“…Surveys, analyses, and investigations into specific aspects of voice assistant security have also contributed significantly to the field [8,10,11,13,16,20,29,37,39,50,69,72,83]. These studies have provided comprehensive insights into the attack surface, vulnerabilities, and potential mitigations, allowing for a deeper understanding of the security challenges posed by voice-controlled systems.…”