Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars

被引:50
作者
Zhou, Man [1 ]
Qin, Zhan [2 ]
Lin, Xiu [1 ]
Hu, Shengshan [1 ,3 ]
Wang, Qian [1 ]
Ren, Kui [4 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Hubei, Peoples R China
[2] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX USA
[3] City Univ Hong Kong, Hong Kong, Peoples R China
[4] Zhejiang Univ, Hangzhou, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Automobiles; Autonomous vehicles; Speech recognition; Ultrasonic imaging; Videos; Machine learning; Microphones;
D O I
10.1109/MWC.2019.1800477
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Autonomous driving is becoming one of the most popular applications of AI. Meanwhile, the advances in deep learning have promoted the rapid development of the voice controllable systems (VCSs), which have almost reached the maturity stage. Before autonomous driving cars reach the highest level of automation, intelligent voice interaction remains the primary approach for human-vehicle interaction. Recent works show that such intelligent systems are vulnerable to hidden voice commands that are unnoticed or unintelligible to humans. In particular, an adversary utilizing hidden voice commands is able to control autonomous driving cars. For example, malicious voice commands embedded into the sound of online shared videos can stealthily control the vehicle when people watch the videos in the car. In this article, we investigate the potential perniciousness of hidden voice commands on the VCS of autonomous driving cars, and then discuss feasible defense strategies. We finally propose a pop-noisebased general defense strategy that can resist various kinds of attacks.
引用
收藏
页码:128 / 133
页数:6
相关论文
共 13 条
[1]  
Alzantot M., 2018, NIPS 2017 Machine Deception Workshop
[2]  
Carlini N., 2018, P IEEE DEEP LEARN SE
[3]  
Carlini N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P513
[4]   A lightweight live memory forensic approach based on hardware virtualization [J].
Cheng, Yingxin ;
Fu, Xiao ;
Du, Xiaojiang ;
Luo, Bin ;
Guizani, Mohsen .
INFORMATION SCIENCES, 2017, 379 :23-41
[5]   Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid [J].
Guan, Zhitao ;
Li, Jing ;
Wu, Longfei ;
Zhang, Yue ;
Wu, Jun ;
Du, Xiaojiang .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :1934-1944
[6]  
Roy N, 2018, PROCEEDINGS OF THE 15TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI'18), P547
[7]  
Schonherr L., 2019, P ANN NETW DISTR SYS
[8]  
Shiota Sayaka., 2016, ODYSSEY, V2016, P259
[9]   POSTER: Inaudible Voice Commands [J].
Song, Liwei ;
Mittal, Prateek .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :2583-2585
[10]  
Tavish V., 2015, P USENIX WORKSH OFF