Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart Home Systems

被引:21
|
作者
Mao, Jian [1 ]
Zhu, Shishi [2 ]
Dai, Xuan [1 ]
Lin, Qixiao [1 ]
Liu, Jianwei [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Microphones; Smart homes; Acoustics; Speech recognition; Hardware; Feature extraction; Ultrasonic imaging; Inaudible audio attack; Internet of Things (IoT); signal-processing-based detection; smart home; smart speakers;
D O I
10.1109/JIOT.2020.2997779
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things is a critical infrastructure component as well as an enabling technology to support the fast-developing cross-region, cross-application, and diversified collaborative smart city services that require systematic cooperation among multiple smart city systems. Speech recognition-based voice controllable systems become one of the most popular interfaces in smart devices. However, it has been proved that attackers can hide their voice commands via modulating them on ultrasonic carriers and carry out inaudible voice attacks to manipulate voice controllable devices (e.g., mobile phone) unnoticeably. Although there are defense suggestions to enhance the hardware or add new modules of microphones, it is impractical to change the hardware design of all voice-controllable devices developed by different manufactures. In this article, we validate the effectiveness of ultrasonic-based inaudible voice attacks to voice-controllable smart home devices and propose a signal-processing-based hidden voice attack detection approach. Our approach uses an independent device that deploys a two-step lightweight detecting algorithm to identify the attack signals. We simulate our algorithm and make a prototype implementation of the proposed approach. The simulation results illustrate the correctness of the detection algorithm and the experiments show that our approach can detect the ultrasonic-based inaudible voice attack effectively.
引用
收藏
页码:8025 / 8035
页数:11
相关论文
共 50 条
  • [31] SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
    Hooda, Ashish
    Wallace, Matthew
    Jhunjhunwalla, Kushal
    Fernandes, Earlence
    Fawaz, Kassem
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2022, 6 (01):
  • [32] Voice Operated Switch Design of Smart Home Based on Single Chip Microcomputer Technology
    Yao, Lei
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT AND COMPUTER SCIENCE (ICMCS 2018), 2018, 77 : 300 - 307
  • [33] Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
    Newaz, A. K. M. Iqtidar
    Haque, Nur Imtiazul
    Sikder, Amit Kumar
    Rahman, Mohammad Ashiqur
    Uluagac, A. Selcuk
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [34] CHA: A Caching Framework for Home-based Voice Assistant Systems
    Xu, Lanyu
    Iyengar, Arun
    Shi, Weisong
    2020 IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2020), 2020, : 293 - 306
  • [35] A Solution Based Analysis of Attack Vectors on Smart Home Systems
    Brauchli, Andreas
    Li, Depeng
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [36] Interoperability for web services based smart home control systems
    Järvinen, Hannu
    Vuorimaa, Petri
    WEBIST 2014 - Proceedings of the 10th International Conference on Web Information Systems and Technologies, 2014, 1 : 93 - 103
  • [37] Development of Speech-Based Interface for Smart Home Systems
    Pinter, Judit Maria
    Czap, Laszlo
    Marton, L. Kiss
    2018 19TH INTERNATIONAL CARPATHIAN CONTROL CONFERENCE (ICCC), 2018, : 348 - 352
  • [38] A Sampling-Based Method for Detecting Data Poisoning Attacks in Recommendation Systems
    Li, Mohan
    Lian, Yuxin
    Zhu, Jinpeng
    Lin, Jingyi
    Wan, Jiawen
    Sun, Yanbin
    MATHEMATICS, 2024, 12 (02)
  • [39] Detecting shilling attacks in recommender systems based on analysis of user rating behavior
    Cai, Hongyun
    Zhang, Fuzhi
    KNOWLEDGE-BASED SYSTEMS, 2019, 177 : 22 - 43
  • [40] Deep learning for smart home security systems: CNN-based home security
    Balasubramanian, M.
    Kakade, Kiran Shrimant
    Mane, Sulakshana B.
    Anand, Sujatha Jamuna
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (04) : 451 - 463