Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems

H Abdullah, K Warren, V Bindschaedler… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Speech and speaker recognition systems are employed in a variety of applications, from
personal assistants to telephony surveillance and biometric authentication. The wide …

A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z **, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

The security of autonomous driving: Threats, defenses, and future directions

K Ren, Q Wang, C Wang, Z Qin… - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
Autonomous vehicles (AVs) have promised to drastically improve the convenience of driving
by releasing the burden of drivers and reducing traffic accidents with more precise control …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures

A Khan, KM Malik, J Ryan, M Saravanan - Artificial Intelligence Review, 2023 - Springer
With the advent of automated speaker verification (ASV) systems comes an equal and
opposite development: malicious actors may seek to use voice spoofing attacks to fool those …

Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction

L Blue, K Warren, H Abdullah, C Gibson… - 31st USENIX Security …, 2022 - usenix.org
Generative machine learning models have made convincing voice synthesis a reality. While
such tools can be extremely useful in applications where people consent to their voices …

" Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

E Wenger, M Bronckers, C Cianfarani, J Cryan… - Proceedings of the …, 2021 - dl.acm.org
Advances in deep learning have introduced a new wave of voice synthesis tools, capable of
producing audio that sounds as if spoken by a target speaker. If successful, such tools in the …

Vocalprint: exploring a resilient and secure voice authentication via mmwave biometric interrogation

H Li, C Xu, AS Rathore, Z Li, H Zhang, C Song… - Proceedings of the 18th …, 2020 - dl.acm.org
With the continuing growth of voice-controlled devices, voice metrics have been widely used
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …

Your microphone array retains your identity: A robust voice liveness detection system for smart speakers

Y Meng, J Li, M Pillari, A Deopujari, L Brennan… - 31st USENIX Security …, 2022 - usenix.org
Though playing an essential role in smart home systems, smart speakers are vulnerable to
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …

Teethpass: Dental occlusion-based user authentication via in-ear acoustic sensing

Y **e, F Li, Y Wu, H Chen, Z Zhao… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
With the rapid development of mobile devices and the fast increase of sensitive data, secure
and convenient mobile authentication technologies are desired. Except for traditional …