Leakypick: Iot audio spy detector
Manufacturers of smart home Internet of Things (IoT) devices are increasingly adding voice
assistant and audio monitoring features to a wide range of devices including smart …
assistant and audio monitoring features to a wide range of devices including smart …
Alexa versus alexa: Controlling smart speakers by self-issuing voice commands
We present ALEXA VERSUS ALEXA (AvA), a novel attack that leverages audio files
containing voice commands and audio reproduction methods in an offensive fashion, to gain …
containing voice commands and audio reproduction methods in an offensive fashion, to gain …
Unacceptable, where is my privacy? exploring accidental triggers of smart speakers
Voice assistants like Amazon's Alexa, Google's Assistant, or Apple's Siri, have become the
primary (voice) interface in smart speakers that can be found in millions of households. For …
primary (voice) interface in smart speakers that can be found in millions of households. For …
Exploring accidental triggers of smart speakers
Voice assistants like Amazon's Alexa, Google's Assistant, Tencent's Xiaowei, or Apple's Siri,
have become the primary (voice) interface in smart speakers that can be found in millions of …
have become the primary (voice) interface in smart speakers that can be found in millions of …
Acoustic Eavesdropping: How AIs Can Steal Your Secrets by Listening to Your Typing
AS George, S Sagayarajan - Partners Universal International Innovation …, 2023 - puiij.com
Recent advances in artificial intelligence have enabled a disturbing new form of
cyberattackacoustic side channel attacks, where AIs can identify keystrokes and steal …
cyberattackacoustic side channel attacks, where AIs can identify keystrokes and steal …
Poster: Inaudible voice commands
Voice assistants like Siri enable us to control IoT devices conveniently with voice
commands, however, they also provide new attack opportunities for adversaries. Previous …
commands, however, they also provide new attack opportunities for adversaries. Previous …
Future security of smart speaker and IoT smart home devices
S Godwin, B Glendenning… - 2019 Fifth Conference on …, 2019 - ieeexplore.ieee.org
The main idea in this research paper is to break the security of Echo by Amazon. Initially, we
learned about how the Echo functions, and what security measures Amazon has …
learned about how the Echo functions, and what security measures Amazon has …
[PDF][PDF] Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
We explore the threat of smartphone malware with access to on-board sensors, which opens
new avenues for illicit collection of private information. While existing work shows that such …
new avenues for illicit collection of private information. While existing work shows that such …
Echosafe: Sonar-based verifiable interaction with intelligent digital agents
Voice controlled interactive smart speakers, such as Google Home, Amazon Echo, and
Apple HomePod are becoming commonplace in today's homes. These devices listen …
Apple HomePod are becoming commonplace in today's homes. These devices listen …
Amazon echo dot or the reverberating secrets of IoT devices
Smart speakers, such as the Amazon Echo Dot, are very popular and routinely trusted with
private and sensitive information. Yet, little is known about their security and potential attack …
private and sensitive information. Yet, little is known about their security and potential attack …