Digital Forensic Practices and Methodologies for AI Speaker Ecosystems

被引:40
作者
Jo, Wooyeon [1 ]
Shin, Yeonghun [1 ]
Kim, Hyungchan [2 ]
Yoo, Dongkyun [1 ]
Kim, Donghyun [2 ]
Kang, Cheulhoon [3 ]
Jin, Jongmin [3 ]
Oh, Jungkyung [3 ]
Na, Bitna [3 ]
Shon, Taeshik [1 ,2 ]
机构
[1] Ajou Univ, Dept Comp Engn, World Cup Ro 206, Suwon 16499, South Korea
[2] Ajou Univ, Dept Cyber Secur, World Cup Ro 206, Suwon 16499, South Korea
[3] Supreme Prosecutors Off, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
AI speaker; Ecosystem; Internet of things; Cloud; NAVER Clova; KAKAO i; SKT NUGU; KT GiGA genie;
D O I
10.1016/j.diin.2019.04.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various Internet of Things (IoT) devices, such as AI speakers, are being released with different functions to improve user convenience and better life. An AI speaker ecosystem is a cloud-based IoT system built around an AI speaker and IoT devices. In the near future, citizens in whole countries worldwide will be helped in real life when AI-equipped devices are deployed in their homes. Typically, because AI speakers are always operating, they can be used to provide vital evidence for digital forensics; however, privacy issues may arise. AI speakers have provided evidence of murders in the United States and Mexico and are being released without specific regulatory guidelines. In this study, we propose five digital forensic analysis methods for four AI speaker models from different manufacturers released in the Republic of Korea. The five proposed methods are applied to all the AI speaker models, and the results are presented in the Appendix. In particular, we developed a forensic tool for collecting user command history for NAVER Clova. (C) 2019 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S80 / S93
页数:14
相关论文
共 23 条
[1]  
[Anonymous], 2010, ANDROID FORENSICS SI
[2]  
[Anonymous], CNN
[3]   Smart TV forensics: Digital traces on televisions [J].
Boztas, A. ;
Riethoven, A. R. J. ;
Roeloffs, M. .
DIGITAL INVESTIGATION, 2015, 12 :S72-S80
[4]  
Burkholder Peter, 2002, SSL MAN IN THE MIDDL
[5]   Man-in-the-Middle Attack to the HTTPS Protocol [J].
Callegati, Franco ;
Cerroni, Walter ;
Ramilli, Marco .
IEEE SECURITY & PRIVACY, 2009, 7 (01) :78-81
[6]   Digital forensic approaches for Amazon Alexa ecosystem [J].
Chung, Hyunji ;
Park, Jungheum ;
Lee, Sangjin .
DIGITAL INVESTIGATION, 2017, 22 :S15-S25
[7]  
Desnos Anthony, 2011, PROC OF BLACK HAT AB
[8]  
Dupuy E., 2012, YET ANOTHER FAST JAV
[9]  
Hassan Carma, 2017, CNN
[10]   Android cache taxonomy and forensic process [J].
Immanuel, Felix ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, :1094-1101