DolphinAtack: Inaudible Voice Commands

Preprint English OPEN
Zhang, Guoming; Yan, Chen; Ji, Xiaoyu; Zhang, Taimin; Zhang, Tianchen; Xu, Wenyuan;

Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems(VCS). Prior work on attacking VCS shows that the hidden voice commands that ... View more
  • References (66)
    66 references, page 1 of 7

    [1] Muhammad Taher Abuelma'atti. 2003. Analysis of the efect of radio frequency interference on the DC performance of bipolar operational amplifiers. IEEE Transactions on Electromagnetic Compatibility 45, 2 (2003), 453-458.

    [2] Akustica. 2014. AKU143 Top Port, analog silicon MEMS microphone. http://www. (2014).

    [3] Akustica. 2014. AKU242 digital silicon MEMS microphone. http://www.mouser. com/ds/2/720/PB24-1.0%20-%20AKU242%20Product%20Brief-770082.pdf. (2014).

    [4] Amazon. 2017. Alexa. (2017).

    [5] Apple. 2017. iOS-Siri-Apple. (2017).

    [6] Adam J. Aviv, Benjamin Sapp, Matt Blaze, and Jonathan M. Smith. 2012. Practicality of accelerometer side channels on smartphones. In Proceedings of the Computer Security Applications Conference. 41-50.

    [7] Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, and Caroline Sporleder. 2010. Acoustic side-channel attacks on printers.. In Proceedings of the USENIX Security Symposium. 307-322.

    [8] Baidu. 2017. Baidu Translate. (2017).

    [9] Avisoft Bioacoustics. 2017. Ultrasonic Dynamic Speaker Vifa. http://www.avisoft. com/usg/vifa.htm. (2017).

    [10] Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden voice commands. In Proceedings of the USENIX Security Symposium.

  • Metrics
    No metrics available
Share - Bookmark