{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:07Z","timestamp":1775745307963,"version":"3.50.1"},"reference-count":69,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2023,3,27]]},"abstract":"<jats:p>With the deployment of a growing number of smart home IoT devices, privacy leakage has become a growing concern. Prior work on privacy-invasive device localization, classification, and activity identification have proven the existence of various privacy leakage risks in smart home environments. However, they only demonstrate limited threats in real world due to many impractical assumptions, such as having privileged access to the user's home network. In this paper, we identify a new end-to-end attack surface using IoTBeholder, a system that performs device localization, classification, and user activity identification. IoTBeholder can be easily run and replicated on commercial off-the-shelf (COTS) devices such as mobile phones or personal computers, enabling attackers to infer user's habitual behaviors from smart home Wi-Fi traffic alone. We set up a testbed with 23 IoT devices for evaluation in the real world. The result shows that IoTBeholder has good device classification and device activity identification performance. In addition, IoTBeholder can infer the users' habitual behaviors and automation rules with high accuracy and interpretability. It can even accurately predict the users' future actions, highlighting a significant threat to user privacy that IoT vendors and users should highly concern.<\/jats:p>","DOI":"10.1145\/3580890","type":"journal-article","created":{"date-parts":[[2023,3,28]],"date-time":"2023-03-28T14:57:51Z","timestamp":1680015471000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["IoTBeholder"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7892-0021","authenticated-orcid":false,"given":"Qingsong","family":"Zou","sequence":"first","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China and Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6071-473X","authenticated-orcid":false,"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0754-2817","authenticated-orcid":false,"given":"Ruoyu","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Shenzhen, China and Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5574-5016","authenticated-orcid":false,"given":"Yucheng","family":"Huang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Shenzhen, China and Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3010-791X","authenticated-orcid":false,"given":"Gareth","family":"Tyson","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology (GZ), Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2394-2995","authenticated-orcid":false,"given":"Jingyu","family":"Xiao","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China and Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4260-1395","authenticated-orcid":false,"given":"Yong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Tsinghua Shenzhen International Graduate School, Shenzhen, China and Peng Cheng Laboratory, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,28]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2021. MIJIA. http:\/\/home.mi.com\/index.html."},{"key":"e_1_2_1_2_1","unstructured":"2021. SmartThings. https:\/\/www.smartthings.com\/."},{"key":"e_1_2_1_3_1","unstructured":"2022. Apple Homekit. https:\/\/www.apple.com\/ios\/home\/."},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of 31st USENIX Security Symposium (USENIX Security 22)","unstructured":"2022. Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment. In Proceedings of 31st USENIX Security Symposium (USENIX Security 22). Boston, MA."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of WiSec '20:13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","author":"Acar Abbas","unstructured":"Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A. Selcuk Uluagac. 2020. Peek-a-boo: i see your smart home activities, even encrypted!. In Proceedings of WiSec '20:13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria."},{"key":"e_1_2_1_6_1","unstructured":"ACRYLIC. 2022. Hidden wifi ssid: How to know the name of a wireless network with no SSID. https:\/\/www.acrylicwifi.com\/en\/blog\/hidden-ssid-wifi-how-to-know-name-of-network-without-ssid\/."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 15","author":"Adib Fadel","year":"2015","unstructured":"Fadel Adib, Zachary Kabelac, and Dina Katabi. 2015. Multi-Person Localization via RF Body Reflections. In Proceedings of 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 15, Oakland, CA, USA."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486039"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0040"},{"key":"e_1_2_1_10_1","volume-title":"A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic. CoRR abs\/1705.06805","author":"Apthorpe Noah J.","year":"2017","unstructured":"Noah J. Apthorpe, Dillon Reisman, and Nick Feamster. 2017. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic. CoRR abs\/1705.06805 (2017). arXiv:1705.06805"},{"key":"e_1_2_1_11_1","volume-title":"Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. CoRR abs\/1708.05044","author":"Apthorpe Noah J.","year":"2017","unstructured":"Noah J. Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. 2017. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. CoRR abs\/1708.05044 (2017). arXiv:1708.05044"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46843-3_4"},{"key":"e_1_2_1_13_1","unstructured":"Jacob Arellano. 2019. Very. Bluetooth vs. wi-fi for iot: Which is better? Error! Hyperlink reference not valid."},{"key":"e_1_2_1_14_1","volume-title":"Padmanabhan","author":"Bahl Paramvir","year":"2000","unstructured":"Paramvir Bahl and Venkata N. Padmanabhan. 2000. RADAR: An In-Building RF-Based User Location and Tracking System. In Proceedings of IEEE INFOCOM 2000, The Conference on Computer Communications, Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, Reaching the Promised Land of Communications, Tel Aviv, Israel."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354254"},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"et al. C. Southworth J. Finn (Ed.). 2007. Intimate partner violence technology and stalking. Violence against women.","DOI":"10.1177\/1077801207302045"},{"key":"e_1_2_1_17_1","volume-title":"Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium, USENIX Security","author":"Celik Z. Berkay","year":"2018","unstructured":"Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick D. McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, William Enck and Adrienne Porter Felt (Eds.)."},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Celik Z. Berkay","unstructured":"Z. Berkay Celik, Gang Tan, and Patrick D. McDaniel. 2019. IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. In Proceedings of 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196509"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2011.2164411"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, MOBICOM 2010","author":"Chintalapudi Krishna","unstructured":"Krishna Chintalapudi, Anand Padmanabha Iyer, and Venkata N. Padmanabhan. 2010. Indoor localization without the pain. In Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, MOBICOM 2010, Chicago, Illinois, USA."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.48"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677048"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384732"},{"key":"e_1_2_1_25_1","unstructured":"L. Aneesh Euprazia and K. K. Thyagharajan. 2020. A novel action recognition system for smart monitoring of elderly people using Action Pattern Image and Series CNN with transfer learning. CoRR abs\/2009.03285 (2020). arXiv:2009.03285"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of 30th USENIX Security Symposium, USENIX Security","author":"Fu Chenglong","year":"2021","unstructured":"Chenglong Fu, Qiang Zeng, and Xiaojiang Du. 2021. HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes. In Proceedings of 30th USENIX Security Symposium, USENIX Security 2021."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3233\/AIS-180509"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155459"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7936236"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397333"},{"key":"e_1_2_1_32_1","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage -SpaCCS 2020 International Workshops","author":"Hussain Ahmed Mohamed","year":"2020","unstructured":"Ahmed Mohamed Hussain, Gabriele Oligeri, and Thiemo Voigt. 2020. The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services. In Security, Privacy, and Anonymity in Computation, Communication, and Storage -SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings (Lecture Notes in Computer Science, Vol. 12383), Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, and Hao Han (Eds.). Springer, 122--136."},{"key":"e_1_2_1_33_1","unstructured":"S. Jeong and J. Griffiths. 2019. Hundreds of south korean motel guests were secretly filmed and live-streamed online. https:\/\/www.cnn.com\/2019\/03\/20\/asia\/south-korea-hotel-spy-cam-intl\/index.html."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS51040.2020.00049"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130940"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3274833"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355155"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210332"},{"key":"e_1_2_1_39_1","unstructured":"Knud Lasse Lueth. 2018. State of the IoT 2018: Number of IoT devices now at 7B - Market accelerating. https:\/\/iot-analytics.com\/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b\/."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155346"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45697-9_8"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017","author":"Miettinen Markus","year":"2017","unstructured":"Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, and Sasu Tarkoma. 2017. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In Proceedings of 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, Kisung Lee and Ling Liu (Eds.)."},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of 1st International Conference on Learning Representations, ICLR 2013, Scottsdale, Arizona, USA, May 2-4, 2013, Workshop Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.).","author":"Mikolov Tom\u00e1s","year":"2013","unstructured":"Tom\u00e1s Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. In Proceedings of 1st International Conference on Learning Representations, ICLR 2013, Scottsdale, Arizona, USA, May 2-4, 2013, Workshop Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.2000169"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:WINE.0000044029.06344.dd"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.31838\/jcr.07.04.57"},{"key":"e_1_2_1_48_1","first-page":"2020","article-title":"Wireless Security In Malaysia","volume":"7","author":"Noman Haitham Ameen","year":"2019","unstructured":"Haitham Ameen Noman, Sinan Ameen Noman, and Qusay Al-Maatouk. 2019. Wireless Security In Malaysia: A Survey Paper. Journal Of Critical Reviews 7, 4 (2019), 2020.","journal-title":"Journal Of Critical Reviews"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323409"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2014.6986977"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019","author":"Sikder Amit Kumar","unstructured":"Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, and A. Selcuk Uluagac. 2019. Aegis: a context-aware security framework for smart home systems. In Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA."},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of 30th USENIX Security Symposium, USENIX Security","author":"Singh Akash Deep","year":"2021","unstructured":"Akash Deep Singh, Luis Garcia, Joseph Noor, and Mani B. Srivastava. 2021. I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors. In Proceedings of 30th USENIX Security Symposium, USENIX Security 2021."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0014140"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409663"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24097"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214287"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973776"},{"key":"e_1_2_1_61_1","unstructured":"wigle. 2022. Statistics of Wireless Encryption. https:\/\/wigle.net\/stats#mainstats."},{"key":"e_1_2_1_62_1","unstructured":"et al. Y. Kang X. Li (Ed.). 2020. China Population Census Yearbook 2020. China Statistics Press."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639111"},{"key":"e_1_2_1_64_1","volume-title":"Proceedings of 29th USENIX Security Symposium, USENIX Security","author":"Yu Lingjing","year":"2020","unstructured":"Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, and Qingyun Liu. 2020. You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi. In Proceedings of 29th USENIX Security Symposium, USENIX Security 2020, Srdjan Capkun and Franziska Roesner (Eds.)."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007652502315"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-5064-1"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893806"},{"key":"e_1_2_1_68_1","volume-title":"Top-selling Products: China's Smart Home Industry in 2022. https:\/\/equalocean.com\/analysis\/2022062318323.","author":"Zhang Yifan","year":"2022","unstructured":"Yifan Zhang. 2022. Top-selling Products: China's Smart Home Industry in 2022. https:\/\/equalocean.com\/analysis\/2022062318323."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23053"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580890","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T04:46:16Z","timestamp":1752468376000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580890"}},"subtitle":["A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic"],"short-title":[],"issued":{"date-parts":[[2023,3,27]]},"references-count":69,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,3,27]]}},"alternative-id":["10.1145\/3580890"],"URL":"https:\/\/doi.org\/10.1145\/3580890","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,27]]},"assertion":[{"value":"2023-03-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}