Abstract | ||
---|---|---|
Speech recognition is a technology that enables the recognition and translation of spoken language into data that can be interpreted by computers. With the development of speech recognition technologies, voice assistants on mobile devices, such as Siri or Google Voice have been introduced. Particularly, mobile device users can easily perform several commands on their mobile devices using these systems. However, this convenience causes a vulnerability in that an adversary can access the mobile device data and functions easily. This vulnerability could be exploited by the adversary because there are no authentication procedures. Recently, a remote attack on a voice assistant was introduced, but the attack can be considered to be unrealistic because of many assumptions. In this paper, we analyze the vulnerabilities of mobile device speech recognition systems. We also introduce the Toilet-time attack as a new realistic attack model. Furthermore, we prove the practicality of our attack model and evaluate attack scenarios using a new attack tool called BadVoice. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1109/ICUFN.2016.7537163 | 2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN) |
Keywords | Field | DocType |
Voice Assistant, Security, Mobile Application | Headphones,Attack model,Authentication,Computer science,Computer security,Speaker recognition,Mobile device,Adversary,Malware,Replay attack | Conference |
ISSN | Citations | PageRank |
2165-8528 | 0 | 0.34 |
References | Authors | |
0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Park Joon Young | 1 | 0 | 0.34 |
Hyo Jin Jo | 2 | 143 | 8.21 |
Samuel Woo | 3 | 27 | 2.50 |
Dong Hoon Lee | 4 | 2024 | 192.87 |