@inproceedings{10.1145/3498361.3538921, author = {Liao, Qianru and Huang, Yongzhi and Huang, Yandao and Zhong, Yuheng and Jin, Huitong and Wu, Kaishun}, title = {MagEar: Eavesdropping via Audio Recovery Using Magnetic Side Channel}, year = {2022}, isbn = {9781450391856}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3498361.3538921}, doi = {10.1145/3498361.3538921}, abstract = {Speakers have been widely embedded in various electronic devices as a standard configuration. The security vulnerability of microspeakers (such as earphones) is commonly overlooked because it is often assumed that soundproof boundaries, such as walls, can prevent privacy-infringing sound leakage. In this paper, we present the prototype MagEar, an eavesdropping system that leverages magnetic side-channel signals leaked by a microspeaker to recover intelligible human speech. MagEar has sufficiently high sensitivity to detect magnetic fields on the order of nanotesla, exceeding some high-precision magnetometers. It can recover high-quality audio with 90% similarity to the original audio even at a distance of 60 cm. In addition, the MagEar prototype is portable and can be hidden in a headset shell. We have implemented MagEar as a proof-of-concept system and conducted several case studies of eavesdropping on different types of speaker-embedded devices, including earphones, and we have demonstrated the ability to successfully transcribe the recovered speech using automatic speech recognition techniques even when blocked by soundproof walls. We hope that our work can push manufacturers to rethink this security vulnerability of speakers.}, booktitle = {Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services}, pages = {371–383}, numpages = {13}, keywords = {privacy disclosure, eavesdropping, mobile security, magnetic field, side channel attack}, location = {Portland, Oregon}, series = {MobiSys '22} }