Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems
Speech and speaker recognition systems are employed in a variety of applications, from
personal assistants to telephony surveillance and biometric authentication. The wide …
personal assistants to telephony surveillance and biometric authentication. The wide …
A survey on sensor-based threats and attacks to smart devices and applications
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …
lives. From small household devices to large industrial machines, smart devices have …
Assessment of smart home assistants as an IoT
AJ Obaid - International Journal of Computations, Information …, 2021 - journals.gaftim.com
A smart home personal assistant technology is an intrinsic system, which incorporates many
elements such as users, Smart Home Personal Assistants (SPA) devices, cloud, skill …
elements such as users, Smart Home Personal Assistants (SPA) devices, cloud, skill …
Privacy norms for smart home personal assistants
Smart Home Personal Assistants (SPA) have a complex ecosystem that enables them to
carry out various tasks on behalf of the user with just voice commands. SPA capabilities are …
carry out various tasks on behalf of the user with just voice commands. SPA capabilities are …
Light commands:{Laser-Based} audio injection attacks on {Voice-Controllable} systems
We propose a new class of signal injection attacks on microphones by physically converting
light to sound. We show how an attacker can inject arbitrary audio signals to a target …
light to sound. We show how an attacker can inject arbitrary audio signals to a target …
A Survey on Cyber–Physical Systems Security
Cyber–physical systems (CPSs) are new types of intelligent systems that integrate
computing, control, and communication technologies, bridging the cyberspace and physical …
computing, control, and communication technologies, bridging the cyberspace and physical …
All things considered: An analysis of {IoT} devices on home networks
D Kumar, K Shen, B Case, D Garg… - 28th USENIX security …, 2019 - usenix.org
In this paper, we provide the first large-scale empirical analysis of IoT devices in real-world
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …
homes by leveraging data collected from user-initiated network scans of 83M devices in 16M …
Machine learning–based cyber attacks targeting on controlled information: A survey
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …
information leakage incidents, has become an emerging cyber security threat in recent …
{Devil's} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Recently studies show that adversarial examples (AEs) can pose a serious threat to a “white-
box” automatic speech recognition (ASR) system, when its machine-learning model is …
box” automatic speech recognition (ASR) system, when its machine-learning model is …
Black-box adversarial attacks on commercial speech platforms with minimal information
Adversarial attacks against commercial black-box speech platforms, including cloud speech
APIs and voice control devices, have received little attention until recent years. Constructing …
APIs and voice control devices, have received little attention until recent years. Constructing …