ADVERSARIAL ATTACKS ON VOICE ASSISTANTS & PROTECTING AGAINST MANIPULATION

Authors

  • Ashlesha Vishnu Kadam Amazon.com, LLC, Amazon Music, 2021 7th Ave, Seattle, WA 98121, USA Author

Keywords:

ASR, NLU, Security, Spoofing, Voice Assistants

Abstract

As the adoption of and engagement with Voice Assistants increase, they become increasingly attractive targets for malicious adversarial attacks by bad actors, posing a threat to the safety and privacy of authorized users. In this paper, the the end-to-end working of typical voice assistants is provided, followed by a deep dive into the top patterns of adversarial attacks via Voice Assistants. Finally, the paper also mentions the top mitigation strategies to prevent adversarial attacks and scope for future research.

References

Ashlesha Vishnu Kadam, Designing Thoughtful Experiences for Kids on Voice Assistants, International Journal of Artificial Intelligence & Machine Learning (IJAIML), 2(1), 2023, pp. 75-81. DOI: https://doi.org/10.17605/OSF.IO/HKTS8

Tawfiq Ammari, Jofish Kaye, Janice Y. Tsai, and Frank Bentley. 2019. Music, Search, and IoT: How People (Really) Use Voice Assistants. ACM Trans. Comput.-Hum. Interact. 26, 3, Article 17 (June 2019), 28 pages. https://doi.org/10.1145/3311956

Zwakman DS, Pal D, Arpnikanondt C. Usability evaluation of artificial intelligence-based voice assistants: the case of amazon Alexa. SN Comput Sci. 2021. https://doi.org/10.1007/s42979-020-00424-4.

Hoy MB. Alexa, Siri, Cortana, and more: an introduction to voice assistants. Med Ref Serv Quart. 2018;37(1):81–8.

Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, and Wenyuan Xu. 2022. A Survey on Voice Assistant Security: Attacks and Countermeasures. ACM Comput. Surv. 55, 4, Article 84 (April 2023), 36 pages. https://doi.org/10.1145/3527153

Hadi Abdullah and Kevin Warren and Vincent Bindschaedler and Nicolas Papernot and Patrick Traynor, “SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems”, https://doi.org/10.48550/arXiv.2007.06622

Minder, B., Wolf, P., Baldauf, M. et al. Voice assistants in private households: a conceptual framework for future research in an interdisciplinary field. Humanit Soc Sci Commun 10, 173 (2023). https://doi.org/10.1057/s41599-023-01615-z

Wienrich Carolin, Reitelbach Clemens, Carolus Astrid, “The Trustworthiness of Voice Assistants in the Context of Healthcare Investigating the Effect of Perceived Expertise on the Trustworthiness of Voice Assistants, Providers, Data Receivers, and Automatic Speech Recognition”, Frontiers in Computer Science, Vol. 3, 2021. DOI: 10.3389/fcomp.2021.685250

https://www.europeanbusinessreview.com/a-simple-explanation-of-how-voice-assistants-work-and-why-you-need-one/

https://www.futureofworkhub.info/explainers/2021/4/19/future-of-voice-assistants-how-the-va-might-overtake-the-pa

https://www.miquido.com/blog/what-are-voice-assistants/

https://antispoofing.org/voice-antispoofing-origin-types-and-preventive-techniques/

https://www.idrnd.ai/voice-anti-spoofing/

https://www.idrnd.ai/idvoice-verified-voice-biometrics-and-anti-spoofing/

Xiaolei Liu, Xingshu Chen, Mingyong Yin, Yulong Wang, Teng Hu, Kangyi Ding, “Audio Injection Adversarial Example Attack”, https://openreview.net/pdf?id=iEkBFdmcSv

Liu, Xiaolei, Kun Wan, Yufei Ding, Xiaosong Zhang and Qingxin Zhu. “Weighted-Sampling Audio Adversarial Example Attack.” AAAI Conference on Artificial Intelligence (2019)

https://www.cpomagazine.com/cyber-security/voice-assistants-have-a-variety-of-underlooked-vulnerabilities-ultrasonic-commands-cloned-voices-and-even-lasers/

https://www.utsa.edu/today/2023/03/story/chen-nuit-research.html

Bolton T, Dargahi T, Belguith S, Al-Rakhami MS, Sodhro AH. On the Security and Privacy Challenges of Virtual Assistants. Sensors (Basel). 2021 Mar 26;21(7):2312. doi: 10.3390/s21072312. PMID: 33810212; PMCID: PMC8036736.

Qi-An Fu and Yinpeng Dong and Hang Su and Jun Zhu and Chao Zhang, “Automated Decision-based Iterative Adversarial Attacks”, 31st USENIX Security Symposium (USENIX Security 22), 2022

Ye Liu, Yaya Cheng, Lianli Gao, Xianglong Liu, Qilong Zhang, Jingkuan Song, “Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack”, https://openaccess.thecvf.com/content/CVPR2022/papers/Liu_Practical_Evaluation_of_Adversarial_Robustness_via_Adaptive_Auto_Attack_CVPR_2022_paper.pdf

Piotr Żelasko, Sonal Joshi, Yiwen Shao, Jesus Villalba, Jan Trmal, Najim Dehak, Sanjeev Khudanpur, “Adversarial Attacks and Defenses for Speech Recognition Systems”, https://arxiv.org/abs/2103.17122

Ashish Alex, Lin Wang, Paolo Gastaldo, Andrea Cavallaro, "Data augmentation for speech separation", Speech Communication, Volume 152, 2023, 102949, ISSN 0167-6393,

https://doi.org/10.1016/j.specom.2023.05.009

Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, “Void: A fast and light voice liveness detection system”,

https://www.usenix.org/system/files/sec20summer_ahmed_prepub.pdf

Ali Javed, Khalid Mahmood Malik, Hafiz Malik, Aun Irtaza, "Voice spoofing detector: A unified anti-spoofing framework", Expert Systems with Applications, Volume 198, 2022, 116770, ISSN 0957-4174, https://doi.org/10.1016/j.eswa.2022.116770

Awais Khan , Khalid Mahmood Malik , James Ryan , Mikul Saravanan, “Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward”, https://arxiv.org/pdf/2210.00417.pdf

Jingjin Li, Chao Chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang, “Security and Privacy Problems in Voice Assistant Applications: A Survey”, https://arxiv.org/pdf/2304.09486.pdf

Park Joon Young, Jo Hyo Jin, Samuel Woo and Dong Hoon Lee, "BadVoice: Soundless voice-control replay attack on modern smartphones," 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), Vienna, Austria, 2016, pp. 882-887, doi: 10.1109/ICUFN.2016.7537163

Robert Chang, Logan Kuo, Arthur Liu, and Nader Sehatbakhsh, “SoK: A Study of the Security on Voice Processing Systems”,

https://arxiv.org/ftp/arxiv/papers/2112/2112.13144.pdf

Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, and Wenyuan Xu. 2022. A Survey on Voice Assistant Security: Attacks and Countermeasures. ACM Comput. Surv. 55, 4, Article 84 (April 2023), 36 pages. https://doi.org/10.1145/3527153

https://thearf.org/category/ua_resource/explainable-ai-xai-helps-minimize-the-impact-of-errors/

Downloads

Published

2023-08-25