4.5 Article

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

A Survey on Voice Assistant Security: Attacks and Countermeasures

Chen Yan et al.

Summary: Voice assistants, such as those found on smartphones and smart speakers, have become widely used. However, these assistants can be vulnerable to attacks that exploit their functionality, posing risks to user security and privacy. This article presents a comprehensive survey of attacks and countermeasures for voice assistants, categorizing them based on system components and methods. The aim is to aid designers in identifying and mitigating security threats and improving the reliability of voice assistants.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Artificial Intelligence

Voice spoofing detector: A unified anti-spoofing framework

Ali Javed et al.

Summary: This paper proposes a unified voice anti-spoofing framework that uses novel features to combat a variety of voice spoofing attacks. Experimental results demonstrate the effectiveness of the proposed system in accurately detecting various voice spoofing attacks.

EXPERT SYSTEMS WITH APPLICATIONS (2022)

Review Computer Science, Theory & Methods

Smart Home Personal Assistants: A Security and Privacy Review

Jide S. Edu et al.

Summary: Smart Home Personal Assistants (SPA) are an emerging innovation that is changing the way home users interact with technology, but they are exposed to various risks. The article provides an in-depth review of the security and privacy issues of SPA, categorizing important attack vectors and discussing open research challenges to address these issues in the future.

ACM COMPUTING SURVEYS (2021)

Article Chemistry, Analytical

On the Security and Privacy Challenges of Virtual Assistants

Tom Bolton et al.

Summary: Since the introduction of Siri by Apple, virtual assistants have become increasingly popular. Concerns over security and privacy issues have motivated research in this area, highlighting the need for advancements in voice authentication and compliance with privacy regulations.

SENSORS (2021)

Editorial Material Primary Health Care

The potential of placing a digital assistant in patients' homes

Ruth Chambers et al.

BRITISH JOURNAL OF GENERAL PRACTICE (2020)

Review Green & Sustainable Science & Technology

Smart home technologies in Europe: A critical review of concepts, benefits, risks and policies

Benjamin K. Sovacool et al.

RENEWABLE & SUSTAINABLE ENERGY REVIEWS (2020)

Review Computer Science, Artificial Intelligence

Bias in data-driven artificial intelligence systems-An introductory survey

Eirini Ntoutsi et al.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2020)

Article Computer Science, Cybernetics

Use of Intelligent Voice Assistants by Older Adults with Low Technology Use

Alisha Pradhan et al.

ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION (2020)

Article Engineering, Electrical & Electronic

A Light-Weight Replay Detection Framework For Voice Controlled IoT Devices

Khalid Mahmood Malik et al.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2020)

Article Computer Science, Information Systems

Emerging Threats in Internet of Things Voice Services

Deepak Kumar et al.

IEEE SECURITY & PRIVACY (2019)

Article Computer Science, Information Systems

Correlating human traits and cyber security behavior intentions

Margaret Gratian et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Monkey Says, Monkey Does: Security and Privacy on Voice Assistants

Efthimios Alepis et al.

IEEE ACCESS (2017)