Andrew McCarthy Andrew6.Mccarthy@uwe.ac.uk
Senior Lecturer in Cyber Security
Shouting through letterboxes: A study on attack susceptibility of voice assistants
Mccarthy, Andrew; Gaster, Benedict; Legg, Phil
Authors
Benedict Gaster Benedict.Gaster@uwe.ac.uk
Associate Professor in Physical Computing
Professor Phil Legg Phil.Legg@uwe.ac.uk
Professor in Cyber Security
Abstract
Voice assistants such as Amazon Echo and Google Home have become increasingly popular for many home users, for home automation, entertainment, and convenience. These devices process speech commands from a user to execute some action, such as playing music, making online purchases, or triggering home automation such as lights or security locks. The process of mapping speech input to a text command is performed using a machine learning model. In this study, we explore the concept of how voice assistants could be exploited, where genuine audio commands are manipulated such that an attacker could trigger alternative responses from the voice assistant. We present a small-scale study to examine misinterpretations made by voice assistants. We also study user perception of how secure their voice devices are, and their approach to security and privacy.
Presentation Conference Type | Conference Paper (unpublished) |
---|---|
Conference Name | IEEE International Conference on Cyber Security and the Protection of Digital Services (Cyber Science 2020) |
Start Date | Jun 15, 2020 |
End Date | Jun 19, 2020 |
Deposit Date | May 17, 2020 |
Publicly Available Date | May 18, 2020 |
Public URL | https://uwe-repository.worktribe.com/output/5981531 |
Publisher URL | https://www.c-mric.com/cs2020 |
Files
Mccarthy2020 Cyberscience
(238 Kb)
PDF
You might also like
Visual analytics of e-mail sociolinguistics for user behavioural analysis
(2014)
Journal Article
Visualizing the insider threat: Challenges and tools for identifying malicious user activity
(2015)
Presentation / Conference Contribution
Quasi-Hamming distances: An overarching concept for measuring glyph similarity
(2015)
Presentation / Conference Contribution
Understanding insider threat: A framework for characterising attacks
(2014)
Presentation / Conference Contribution
Glyph sorting: Interactive visualization for multi-dimensional data
(2013)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search