Towards Reactive Acoustic Jamming for Personal Voice Assistants

Peng Cheng, I. E. Bagci, Jeff Yan, U. Roedig
{"title":"Towards Reactive Acoustic Jamming for Personal Voice Assistants","authors":"Peng Cheng, I. E. Bagci, Jeff Yan, U. Roedig","doi":"10.1145/3267357.3267359","DOIUrl":null,"url":null,"abstract":"Personal Voice Assistants (PVAs) such as the Amazon Echo are commonplace and it is now likely to always be in range of at least one PVA. Although the devices are very helpful they are also continuously monitoring conversations. When a PVA detects a wake word, the immediately following conversation is recorded and transported to a cloud system for further analysis. In this paper we investigate an active protection mechanism against PVAs: reactive jamming. A Protection Jamming Device (PJD) is employed to observe conversations. Upon detection of a PVA wake word the PJD emits an acoustic jamming signal. The PJD must detect the wake word faster than the PVA such that the jamming signal still prevents wake word detection by the PVA. The paper presents an evaluation of the effectiveness of different jamming signals. We quantify the impact of jamming signal and wake word overlap on jamming success. Furthermore, we quantify the jamming false positive rate in dependence of the overlap. Our evaluation shows that a 100% jamming success can be achieved with an overlap of at least 60% with a negligible false positive rate. Thus, reactive jamming of PVAs is feasible without creating a system perceived as a noise nuisance.","PeriodicalId":263315,"journal":{"name":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3267357.3267359","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

Personal Voice Assistants (PVAs) such as the Amazon Echo are commonplace and it is now likely to always be in range of at least one PVA. Although the devices are very helpful they are also continuously monitoring conversations. When a PVA detects a wake word, the immediately following conversation is recorded and transported to a cloud system for further analysis. In this paper we investigate an active protection mechanism against PVAs: reactive jamming. A Protection Jamming Device (PJD) is employed to observe conversations. Upon detection of a PVA wake word the PJD emits an acoustic jamming signal. The PJD must detect the wake word faster than the PVA such that the jamming signal still prevents wake word detection by the PVA. The paper presents an evaluation of the effectiveness of different jamming signals. We quantify the impact of jamming signal and wake word overlap on jamming success. Furthermore, we quantify the jamming false positive rate in dependence of the overlap. Our evaluation shows that a 100% jamming success can be achieved with an overlap of at least 60% with a negligible false positive rate. Thus, reactive jamming of PVAs is feasible without creating a system perceived as a noise nuisance.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
针对个人语音助手的被动声干扰研究
像亚马逊Echo这样的个人语音助手(PVA)很常见,现在它可能总是在至少一个PVA的范围内。尽管这些设备非常有用,但它们也在持续监控对话。当PVA检测到唤醒字时,紧接着的对话将被记录并传输到云系统进行进一步分析。本文研究了一种针对pva的主动保护机制:无功干扰。一个保护干扰装置(PJD)被用来观察对话。在检测到PVA尾迹字后,PJD发出声干扰信号。PJD必须比PVA更快地检测到唤醒字,这样干扰信号仍然会阻止PVA检测到唤醒字。本文对不同干扰信号的有效性进行了评价。我们量化了干扰信号和尾迹重叠对干扰成功的影响。此外,我们量化了干扰误报率与重叠的关系。我们的评估表明,100%的干扰成功率可以在重叠至少60%的情况下实现,假阳性率可以忽略不计。因此,pva的反应性干扰是可行的,而不会产生被认为是噪声干扰的系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security Expiring Decisions for Stream-based Data Access in a Declarative Privacy Policy Framework Session details: GDPR Detecting Both Machine and Human Created Fake Face Images In the Wild Session details: Steganography, Steganalysis, and Watermarking
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1