A survey on IoT-enabled home automation systems: Attacks and defenses

Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …

A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z **, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Dangerous skills got certified: Measuring the trustworthiness of skill certification in voice personal assistant platforms

L Cheng, C Wilson, S Liao, J Young, D Dong… - Proceedings of the 2020 …, 2020 - dl.acm.org
With the emergence of the voice personal assistant (VPA) ecosystem, third-party developers
are allowed to build new voice-apps are called skills in the Amazon Alexa platform and …

Specpatch: Human-in-the-loop adversarial audio spectrogram patch attack on speech recognition

H Guo, Y Wang, N Ivanov, L **ao, Q Yan - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
In this paper, we propose SpecPatch, a human-in-the loop adversarial audio attack on
automated speech recognition (ASR) systems. Existing audio adversarial attacker assumes …

Measuring the effectiveness of privacy policies for voice assistant applications

S Liao, C Wilson, L Cheng, H Hu, H Deng - Proceedings of the 36th …, 2020 - dl.acm.org
Voice Assistants (VA) such as Amazon Alexa and Google Assistant are quickly and
seamlessly integrating into people's daily lives. The increased reliance on VA services …

Ghosttalk: Interactive attack on smartphone voice system through power line

Y Wang, H Guo, Q Yan - arxiv preprint arxiv:2202.02585, 2022 - arxiv.org
Inaudible voice command injection is one of the most threatening attacks towards voice
assistants. Existing attacks aim at injecting the attack signals over the air, but they require …

Hello me, meet the real me: Voice synthesis attacks on voice assistants

D Bilika, N Michopoulou, E Alepis, C Patsakis - Computers & Security, 2024 - Elsevier
The radical advances in telecommunications and computer science have enabled a myriad
of applications and novel seamless interactions with computing interfaces. Voice Assistants …

{SkillDetective}: Automated {Policy-Violation} detection of voice assistant applications in the wild

J Young, S Liao, L Cheng, H Hu, H Deng - 31st USENIX Security …, 2022 - usenix.org
Today's voice personal assistant (VPA) services have been largely expanded by allowing
third-party developers to build voice-apps and publish them to marketplaces (eg, the …

Security and privacy in the emerging cyber-physical world: A survey

Z Yu, Z Kaplan, Q Yan, N Zhang - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
With the emergence of low-cost smart and connected IoT devices, the area of cyber-physical
security is becoming increasingly important. Past research has demonstrated new threat …

[PDF][PDF] EarArray: Defending against DolphinAttack via Acoustic Attenuation.

G Zhang, X Ji, X Li, G Qu, W Xu - NDSS, 2021 - researchgate.net
DolphinAttacks (ie, inaudible voice commands) modulate audible voices over ultrasounds to
inject malicious commands silently into voice assistants and manipulate controlled systems …