Abstract
Everything goes to the fact that our communication with technology will soon become almost exclusively oral. It is natural for a person to ask for something out loud and hear the answer: see how children are at ease with voice assistants. However, with new technologies - and voice control is no exception - new threats are emerging. Cybersecurity researchers tirelessly seek them out so that device manufacturers can secure their creations before potential threats turn into real attacks. However, in this paper we are going to talk about different voice attacks, which so far will hardly be able to find practical application, but the protection against which should be thought over now.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, R., Chen, X., Wen, S., Zheng, X., Ding, Y.: Using AI to attack VA: a stealthy spyware against voice assistances in smart phones. IEEE Access 7, 153542–153554 (2019)
Schönherr, L., Kohls, K., Zeiler, S., Holz, T., Kolossa, D.: Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding, 16 August 2018
Sugawara, T., Cyr, B., Rampazzi, S., Genkin, D., Fu, K.: Light commands: laser-based audio injection attacks on voice-controllable systems (2020)
Yan, Q., Liu, K., Zhou, Q., Guo, H., Zhang, N.: SurfingAttack: interactive hidden attack on voice assistants using ultrasonic guided waves, January 2020
Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., Xu, W.: DolphinAtack: inaudible voice commands, 31 August 2017
Roy, N., Shen, S., Hassanieh, H., Choudhury, R.R.: Inaudible voice commands: the long-range attack and defense, 9–11 April 2018
Zhou, M., Qin, Z., Lin, X., Hu, S., Wang, Q., Ren, K.: Hidden voice commands: attacks and defenses on the VCS of autonomous driving cars, October 2019
Gong, Y., Poellabauer, C.: An overview of vulnerabilities of voice controlled systems, 24 March 2018
Yan, C., Zhang, G., Ji, X., Zhang, T., Zhang, T., Xu, W.: The feasibility of injecting inaudible voice commands to voice assistants, 19 March 2019
Gong, Y., Poellabauer, C.: Protecting voice controlled systems using sound source identification based on acoustic cues, 16 November 2018
Acknowledgment
This work was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(grant number: NRF-2016R1D1A1B01011908).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Saparmammedovich, S.A., Al-Absi, M.A., Koni, Y.J., Lee, H.J. (2021). Voice Attacks to AI Voice Assistant. In: Singh, M., Kang, DK., Lee, JH., Tiwary, U.S., Singh, D., Chung, WY. (eds) Intelligent Human Computer Interaction. IHCI 2020. Lecture Notes in Computer Science(), vol 12615. Springer, Cham. https://doi.org/10.1007/978-3-030-68449-5_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-68449-5_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-68448-8
Online ISBN: 978-3-030-68449-5
eBook Packages: Computer ScienceComputer Science (R0)