A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
On the security and privacy challenges of virtual assistants
Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual
assistants (VAs) have grown in number and popularity. The sophisticated natural language …
assistants (VAs) have grown in number and popularity. The sophisticated natural language …
Sensing beyond itself: Multi-functional use of ubiquitous signals towards wearable applications
Wearable technologies provide a non-invasive way to monitor user's activity, identity, and
health in real-time, which have attracted tremendous interests from both academia and …
health in real-time, which have attracted tremendous interests from both academia and …
[HTML][HTML] Security and privacy problems in voice assistant applications: A survey
Voice assistant applications have become omniscient nowadays. Two models that provide
the two most important functions for real-life applications (ie, Google Home, Amazon Alexa …
the two most important functions for real-life applications (ie, Google Home, Amazon Alexa …
Smartphone-key: Hands-free two-factor authentication for voice-controlled devices using wi-fi location
ZS Al-Attar, T Abbes, F Zerai - IEEE Transactions on Network …, 2023 - ieeexplore.ieee.org
In the last few years, Internet of Things (IoT) devices have evolved at an accelerated rate.
Smart technology is leaning towards new human-device interaction interfaces that lack …
Smart technology is leaning towards new human-device interaction interfaces that lack …
Voice liveness detection for voice assistants using ear canal pressure
With the success of voice recognition techniques, users can easily control any device in
smart home environments by simply saying a voice command. Based on this idea, a new …
smart home environments by simply saying a voice command. Based on this idea, a new …
Privacy‐preserving hands‐free voice authentication leveraging edge technology
ZS Alattar, T Abbes, F Zerai - Security and Privacy, 2023 - Wiley Online Library
Although speech recognition technology has improved significantly over the past few years,
the absence of reliable voice authentication methods has negatively affected the Internet of …
the absence of reliable voice authentication methods has negatively affected the Internet of …
VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers
Smart speakers bring convenience to people's daily lives. However, various attacks can be
launched against smart speakers to execute malicious commands, which may cause serious …
launched against smart speakers to execute malicious commands, which may cause serious …
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns
At-home screening systems for obstructive sleep apnea (OSA) can bring convenience to
remote chronic disease management. However, the unsupervised home environment is …
remote chronic disease management. However, the unsupervised home environment is …
Accuth: Accelerometer-based Anti-Spoofing Voice Authentication on Wrist-worn Wearables
Most existing voice-based user authentication systems mainly rely on microphones to
capture the unique vocal characteristics of an individual, which are vulnerable to various …
capture the unique vocal characteristics of an individual, which are vulnerable to various …