Leakypick: Iot audio spy detector

R Mitev, A Pazii, M Miettinen, W Enck… - Proceedings of the 36th …, 2020 - dl.acm.org
Manufacturers of smart home Internet of Things (IoT) devices are increasingly adding voice
assistant and audio monitoring features to a wide range of devices including smart …

Alexa versus alexa: Controlling smart speakers by self-issuing voice commands

S Esposito, D Sgandurra, G Bella - Proceedings of the 2022 ACM on …, 2022 - dl.acm.org
We present ALEXA VERSUS ALEXA (AvA), a novel attack that leverages audio files
containing voice commands and audio reproduction methods in an offensive fashion, to gain …

Unacceptable, where is my privacy? exploring accidental triggers of smart speakers

L Schönherr, M Golla, T Eisenhofer, J Wiele… - arXiv preprint arXiv …, 2020 - arxiv.org
Voice assistants like Amazon's Alexa, Google's Assistant, or Apple's Siri, have become the
primary (voice) interface in smart speakers that can be found in millions of households. For …

Exploring accidental triggers of smart speakers

L Schönherr, M Golla, T Eisenhofer, J Wiele… - Computer Speech & …, 2022 - Elsevier
Voice assistants like Amazon's Alexa, Google's Assistant, Tencent's Xiaowei, or Apple's Siri,
have become the primary (voice) interface in smart speakers that can be found in millions of …

Acoustic Eavesdropping: How AIs Can Steal Your Secrets by Listening to Your Typing

AS George, S Sagayarajan - Partners Universal International Innovation …, 2023 - puiij.com
Recent advances in artificial intelligence have enabled a disturbing new form of
cyberattackacoustic side channel attacks, where AIs can identify keystrokes and steal …

Poster: Inaudible voice commands

L Song, P Mittal - Proceedings of the 2017 ACM SIGSAC Conference on …, 2017 - dl.acm.org
Voice assistants like Siri enable us to control IoT devices conveniently with voice
commands, however, they also provide new attack opportunities for adversaries. Previous …

Future security of smart speaker and IoT smart home devices

S Godwin, B Glendenning… - 2019 Fifth Conference on …, 2019 - ieeexplore.ieee.org
The main idea in this research paper is to break the security of Echo by Amazon. Initially, we
learned about how the Echo functions, and what security measures Amazon has …

[PDF][PDF] Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.

R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia… - NDSS, 2011 - informatics.indiana.edu
We explore the threat of smartphone malware with access to on-board sensors, which opens
new avenues for illicit collection of private information. While existing work shows that such …

Echosafe: Sonar-based verifiable interaction with intelligent digital agents

A Alanwar, B Balaji, Y Tian, S Yang… - Proceedings of the 1st …, 2017 - dl.acm.org
Voice controlled interactive smart speakers, such as Google Home, Amazon Echo, and
Apple HomePod are becoming commonplace in today's homes. These devices listen …

Amazon echo dot or the reverberating secrets of IoT devices

D Giese, G Noubir - Proceedings of the 14th ACM Conference on …, 2021 - dl.acm.org
Smart speakers, such as the Amazon Echo Dot, are very popular and routinely trusted with
private and sensitive information. Yet, little is known about their security and potential attack …