Email or username:

Password:

Forgot your password?
Jeroen Baert

Crazy read: detecting positions of players in Counterstrike by *listening to their GPU over a microphone*

faculty.cc.gatech.edu/~genkin/

24 comments
dr_a

@jbaert information leakage is hard to prevent! who knew‽

Thanks for sharing, this is a very nice piece of work.

Viss

@jbaert my brain autocorrected 'positions' to 'positrons' and i gave birth to several live kittens.

Nonya Bidniss

@jbaert I had an NSA friend whose job was mostly coming up with wacky stuff like this with gadgets, game consoles, home automation, you name it. What a job.

Z̈oé :antifa:

@jbaert is it really common to be on voice chat with everyone? I haven’t played CS probably the past 10 years, but we only talked with our team, and even then often with PTT

ailurux

@uint8_t @jbaert the example they give is an odd one. i can't imagine this being useful as the attacker in this scenario, but by recording your own gpu as the camper couldn't you detect when the attacker enters your frustrum? that seems like a more useful example and would work regardless of voice chat or not. perhaps that's already a known attack vector though.

LocalWiseGuy

@ailurux @uint8_t @jbaert That's what I was thinking. I'm guessing if you were able to monitor the changes in your gpu without any modification of the game's client code then it wouldn't be detected by VAC but I could be entirely wrong.

Jeroen Baert

@uint8_t to be fair, it's not that common in competitive games. Maybe more in casual modes / private parties.

Freyja 🏴‍☠️:anqueer: :anfem:

@jbaert wow! I never had access to this but was pretty good at listening and was able to identify where people was. This is crazy!

Kelly MacNeill

@jbaert you could also just look at your gpu activity in task manager but , i guess going through the trouble of listening to the mic makes a better paper.

Adam Cafolla

@pyromuffin @jbaert

I think the point is it's not your GPU you listen to, it's the other player's.

f1r3

@jbaert I would have needed that 20 years ago

DrChris ⚔️

@jbaert some people have too much time on their hands

Kube

@jbaert@mastodon.social alt: Figure 15 from the paper, an illustration with stick figures. Counter-Strike camper detection via side channel leakage: when the attacker is within the camper's frustum, rendering on the camper's computer results invisible differences in the spectrogram. Thus, by entering the frustum and examining the signal, the attacker can detect the ambush, while neither seeing nor being seen by the camper.

Jane Adams

@jbaert This reminds me of that time that MIT researchers figured out how to reverse engineer video of a chip bag to extract the vibration and reconstruct the audio of a conversation wapo.st/3tX7goi

aeva

@jbaert I'm not even remotely surprised given how much emi GPUs give off. I've worked with some where I could hear the general load on my headphones.

Bart Janssens 🇧🇪

@jbaert Aah, camping, is there anything more gratifying? 😎 #guiltypleasure

Ives

@bart @jbaert Is that what's being taught at the military academy? 😬

Bart Janssens 🇧🇪

@ives @jbaert Well we certainly aren’t taught to run around shooting (you wouldn’t hit anything like that), so I would say that what in games is demeaningly called “camping” is an essential part of military tactics.

Jeroen Baert

@bart @ives oh, whole other discussion :) It's a sound tactic for these battle royale type games!

Go Up