Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones &Amp; Mobile Devices 2014
DOI: 10.1145/2666620.2666623
|View full text |Cite
|
Sign up to set email alerts
|

Your Voice Assistant is Mine

Abstract: Previous research about sensor based attacks on Android platform focused mainly on accessing or controlling over sensitive components, such as camera, microphone and GPS. These approaches obtain data from sensors directly and need corresponding sensor invoking permissions.This paper presents a novel approach (GVS-Attack) to launch permission bypassing attacks from a zero-permission Android application (VoicEmployer) through the phone speaker. The idea of GVS-Attack is to utilize an Android system built-in voic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 112 publications
(11 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…Subsequently, the benign Skill will return a textual representation of the response to AVS (3) which will then use the Alexa TTS engine to create a voice audio file out of it and forward it to D (4). Now the malicious device D will send the audio file containing the response to a STT service (5) for it to be transcribed back into text (6). Now D knows what data the victim wanted to fetch from the requested Skill.…”
Section: 23mentioning
confidence: 99%
See 4 more Smart Citations
“…Subsequently, the benign Skill will return a textual representation of the response to AVS (3) which will then use the Alexa TTS engine to create a voice audio file out of it and forward it to D (4). Now the malicious device D will send the audio file containing the response to a STT service (5) for it to be transcribed back into text (6). Now D knows what data the victim wanted to fetch from the requested Skill.…”
Section: 23mentioning
confidence: 99%
“…Audible Synthesized Voice Commands. Diao et al [6] discuss attacks against the Google Voice Search (GVS) app on Android smart phones. To carry out these attacks, a malicious app must be installed on the device.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations