Anti-Spoofing Voice Commands: A Generic Wireless Assisted Design

被引:5
作者
Zhao, Cui [1 ]
Li, Zhenjiang [2 ,3 ]
Ding, Han [4 ]
Xi, Wei [4 ]
Wang, Ge [4 ]
Zhao, Jizhong [4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian 710048, Shaanxi, Peoples R China
[2] City Univ Hong Kong, Hong Kong, Peoples R China
[3] CityU Shenzhen Res Inst, Shenzhen, Peoples R China
[4] Xi An Jiao Tong Univ, Sch Comp Sci & Technol, Xian, Peoples R China
来源
PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT | 2021年 / 5卷 / 03期
基金
国家重点研发计划;
关键词
Voice commands; wireless sensing; speaker verification; SPEAKER VERIFICATION;
D O I
10.1145/3478116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an anti-spoofing design to verify whether a voice command is spoken by one live legal user, which supplements existing speech recognition systems and could enable new application potentials when many crucial voice commands need a higher-standard verification in applications. In the literature, verifying the liveness and legality of the command's speaker has been studied separately. However, to accept a voice command from a live legal user, prior solutions cannot be combined directly due to two reasons. First, previous methods have introduced various sensing channels for the liveness detection, while the safety of a sensing channel itself cannot be guaranteed. Second, a direct combination is also vulnerable when an attacker plays a recorded voice command from the legal user and mimics this user to speak the command simultaneously. In this paper, we introduce an anti-spoofing sensing channel to fulfill the design. More importantly, our design provides a generic interface to form the sensing channel, which is compatible to a variety of widely-used signals, including RFID, Wi-Fi and acoustic signals. This offers a flexibility to balance the system cost and verification requirement. We develop a prototype system with three versions by using these sensing signals. We conduct extensive experiments in six different real-world environments under a variety of settings to examine the effectiveness of our design.
引用
收藏
页数:22
相关论文
共 52 条
[1]  
Ahmed ME, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2685
[2]  
[Anonymous], 2012, SURVEY EVALUATION VO
[3]  
[Anonymous], 2015, P USENIX NSDI
[4]  
Bachu R., 2008, AM SOC ENG ED ASEE Z, P1
[5]  
Boulianne G., 2011, P IEEE 2011 WORKSH A
[6]  
Cai C, 2021, Arxiv, DOI arXiv:1901.03450
[7]   Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems [J].
Chen, Tao ;
Shangguan, Longfei ;
Li, Zhenjiang ;
Jamieson, Kyle .
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
[8]  
Ding H, 2018, IEEE INFOCOM SER, P1115, DOI 10.1109/INFOCOM.2018.8486424
[9]  
EPC Global, 2005, EPC RADIO FREQUENCY, V860, P1
[10]  
Ergunay Serife Kucur, 2015, PROC IEEE BTAS