Attacks on Voice Assistant Systems

Jie Lien, Md Abdullah Al Momin, Xu Yuan
{"title":"Attacks on Voice Assistant Systems","authors":"Jie Lien, Md Abdullah Al Momin, Xu Yuan","doi":"10.4018/978-1-7998-7323-5.ch004","DOIUrl":null,"url":null,"abstract":"Voice assistant systems (e.g., Siri, Alexa) have attracted wide research attention. However, such systems could receive voice information from malicious sources. Recent work has demonstrated that the voice authentication system is vulnerable to different types of attacks. The attacks are categorized into two main types: spoofing attacks and hidden voice commands. In this chapter, how to launch and defend such attacks is explored. For the spoofing attack, there are four main types, such as replay attacks, impersonation attacks, speech synthesis attacks, and voice conversion attacks. Although such attacks could be accurate on the speech recognition system, they could be easily identified by humans. Thus, the hidden voice commands have attracted a lot of research interest in recent years.","PeriodicalId":137552,"journal":{"name":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-7323-5.ch004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Voice assistant systems (e.g., Siri, Alexa) have attracted wide research attention. However, such systems could receive voice information from malicious sources. Recent work has demonstrated that the voice authentication system is vulnerable to different types of attacks. The attacks are categorized into two main types: spoofing attacks and hidden voice commands. In this chapter, how to launch and defend such attacks is explored. For the spoofing attack, there are four main types, such as replay attacks, impersonation attacks, speech synthesis attacks, and voice conversion attacks. Although such attacks could be accurate on the speech recognition system, they could be easily identified by humans. Thus, the hidden voice commands have attracted a lot of research interest in recent years.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
对语音助理系统的攻击
语音助理系统(如Siri, Alexa)已经引起了广泛的研究关注。然而,这样的系统可能会从恶意来源接收语音信息。最近的研究表明,语音认证系统容易受到不同类型的攻击。这些攻击主要分为两种类型:欺骗攻击和隐藏语音命令。本章将探讨如何发起和防御此类攻击。对于欺骗攻击,主要有四种类型:重放攻击、模拟攻击、语音合成攻击和语音转换攻击。虽然这种攻击在语音识别系统上是准确的,但它们很容易被人类识别出来。因此,隐式语音命令近年来引起了广泛的研究兴趣。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Survey of Automotive Cyber-Physical System Security Brain-Computer Interface Generating Device Fingerprints for Smart Device Pairing Using the Unique Spectrum Characteristic From LEDs Handwritten Signature Spoofing With Conditional Generative Adversarial Nets Towards Named Data Networking for Internet of Things Search Engines
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1