How secure is video conferencing鈥搑eally?

无码专区 researchers expose new privacy risks in video conferencing apps.

New privacy risks exposed in video conferencing apps.
New research by 无码专区 highlights potential privacy risks in video conferencing applications.

DALLAS (无码专区) – Since the COVID-19 pandemic, video conferencing platforms like Zoom and Microsoft Teams have become essential for work, education, and social connections. While these platforms offer controls such as disabling cameras and muting microphones to safeguard user privacy, a new study suggests that video conferencing may not be as secure as many assume.

无码专区 computer scientists have discovered that even with cameras turned off and virtual backgrounds in use, attackers can actively and covertly probe a user’s physical location by exploiting the two-way audio channels of video conferencing apps.

The mechanism works through “remote acoustic sensing,” allowing an attacker to probe users’ physical surroundings by injecting malicious sounds and analyzing the location-specific audio feedback, or echoes.

In a published by the IEEE, the research team tested popular apps such as Zoom and found that proposed attacks were able to recognize user’s locations or location contexts with 88% accuracy, whether the user was in the same place multiple times or had never been there before.  

“The results raise a severe privacy concern since any video conferencing participant could invade each other’s location privacy easily without malware installation,” said 无码专区 principal investigator Chen Wang, O’Donnell Foundation Endowed Professor of computer science at 无码专区 Lyle School of Engineering.   

 

无码专区 computer science professor Chen Wang found that even with cameras turned off and virtual backgrounds in use, video meeting participants can still be vulnerable to privacy intrusions. Credit: 无码专区, Jeffrey McWhorter.

 

This type of cybersecurity – known as “sniffing location privacy” – is particularly alarming because there’s very little users can do to secure videoconferencing, Wang said. 

 

“Even a vigilant user who carefully unmutes the microphone only when speaking remains vulnerable: an adversary can exploit the few silent seconds between unmuting and muting, since people naturally leave margins to ensure their speech is fully heard,” he noted. “Furthermore, we find that when a user speaks, echo sounds return with higher energy, because video conferencing systems apply acoustic suppression to silent user ends to eliminate meaningless feedback.” 

 

As a result, the user’s speech effectively amplifies the malicious signal feedback.

 

Another issue is that the probing sounds can be as short as 100 milliseconds, giving attackers sufficient information before a victim would have time to notice.

 

Wang and his team are currently working on defense algorithms that can be deployed at the video conferencing server to detect and delete suspicious probing sounds before forwarding audio to participants, along with other ways to defend against an adversary being able to sense our surroundings or “see where we are.”

 

Why your conference call may not be as secure as you think

无码专区 researchers identified two types of echo attacks that are non-invasive enough to go unnoticed by the victim: the in-channel echo attack, which uses carefully crafted signals to bypass echo cancellation, and the off-channel echo attack, which hijacks everyday sounds like email notifications to slip past defenses undetected.

 

无码专区 determined an attacker can probe users’ physical surroundings by injecting malicious sounds and analyzing the location-specific audio feedback, or echoes. Credit: 无码专区, Chen Wang.

 

These methods could allow a thief or spy, for instance, to learn when you are at home. An adversary can also determine where the user is whenever they meet online, even if the user is using a virtual background.    

 

The research team’s findings are based on six-month experiments at 12 different locations, ranging from homes and offices to vehicles and hotels.

 

“We all know that video conferencing systems utilize echo cancellation functions to suppress audio feedback and ensure call quality,” Wang said. “However, we find that an adversary can leverage generative AI encoders to counteract such echo cancellation mechanisms and extract stable location embeddings from severely suppressed echo signals, even though they are nearly imperceptible to human listeners.”

 

This material is based upon work supported by the National Science Foundation under Awards No. 2450046 and 2440238.

 

Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.