4.7 Article

Personal Voice Assistant Security and Privacy-A Survey

期刊

PROCEEDINGS OF THE IEEE
卷 110, 期 4, 页码 476-507

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JPROC.2022.3153167

关键词

Privacy; Security; Acoustics; Virtual assistants; Microphones; Internet; Sensors; Acoustic security and privacy; acoustic sensing; automatic speech recognition (ASR); personal voice assistant (PVA); smart speaker

向作者/读者索取更多资源

Personal voice assistants (PVAs) are being increasingly used as interfaces to digital environments, but concerns regarding their security and privacy have also risen. This article provides a comprehensive survey of the state of the art in PVA security and privacy, highlighting both established areas and emerging research strands. It focuses on the challenges arising from the use of the acoustic channel and discusses attacks, countermeasures, and areas that require more attention, such as voice authentication and acoustic Denial of Service (DoS).
Personal voice assistants (PVAs) are increasingly used as interfaces to digital environments. Voice commands are used to interact with phones, smart homes, or cars. In the United States alone, the number of smart speakers, such as Amazon's Echo and Google Home, has grown by 78% to 118.5 million, and 21% of the U.S. population own at least one device. Given the increasing dependency of society on PVAs, security and privacy of these have become a major concern of users, manufacturers, and policy makers. Consequently, a steep increase in research efforts addressing security and privacy of PVAs can be observed in recent years. While some security and privacy research applicable to the PVA domain predates their recent increase in popularity, many new research strands have emerged. This article provides a survey of the state of the art in PVA security and privacy. The focus of this work is on the security and privacy challenges arising from the use of the acoustic channel. Work that describes both attacks and countermeasures is discussed. We highlight established areas such as voice authentication (VA) and new areas such as acoustic Denial of Service (DoS) that deserve more attention. This survey describes research areas where the threat is relatively well understood but where countermeasures are lacking, for example, in the area of hidden voice commands. We also discuss work that looks at privacy implications; for example, work on management of recording consent. This survey is intended to provide a comprehensive research map for PVA security and privacy.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据