SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi - - PowerPoint PPT Presentation

surfi detecting surveillance camera looping attacks with
SMART_READER_LITE
LIVE PREVIEW

SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi - - PowerPoint PPT Presentation

SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information Nitya Lakshmanan * , Inkyu Bang + , Min Suk Kang * , Jun Han * , Jong Taek Lee # * National University of Singapore, + Agency for Defense Development, #


slide-1
SLIDE 1

SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information

Nitya Lakshmanan*, Inkyu Bang+, Min Suk Kang*, Jun Han*, Jong Taek Lee#

*National University of Singapore, +Agency for Defense Development, #Electronics and Telecommunications Research Institute

+ research done while working in NUS

slide-2
SLIDE 2

2

Surveillance cameras are now everywhere

slide-3
SLIDE 3

Surveillance camera looping attack

3 security guard

Surveillance system

Video shows a normal activity!

Place of interest

valuable security guard

Surveillance system

Video shows a normal activity! video feed

slide-4
SLIDE 4

security guard

Surveillance system

Video shows a normal activity!

Place of interest

valuable

Surveillance camera looping attack

4 security guard

Surveillance system

Video shows a normal activity! video feed No activity

slide-5
SLIDE 5

security guard

Surveillance system

Video shows a normal activity!

Place of interest

valuable

Surveillance camera looping attack

5 video feed security guard

Surveillance system

Video shows a normal activity! looped! No activity Looped

slide-6
SLIDE 6

security guard

Surveillance system

Video shows a normal activity!

Place of interest

valuable

Surveillance camera looping attack

6 security guard

Surveillance system

Video shows a normal activity! looped! video feed No activity Looped Robbery Reality Seen by the guard

slide-7
SLIDE 7

Exploiting Surveillance Cameras

Like a Hollywood Hacker BlackHat 2013

Looping Surveillance Cameras

like in the movies DefCon 2015 7

Surveillance camera looping is a reality now

Live video Replayed image Modified timestamp

slide-8
SLIDE 8

Incur prohibitive cost

Live (3 pm) This morning (10 am)

Surveillance camera with integrity protection Video frame comparison

8

Mitigation of camera looping attack is hard

Not robust against an adversary who can manipulate the video

slide-9
SLIDE 9

Incur prohibitive cost

Live (3 pm) This morning (10 am)

Surveillance camera with integrity protection Video frame comparison

9

Mitigation of camera looping attack is hard

Not robust against an adversary who can manipulate the video

Can we mitigate the camera looping attack effectively at no extra hardware cost?

slide-10
SLIDE 10

security guard

Place of interest

valuable

Surveillance system

Video shows a normal activity! 10 video feed looped!

SurFi

Compare channel state information (CSI)

Low false alarms

SurFi (Surveillance with Wi-Fi) detects camera looping attack

Wi-Fi receiver

No extra hardware cost

slide-11
SLIDE 11

security guard

Place of interest

valuable

Surveillance system

Video shows a normal activity! 11 video feed looped!

SurFi

Compare channel state information (CSI)

Low false alarms

SurFi (Surveillance with Wi-Fi) detects camera looping attack

Video and CSI shows a normal activity! Wi-Fi receiver

No extra hardware cost SurFi achieves attack detection accuracy of 98.8% and false positive rate of 0.1%

slide-12
SLIDE 12

System model: indoor space under video surveillance

Field-of-view ✓ Place of interest such as bank or jewelry store

Place of interest

✓ Field-of-view of the camera

12

✓ CSI measurement cannot be compromised

slide-13
SLIDE 13

Field-of-view

Place of interest

Threat model: adversary can loop surveillance video feed

13

✓ Manipulate video feed ✓ Evade detection of his unauthorized activities

slide-14
SLIDE 14

✓ Displacement of body keypoints (e.g., wrist, elbow) ✓ Amplitude of subcarriers

Video

Challenge: video and CSI signals are different

CSI

slide-15
SLIDE 15

✓ Displacement of body keypoints (e.g., wrist, elbow) ✓ Amplitude of subcarriers

Video

Challenge: video and CSI signals are different

CSI

How to find common attributes for reliable comparison of two different sensing modalities?

slide-16
SLIDE 16

16

Start time End time Prominent frequency

Main intuition: Both signals capture the similar timing and frequency components

  • Timing components: Start and end

time of the activity

  • Frequency component: Prominent

frequency

slide-17
SLIDE 17

17

Start time End time Prominent frequency

Main intuition: Both signals capture the similar timing and frequency components

  • Timing components: Start and end

time of the activity

  • Frequency component: Prominent

frequency

Reliable detection observed consistently across different activities, people, and times

slide-18
SLIDE 18

OpenPose Denoise

Data Pre- processing module

Live video feed Wi-Fi CSI signal

18

System design of SurFi

CSI event detector module

New Event (i) detected Video attributes CSI attributes

Attribute extraction module looped or not? Comparison module

Compute similarity score (S(i))

Event(N), S(N) Event(i), S(i) Event(1), S(1)

Decision module

slide-19
SLIDE 19

19

1) Data preprocessing module: Preprocesses the raw video and CSI signals

Video

OpenPose

slide-20
SLIDE 20

20 Video CSI

1) Data preprocessing module: Preprocesses the raw video and CSI signals

Raw video signal

OpenPose

Processed video signal

✓ Filter high frequency noises

Processed CSI signal Raw CSI signal

Denoise

slide-21
SLIDE 21

21

2) CSI event detector module: Uses the motion energy to detect the start of a new event

1) Data pre- processing module 2) CSI event detector module

Start

slide-22
SLIDE 22

22

3) Attribute extraction module: Extracts common attributes

Video CSI Time Time Start time End time Frequency Prominent frequency Frequency

slide-23
SLIDE 23

23

4) Comparison module: Computes the per-event similarity score of a single event

Video CSI Time Time Start time End time Frequency Prominent frequency Frequency

Per-event similarity score S(i) [0, 3] Compare

1 1 1

Per-attribute threshold

slide-24
SLIDE 24

Event 1, S(1) S(i) are averaged

24

Decision threshold Looped Not looped Compare

5) Decision module: Outputs looped or not after observing multiple events

The more the events seen, the higher the confidence for the final decision

Event 2, S(2) Event 3, S(3) Event 4, S(4) Event 5, S(5)

slide-25
SLIDE 25
  • Redmi Note 4 phone camera (13-

Megapixel)

  • Wi-Fi transmitter receiver pair

set up on Thinkpad laptops running Linux 802.11n CSI tools

participant

Place of interest

receiver Wi-Fi transmitter Wi-Fi 25

4.9-meter 2.6-meter

Experiment setup

slide-26
SLIDE 26

26

(E1) stand/arm waving

Three events

(E2) sit/fist thumping (E3) sit/clapping

slide-27
SLIDE 27

Legit: High similarity score Attack: Low similarity score 27

Clear difference in the per-event similarity

slide-28
SLIDE 28

28

Multiple events are observed for a duration of time

Example:

10 sec 15 sec 13 sec 25 sec

Time 25 sec 15 sec 30 sec 23 sec 10 sec

slide-29
SLIDE 29

29

1 event 36% 5 events 98.8%

Attack detection accuracy increases with more events

slide-30
SLIDE 30

30

Future improvements

  • Stronger adversary
  • Performs criminal activities while replicating start +

end times, prominent frequency of legitimate events

  • Future work: Investigate more attributes
  • Multiple events in sequence
  • Future work: Activity recognition techniques
slide-31
SLIDE 31

Wi-Fi Wi-Fi

behind-the-wall activities

Deployment consideration

  • Threshold calibration
  • Adjust to the new environment
  • Placement of the receiver
  • Strategically placing the receiver

way from the wall

Not looped

1 1 1

Looped

31

slide-32
SLIDE 32
  • First practical system to detect surveillance camera looping attack

in real-time

  • Defense technique requiring no additional hardware deployment
  • Attack detection accuracy of 98.8% with false positive rate of 0.1%
  • Future work: more diverse events, sophisticated adversary model

32

Conclusion

slide-33
SLIDE 33

nityalak@comp.nus.edu.sg

33

Questions?

security guard

Place of interest

valuable

Surveillance system

Video shows a normal activity! Wi-Fi receiver video feed looped!

SurFi

Compare channel state information (CSI)

slide-34
SLIDE 34

Extra Slides

34

slide-35
SLIDE 35

Activities behind-the-wall may degrade the performance of SurFi

transmitter Wi-Fi receiver Wi-Fi Near receiver Wi-Fi Middle receiver Wi-Fi Far behind-the-wall

Conduct experiments to test behind-the-wall activities.

35

slide-36
SLIDE 36

Strategically placing the receiver at a certain distance from the wall will minimize false alarms

✓ Activities are not detected since the corresponding motion energy is close to zero. ✓ Varying motion energy may lead to false detection of an activities. 36