Proceedings of the 5th International Conference on Information Systems Security and Privacy 2019
DOI: 10.5220/0007469705190527
|View full text |Cite
|
Sign up to set email alerts
|

Attack and Defence Modelling for Attacks via the Speech Interface

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 0 publications
0
12
0
Order By: Relevance
“…This section presents experimental work showing that it is possible to hide malicious voice commands to the voice-controlled digital assistant Google Assistant in word sounds that are perceived as meaningless by humans. We term this type of attack a 'nonsense' attack, in accordance with a taxonomy published in a previous paper [4], which categorises attacks via the speech interface according to human perceptual categories. The attack can also be characterised as a black-box adversarial learning attack.…”
Section: Description and Contextmentioning
confidence: 99%
See 2 more Smart Citations
“…This section presents experimental work showing that it is possible to hide malicious voice commands to the voice-controlled digital assistant Google Assistant in word sounds that are perceived as meaningless by humans. We term this type of attack a 'nonsense' attack, in accordance with a taxonomy published in a previous paper [4], which categorises attacks via the speech interface according to human perceptual categories. The attack can also be characterised as a black-box adversarial learning attack.…”
Section: Description and Contextmentioning
confidence: 99%
“…The space of meaningful word sounds within a language at a given point in time is generally confirmed by the inclusion of words in an established reference work, such as, in the case of English, the Oxford English Dictionary. 4 Word sounds that are outside this space can be described as nonsense words. Nonsense words are a grey area between non-speech, i.e.…”
Section: Description and Contextmentioning
confidence: 99%
See 1 more Smart Citation
“…Bispham et al [10] have developed a taxonomy of potential attacks via the speech interface that is organised according to the nature of the attack in terms of human perception. The taxonomy divides such attacks into two high-level categories: overt attacks, which aim to take control of a target system using plainspeech voice commands; and covert attacks, in which malicious voice commands are concealed in a cover medium so as to make them imperceptible to human listeners.…”
Section: Prior Work On the Security Of The Speech Interfacementioning
confidence: 99%
“…This paper is an extended version of a previous paper in which our framework for modelling the security of the speech interface was first presented (see Bispham et al [7]). The work presented here extends the work in the earlier paper with the proposals for the development of new defence mechanisms referred to above.…”
Section: Introductionmentioning
confidence: 99%