2022
DOI: 10.1007/978-3-031-06365-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Auto-Parser: Android Auto and Apple CarPlay Forensics

Andrew Mahr,
Robert Serafin,
Cinthya Grajeda
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 20 publications
0
1
0
Order By: Relevance
“…The development of artificial intelligence has driven the popularity of automatic speech recognition (ASR) systems, which have been integrated into human-computer interaction services such as Amazon Alexa [9], Apple Siri [59], Google Assistant [10], and Microsoft Cortana [23] to transform speech signals into text transcriptions. By sending voice commands, ASR systems free users' hands and make it more convenient to control their smart home devices [34], send messages to their friends [17], or navigate to their destinations [44].…”
Section: Introductionmentioning
confidence: 99%
“…The development of artificial intelligence has driven the popularity of automatic speech recognition (ASR) systems, which have been integrated into human-computer interaction services such as Amazon Alexa [9], Apple Siri [59], Google Assistant [10], and Microsoft Cortana [23] to transform speech signals into text transcriptions. By sending voice commands, ASR systems free users' hands and make it more convenient to control their smart home devices [34], send messages to their friends [17], or navigate to their destinations [44].…”
Section: Introductionmentioning
confidence: 99%
“…With its wireless connection to devices, such as sensors, smartphones, and IoT, a vehicle is exposed to external threats (Hasan 2020). Consequently, vehicles are exposed to a greater cybersecurity attack surface than ever before and the seriousness of this has steadily increased (Mahr 2022). In reality, there have been cases of eavesdropping on IoT devices that operate based on a wireless connection and an attacker has conducted a remotelycontrolled attack on an IoT device (Lakshmanan 2022).…”
Section: Introductionmentioning
confidence: 99%