Monkey Says, Monkey Does: Security and Privacy on Voice Assistants

被引:108
作者
Alepis, Efthimios [1 ]
Patsakis, Constantinos [1 ]
机构
[1] Univ Piraeus, Dept Informat, Piraeus 18534, Greece
来源
IEEE ACCESS | 2017年 / 5卷
基金
欧盟地平线“2020”;
关键词
Security; voice recognition; mobile devices; Android permissions; voice assistants;
D O I
10.1109/ACCESS.2017.2747626
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The introduction of smart mobile devices has radically redesigned user interaction, as these devices are equipped with numerous sensors, making applications context-aware. To further improve user experience, most mobile operating systems and service providers are gradually shipping smart devices with voice controlled intelligent personal assistants, reaching a new level of human and technology convergence. While these systems facilitate user interaction, it has been recently shown that there is a potential risk regarding devices, which have such functionality. Our independent research indicates that this threat is not merely potential, but very real and more dangerous than initially perceived, as it is augmented by the inherent mechanisms of the underlying operating systems, the increasing capabilities of these assistants, and the proximity with other devices in the Internet of Things (IoT) era. In this paper, we discuss and demonstrate how these attacks can be launched, analysing their impact in real world scenarios.
引用
收藏
页码:17841 / 17851
页数:11
相关论文
共 28 条
[1]  
Alepis E., 2017, P 20 INT S RES ATT I
[2]   There's Wally! Location Tracking in Android without Permissions [J].
Alepis, Efthimios ;
Patsakis, Constantinos .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :278-284
[3]  
Nguyen A, 2015, PROC CVPR IEEE, P427, DOI 10.1109/CVPR.2015.7298640
[4]  
[Anonymous], 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, DOI 10.1145/2335356.2335360
[5]  
[Anonymous], 2012, Financial cryptography and data security
[6]  
[Anonymous], 2016, INT VOIC ASS US AD S
[7]  
[Anonymous], 2013, P 9 S US PRIV SEC AS, DOI [DOI 10.1145/2501604.2501616, 10.1145/2501604.2501616]
[8]  
Backes M, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P1101
[9]  
Boutin J.-I., TURLAS WATERING HOLE
[10]  
Carlini N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P513