Proceedings of the 35th Annual Computer Security Applications Conference 2019
DOI: 10.1145/3359789.3359830
|View full text |Cite
|
Sign up to set email alerts
|

Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 19 publications
0
17
0
Order By: Relevance
“…Wang et al [34] proposed a novel approach that uses low-cost motion sensors to detect hidden voice commands against voice assistants. The authors leveraged audio and vibrant features to generate unique signatures, which can be easily deployed on smartphones with onboard motion sensors.…”
Section: Covert Channelmentioning
confidence: 99%
See 2 more Smart Citations
“…Wang et al [34] proposed a novel approach that uses low-cost motion sensors to detect hidden voice commands against voice assistants. The authors leveraged audio and vibrant features to generate unique signatures, which can be easily deployed on smartphones with onboard motion sensors.…”
Section: Covert Channelmentioning
confidence: 99%
“…Furthermore, devices should be protected against the leakage of sensitive information to prevent sensor information abuse [98,99]. As some sensors can gather acoustic signals that humans cannot hear, an attacker can inject malicious commands with hidden voice commands [33,34]. To defend against such attacks, vendors should filter unnecessary audio channels in advance.…”
Section: Perception Layermentioning
confidence: 99%
See 1 more Smart Citation
“…Current defenses leverage this observation and employ mechanisms to detect the digital attack artifacts in the input signal [48,64,65]. These defenses target either the (1) physical properties of the speaker e.g.…”
Section: Introductionmentioning
confidence: 99%
“…Existing Solutions. Existing authentication and defense mechanisms for VA systems relying on voice biometric technologies [3,22,26,39,44,46] use users' unique sound characteristics and machine learning-based models for user authentication. These solutions solely rely on acoustic features in the audio domain (i.e., extracting information from the data captured by microphones).…”
Section: Introductionmentioning
confidence: 99%