Proceedings 2020 Network and Distributed System Security Symposium 2020
DOI: 10.14722/ndss.2020.24068
|View full text |Cite
|
Sign up to set email alerts
|

SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves

Abstract: With recent advances in artificial intelligence and natural language processing, voice has become a primary method for human-computer interaction. It has enabled game-changing new technologies in both commercial sectors and military sectors, such as Siri, Alexa, Google Assistant, and voice-controlled naval warships. Recently, researchers have demonstrated that these voice assistant systems are susceptible to signal injection at the inaudible frequencies. To date, most of the existing works focus primarily on d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(46 citation statements)
references
References 23 publications
(30 reference statements)
0
46
0
Order By: Relevance
“…One line of research is to exploit interpretation errors of user commands by speech recognition, such as voice squatting attack [30,47], and generate hidden/inaudible voice commands [21,35,36,40,42,44,46]. Another line of research focuses on defense mechanisms, including, continuous authentication [25], canceling unwanted baseband signals [46], correlating magnetic changes with voice commands [22], and user presence-based access control [32].…”
Section: Related Work 71 Privacy Concerns For Voice Assistantsmentioning
confidence: 99%
“…One line of research is to exploit interpretation errors of user commands by speech recognition, such as voice squatting attack [30,47], and generate hidden/inaudible voice commands [21,35,36,40,42,44,46]. Another line of research focuses on defense mechanisms, including, continuous authentication [25], canceling unwanted baseband signals [46], correlating magnetic changes with voice commands [22], and user presence-based access control [32].…”
Section: Related Work 71 Privacy Concerns For Voice Assistantsmentioning
confidence: 99%
“…For instance, lasers can be used to activate the devices and allow injecting simulated voice commands into the device's internal microphone [18]. Similarly, researchers have found ways to bypass device passcode restrictions on smart phones and inject voice commands into the voice assistant software using "guided ultrasonic waves," which allowed them to place unauthorized phone calls on the target device [19]. Other attacks may target the cloud ecosystem of the IVA [3].…”
Section: Background and Related Workmentioning
confidence: 99%
“…We filtered the results following the procedure in [19] by applying the inclusion and exclusion criteria from Section 3.3. Search engine result pages were manually parsed and studies were selected based on their titles.…”
Section: Study Selection Proceduresmentioning
confidence: 99%
See 2 more Smart Citations