2019
DOI: 10.1109/msec.2019.2910013
|View full text |Cite
|
Sign up to set email alerts
|

Emerging Threats in Internet of Things Voice Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(37 citation statements)
references
References 2 publications
0
28
0
1
Order By: Relevance
“…Authors in [31] identify different types of malicious actors that can put the privacy and security of the users at risk by wiretapping, impersonating the users, and exploiting other security vulnerabilities of the VA's. Extant research shows that the users are extremely concerned regarding the amount and type of data the VA's collect [32], and the third parties with whom their personal information is shared without taking any user consent [33,34].…”
Section: Voice Assistants Privacy and Trustmentioning
confidence: 99%
“…Authors in [31] identify different types of malicious actors that can put the privacy and security of the users at risk by wiretapping, impersonating the users, and exploiting other security vulnerabilities of the VA's. Extant research shows that the users are extremely concerned regarding the amount and type of data the VA's collect [32], and the third parties with whom their personal information is shared without taking any user consent [33,34].…”
Section: Voice Assistants Privacy and Trustmentioning
confidence: 99%
“…A second example concerns Amazon's 'Alexa', which Kumar, Paccagnella, Murley, Hennenfent, Mason, Bates and Bailey (2018) have studied, and describe as a "speech-recognition engine that powers the Amazon Echo family of devices". It acts as a voice assistant and can help plan routines around the user's home or work.…”
Section: Resultsmentioning
confidence: 99%
“…It acts as a voice assistant and can help plan routines around the user's home or work. The study conducted by Kumar et al (2018) was an empiricallinguistic analysis of interpretation errors made by this technological creation of Amazon's (that is, 'Alexa'). Their findings include many users experiencing frequent misinterpretations by the device.…”
Section: Resultsmentioning
confidence: 99%
“…Smart speakers can often interact with other devices through the internet of things and even be used to make financial transactions, thus creating a whole new area for phishers to target. As shown by Kumar et al, who demonstrated that by creating a skill that utilized the command "Am X" when an Alexa user attempted to use the American Express skill (with the skill name "Amex"), the user could easily be redirected to a phishing version of the login screen for American Express and their credentials stolen [69]. Some countermeasures have been proposed for this whereby before a skill is accepted it could be checked to see if the skill could be mistaken for an already existing command, although this does not seem to have yet been implemented.…”
Section: Sound Squattingmentioning
confidence: 99%