2019
DOI: 10.1109/access.2019.2945791
|View full text |Cite
|
Sign up to set email alerts
|

Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones

Abstract: Intelligent Personal Assistant (IA), also known as Voice Assistant (VA), has become increasingly popular as a human-computer interaction mechanism. Most smartphones have built-in voice assistants that are granted high privilege, which is able to access system resources and private information. Thus, once the voice assistants are exploited by attackers, they become the stepping stones for the attackers to hack into the smartphones. Prior work shows that the voice assistant can be activated by inter-component co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 38 publications
(18 reference statements)
0
11
0
Order By: Relevance
“…The authors in [26] demonstrate how various attacks can be launched on voice-assistants, along with their impact in real-world scenarios. Similar work is done by authors in [27] where they propose a novel attack vector named "Vaspy", which crafts the users' activation voice by silently listening to the users' phone calls. The attack vector is implemented with a proof-of-concept spyware and tested on different voice-assistants.…”
Section: Current State-of-art Of Voice-assistantsmentioning
confidence: 90%
“…The authors in [26] demonstrate how various attacks can be launched on voice-assistants, along with their impact in real-world scenarios. Similar work is done by authors in [27] where they propose a novel attack vector named "Vaspy", which crafts the users' activation voice by silently listening to the users' phone calls. The attack vector is implemented with a proof-of-concept spyware and tested on different voice-assistants.…”
Section: Current State-of-art Of Voice-assistantsmentioning
confidence: 90%
“…However, their impact is limited to the cities where these systems operate. Likewise, different works identify security and privacy issues in smart assistants [26,27,50,51]. Nevertheless, previous works on the privacy and security of smart assistants focus on vulnerabilities in their implementation.…”
Section: Discussionmentioning
confidence: 99%
“…They carried out these attacks remotely by publishing attach skills and stole user data and eavesdropped on their conversations. Zhang et al [51] demonstrated how smart assistants could be exploited to collect user data without their knowledge. They developed a spyware app and disguised it as a popular microphone controller game app.…”
Section: Privacy and Security Issues In Smart Assistantsmentioning
confidence: 99%
See 1 more Smart Citation
“…AI based malware detection schemes for smart mobile devices (i.e. UEs) are proposed in [52], [53]. Moreover, AI and machine learning are employed for developing VMI methods [54].…”
Section: Artificial Intelligence (Ai)mentioning
confidence: 99%