com\/BDA-3-Control-Microphone-Suppressor-Recording\/dp\/B089WH2B9F."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228943"},{"volume-title":"RFID and the Internet of Things","author":"Chabanne Herve","key":"e_1_2_1_10_1","unstructured":"Herve Chabanne, Pascal Urien, and Jean-Ferdinand Susini. 2011. RFID and the Internet of Things. Wiley Online Library."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23240"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643832.3661887"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3501334"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON55815.2022.9918573"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00296-0"},{"volume-title":"Electromagnetic transients in power cables","author":"Da Silva Filipe Faria","key":"e_1_2_1_16_1","unstructured":"Filipe Faria Da Silva and Claus Leth Bak. 2013. Electromagnetic transients in power cables. Springer."},{"key":"e_1_2_1_17_1","unstructured":"M Dobhn Daniel et al. 2008. The rf in rfid passive uhf rfid in practice. In Elsevier."},{"key":"e_1_2_1_18_1","unstructured":"Mehul Reuben Das. 2024. Smart home devices a privacy nightmare Amazon Alexa Google Home worst offenders finds study. [Online]. Available: https:\/\/www.firstpost.com\/tech\/smart-home-devices-a-privacy-nightmare-amazon-alexa-google-home-worst-offenders-finds-study-13783175.html."},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of IEEE SoftCOM'10","author":"Degauque Pierre","year":"2010","unstructured":"Pierre Degauque, Pierre Laly, Virginie Degardin, and Martine Lienard. 2010. Power line communication and compromising radiated emission. In Proceedings of IEEE SoftCOM'10. Dalmatia, Croatia."},{"key":"e_1_2_1_20_1","unstructured":"Philippa Demonte. 2019. HARVARD speech corpus-audio recording. (2019)."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.830985"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1098\/rstl.1832.0006"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1049\/ji-3-2.1946.0074"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1159\/000260020"},{"key":"e_1_2_1_25_1","first-page":"1","article-title":"Defining structural similarity","volume":"6","author":"Gentner Dedre","year":"2006","unstructured":"Dedre Gentner and Arthur B Markman. 2006. Defining structural similarity. The Journal of Cognitive Science 6, 1 (2006), 1--20.","journal-title":"The Journal of Cognitive Science"},{"key":"e_1_2_1_26_1","unstructured":"google cloud. 2023. Cloud speech-to-text documentation. [Online]. Available: https:\/\/cloud.google.com\/speech-to-text."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1984.1164317"},{"volume-title":"Introduction to Electrodynamics","author":"Griffiths David J.","key":"e_1_2_1_28_1","unstructured":"David J. Griffiths. 2017. Introduction to Electrodynamics. Cambridge University Press."},{"volume-title":"The Art of Electronics","author":"Horowitz Paul","key":"e_1_2_1_29_1","unstructured":"Paul Horowitz and Winfield Hill. 1989. The Art of Electronics. Cambridge University Press."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of IEEE S&P'22","author":"Hu Pengfei","year":"2023","unstructured":"Pengfei Hu, Wenhao Li, Riccardo Spolaor, and Xiuzhen Cheng. 2023. mmecho: A mmwave-based acoustic eavesdropping method. In Proceedings of IEEE S&P'22. Delft, Netherlands."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796940"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833716"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"e_1_2_1_34_1","volume-title":"Auto-Encoding Variational Bayes. arXiv preprint arXiv:1312.6114","author":"Kingma Diederik P","year":"2013","unstructured":"Diederik P Kingma and Max Welling. 2013. Auto-Encoding Variational Bayes. arXiv preprint arXiv:1312.6114 (2013)."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538926"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737592"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2963152"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538921"},{"key":"e_1_2_1_39_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3397320","article-title":"Vocallock: Sensing vocal tract for passphrase-independent user authentication leveraging acoustic signals on smartphones","volume":"4","author":"Lu Li","year":"2020","unstructured":"Li Lu, Jiadi Yu, Yingying Chen, and Yan Wang. 2020. Vocallock: Sensing vocal tract for passphrase-independent user authentication leveraging acoustic signals on smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) 4, 2 (2020), 1--24.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)"},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of USENIX'14","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing speech from gyroscope signals. In Proceedings of USENIX'14. San Diego, USA."},{"key":"e_1_2_1_41_1","volume-title":"Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784","author":"Mirza Mehdi","year":"2014","unstructured":"Mehdi Mirza and Simon Osindero. 2014. Conditional generative adversarial nets. arXiv preprint arXiv:1411.1784 (2014)."},{"key":"e_1_2_1_42_1","first-page":"17","article-title":"Operation IVY BELLS: Lessons learned from an 'intelligence success","volume":"20","author":"Morris Caitlin","year":"2012","unstructured":"Caitlin Morris. 2012. Operation IVY BELLS: Lessons learned from an 'intelligence success'. Journal of the Australian Institute of Professional Intelligence Officers 20, 3 (2012), 17--29.","journal-title":"Journal of the Australian Institute of Professional Intelligence Officers"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2012.2184255"},{"key":"e_1_2_1_44_1","volume-title":"The nsa playset: Rf retroreflectors. DEF CON 22, 8","author":"Ossmann Michael","year":"2014","unstructured":"Michael Ossmann. 2014. The nsa playset: Rf retroreflectors. DEF CON 22, 8 (2014)."},{"key":"e_1_2_1_45_1","unstructured":"Paul Reuvers and Marc Simons. 2015. The Great Seal Bug. [Online]. Available: https:\/\/cryptomuseum.com\/covert\/bugs\/thing\/index.htm."},{"key":"e_1_2_1_46_1","unstructured":"rfidhy. 2022. The Smallest RFID Tag as Thin as Sand. [Online]. Available: https:\/\/www.rfidhy.com\/the-smallest-rfid-tag-as-thin-as-sand\/."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2940650"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.678493"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483272"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616634"},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of APEMC'16","author":"Lee Ho Seong","year":"2016","unstructured":"Dong-ju Sim, Ho Seong Lee, Jong-Gwan Yook, and Kyuhong Sim. 2016. Measurement and analysis of the compromising electromagnetic emanations from USB keyboard. In Proceedings of APEMC'16. Shenzhen, China."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2013.2259253"},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of WOOT'18","author":"Wakabayashi Satohiro","year":"2018","unstructured":"Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi, and Michael Smith. 2018. A feasibility study of radio-frequency retroreflector attack. In Proceedings of WOOT'18. Baltimore, USA."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560543"},{"key":"e_1_2_1_56_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3494975","article-title":"Thru-the-wall eavesdropping on loudspeakers via RFID by capturing sub-mm level vibration. In Proceedings of the ACM on Interactive","volume":"5","author":"Wang Chuyu","year":"2021","unstructured":"Chuyu Wang, Lei Xie, Yuancan Lin, Wei Wang, Yingying Chen, Yanling Bu, Kai Zhang, and Sanglu Lu. 2021. Thru-the-wall eavesdropping on loudspeakers via RFID by capturing sub-mm level vibration. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 5. 1--25.","journal-title":"Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790119"},{"volume-title":"interpolation, and smoothing of stationary time series: with engineering applications","author":"Wiener Norbert","key":"e_1_2_1_58_1","unstructured":"Norbert Wiener. 1949. Extrapolation, interpolation, and smoothing of stationary time series: with engineering applications. The MIT press."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2766526"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430771"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796912"},{"key":"e_1_2_1_62_1","unstructured":"Junichi Yamagishi Christophe Veaux and Kirsten MacDonald. 2019. CSTR VCTK Corpus: English Multi-speaker Corpus for CSTR Voice Cloning Toolkit. [Online]. Available: https:\/\/datashare.is.ed.ac.uk\/handle\/10283\/3443.."},{"key":"e_1_2_1_63_1","first-page":"1108","article-title":"The feasibility of injecting inaudible voice commands to voice assistants","volume":"18","author":"Yan Chen","year":"2019","unstructured":"Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. 2019. The feasibility of injecting inaudible voice commands to voice assistants. IEEE Transactions on Dependable and Secure Computing 18, 3 (2019), 1108--1124.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973759"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790100"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155251"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621385"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155526"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-137"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3749459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:31:37Z","timestamp":1758817897000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3749459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":69,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9,3]]}},"alternative-id":["10.1145\/3749459"],"URL":"https:\/\/doi.org\/10.1145\/3749459","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"2025-09-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}