2019
DOI: 10.1007/978-3-030-17982-3_16
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modeling and Analysis of Voice Assistant Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…The liveness detection calculates phoneme localization using two microphones. Using the liveness detection method, the voice assistant can distinguish whether the input voice is coming from the user in real time or if it has been replayed [4].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The liveness detection calculates phoneme localization using two microphones. Using the liveness detection method, the voice assistant can distinguish whether the input voice is coming from the user in real time or if it has been replayed [4].…”
Section: Resultsmentioning
confidence: 99%
“…and their voice streams are delivered to a voice assistant server. After the server interprets the voice stream, the user is presented with information about the day [4]. As the usage of voice assistant is increasing exponentially, there may be a lot of security issues.…”
Section: Working Of Voice Assistant:-mentioning
confidence: 99%
“…STRIDE is a threat modeling classification developed by Microsoft. STRIDE is an acronym that contains the following concepts, namely spoofing, tampering, repudiation, information disclosure, denial of service, and elevation [18]. Our main goal in this study was to identify and categorize threats to a public service complaint application from an attacker's point of view, and the STRIDE model fits this goal.…”
Section: Introductionmentioning
confidence: 99%
“…[8] The adversary can also make a significant amount purchase through the user's associated account [9] by telling the VA system "Alexa, Order a MacBook from Prime Now. " When the adversary can access the VA system at home remotely (e.g., through a hacked Smart TV), the adversary can even use critical commands to control security critical IoT devices [15], such as disarming a smart locking system and gain entry into the house. To ensure the successful large-scale deployment of VA systems, it is critical to address these inherited security vulnerabilities in VA systems and bring trustworthiness to users.…”
Section: Introductionmentioning
confidence: 99%