Publications

The * sign stands for co-first authors (equal contribution).

EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras
Yan Long*, Qinhong Jiang*, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu.
In NDSS’24: The Network and Distributed System Security Symposium, 2024(PDF, Demo)

GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu.
In NDSS’24: The Network and Distributed System Security Symposium, 2024 (PDF, Demo)

Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification
Xiaoyu Ji*, Qinhong Jiang*, Chaohao Li, Zhuoyang Shi, Wenyuan Xu.
In TIFS: IEEE Transactions on Information Forensics and Security, 2024(PDF, Demo)

GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI
Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, and Wenyuan Xu.
In SEC’23: USENIX Security Symposium, 2023 (PDF, Presentation)

A Survey on Voice Assistant Security: Attacks and Countermeasures
Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, Wenyuan Xu.
In CSUR: ACM Computing Surveys, 55:4, 1-36, 2022 (PDF)