A survey on IoT-enabled home automation systems: Attacks and defenses
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
Dangerous skills got certified: Measuring the trustworthiness of skill certification in voice personal assistant platforms
With the emergence of the voice personal assistant (VPA) ecosystem, third-party developers
are allowed to build new voice-apps are called skills in the Amazon Alexa platform and …
are allowed to build new voice-apps are called skills in the Amazon Alexa platform and …
Specpatch: Human-in-the-loop adversarial audio spectrogram patch attack on speech recognition
In this paper, we propose SpecPatch, a human-in-the loop adversarial audio attack on
automated speech recognition (ASR) systems. Existing audio adversarial attacker assumes …
automated speech recognition (ASR) systems. Existing audio adversarial attacker assumes …
Measuring the effectiveness of privacy policies for voice assistant applications
Voice Assistants (VA) such as Amazon Alexa and Google Assistant are quickly and
seamlessly integrating into people's daily lives. The increased reliance on VA services …
seamlessly integrating into people's daily lives. The increased reliance on VA services …
Ghosttalk: Interactive attack on smartphone voice system through power line
Inaudible voice command injection is one of the most threatening attacks towards voice
assistants. Existing attacks aim at injecting the attack signals over the air, but they require …
assistants. Existing attacks aim at injecting the attack signals over the air, but they require …
Hello me, meet the real me: Voice synthesis attacks on voice assistants
The radical advances in telecommunications and computer science have enabled a myriad
of applications and novel seamless interactions with computing interfaces. Voice Assistants …
of applications and novel seamless interactions with computing interfaces. Voice Assistants …
{SkillDetective}: Automated {Policy-Violation} detection of voice assistant applications in the wild
Today's voice personal assistant (VPA) services have been largely expanded by allowing
third-party developers to build voice-apps and publish them to marketplaces (eg, the …
third-party developers to build voice-apps and publish them to marketplaces (eg, the …
Security and privacy in the emerging cyber-physical world: A survey
With the emergence of low-cost smart and connected IoT devices, the area of cyber-physical
security is becoming increasingly important. Past research has demonstrated new threat …
security is becoming increasingly important. Past research has demonstrated new threat …
[PDF][PDF] EarArray: Defending against DolphinAttack via Acoustic Attenuation.
DolphinAttacks (ie, inaudible voice commands) modulate audible voices over ultrasounds to
inject malicious commands silently into voice assistants and manipulate controlled systems …
inject malicious commands silently into voice assistants and manipulate controlled systems …