Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3485383
|View full text |Cite
|
Sign up to set email alerts
|

Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information

Abstract: Adversarial attacks against commercial black-box speech platforms, including cloud speech APIs and voice control devices, have received little attention until recent years. Constructing such attacks is difficult mainly due to the unique characteristics of time-domain speech signals and the much more complex architecture of acoustic systems. The current "black-box" attacks all heavily rely on the knowledge of prediction/confidence scores or other probability information to craft effective adversarial examples (… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
35
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(39 citation statements)
references
References 70 publications
2
35
0
Order By: Relevance
“…Securing commercial SRSs. We did not directly target commercial SRSs, although they are also vulnerable to black-box attacks [15], [73]. The reason is that it is more important to consider the most powerful adversaries when evaluating defenses, while the adversaries are not able to mount white-box attacks without having access to the internal structures of commercial SRSs.…”
Section: Discussion Of Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Securing commercial SRSs. We did not directly target commercial SRSs, although they are also vulnerable to black-box attacks [15], [73]. The reason is that it is more important to consider the most powerful adversaries when evaluating defenses, while the adversaries are not able to mount white-box attacks without having access to the internal structures of commercial SRSs.…”
Section: Discussion Of Limitationsmentioning
confidence: 99%
“…FAKEBOB [15], SirenAttack [16], Kenansville [21], and Occam [73] are four black-box adversarial attacks targeting SRSs, where FAKEBOB, SirenAttack, and Occam are optimization-based attacks, and Kenansville is a signal processing-based attack. All of them, except for Occam which is not publicly available and non-trivial to reproduce, have been used to evaluate defenses in this work.…”
Section: Related Workmentioning
confidence: 99%
“…It was also the first SAP attack method to demonstrate effectiveness in the physical world. Chen et al (2020) proposed a method called Devil's Whisper, a black-box transfer attack on multiple commercial APIs and Intelligent Voice Control (IVC) devices, using substitute models. Other black-box attack methods, such as gradient estimation (Taori et al 2019), genetic algorithms (Alzantot et al 2018;Khare et al 2018;Du et al 2020), have also achieved high attack success rates.…”
Section: Specific Adversarial Perturbationmentioning
confidence: 99%
“…We refer to this perturbation as a specific adversarial perturbation (SAP). Currently, the majority of work in this area is concentrated on SAP (Carlini and Wagner 2018;Qin et al 2019;Yuan et al 2018;Chen et al 2020;Khare et al 2018;Alzantot et al 2018;Du et al 2020;Taori et al 2019). In contrast, universal adversarial perturbation (UAP) is more destructive, which is audio-agnostic, meaning it has a high attack success rate when added to any audio example.…”
Section: Introductionmentioning
confidence: 99%
“…FakeBob proposed by Chen et al [81] has also been applied to black-box attacks, and the major approach is to transfer adversarial examples that have successfully attacked the grey-box system. Recently, CC-CMA-ES proposed by [91] applied a cooperative co-evolution (CC) framework to the powerful covariance matrix adaptation evolution strategy (CMA-ES) to solve the large and complex problem in the strictly black-box setting. Additionally, they adopt gradient inversion method to attack…”
Section: Black-box Attackmentioning
confidence: 99%