Title
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones
Abstract
Voice, as a convenient and efficient way of information delivery, has a significant advantage over the conventional keyboard-based input methods, especially on small mobile devices such as smartphones and smartwatches. However, the human voice could often be exposed to the public, which allows an attacker to quickly collect sound samples of targeted victims and further launch voice impersonation attacks to spoof those voice-based applications. In this paper, we propose the design and implementation of a robust software-only voice impersonation defense system, which is tailored for mobile platforms and can be easily integrated with existing off-the-shelf smart devices. In our system, we explore magnetic field emitted from loudspeakers as the essential characteristic for detecting machine-based voice impersonation attacks. Furthermore, we use a state-of-the-art automatic speaker verification system to defend against human imitation attacks. Finally, our evaluation results show that our system achieves simultaneously high accuracy (100%) and low equal error rates (EERs) (0%) in detecting the machine-based voice impersonation attack on smartphones.
Year
DOI
Venue
2017
10.1109/ICDCS.2017.133
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
Keywords
Field
DocType
Voice,Impersonation Attacks,Smartphone,Defense system
Authentication,Human voice,Computer science,Computer security,Computer network,Robustness (computer science),Mobile device,Loudspeaker,Impersonation attack,Smartwatch,Mobile telephony
Conference
ISSN
ISBN
Citations 
1063-6927
978-1-5386-1793-9
11
PageRank 
References 
Authors
0.55
23
8
Name
Order
Citations
PageRank
Si Chen11096.95
Kui Ren27927355.27
Sixu Piao3110.88
Cong Wang44463204.50
Qian Wang53091152.46
Jian Weng618116.46
lu su7111866.61
Aziz Mohaisen834953.81