Exploring authentication for {Security-Sensitive} tasks on smart home voice assistants

A Ponticello, M Fassl, K Krombholz - Seventeenth Symposium on Usable …, 2021 - usenix.org
Smart home assistants such as Amazon Alexa and Google Home are primarily used for day-
to-day tasks like checking the weather or controlling other IoT devices. Security-sensitive …

Smart home voice assistants: a literature survey of user privacy and security vulnerabilities

K Sharif, B Tenbergen - Complex Systems Informatics and …, 2020 - csimq-journals.rtu.lv
Intelligent voice assistants are internet-connected devices, which listen to their environment
and react to spoken user commands in order to retrieve information from the internet, control …

The insecurity of home digital voice assistants--amazon alexa as a case study

X Lei, GH Tu, AX Liu, K Ali, CY Li, T Xie - arXiv preprint arXiv:1712.03327, 2017 - arxiv.org
Home Digital Voice Assistants (HDVAs) are getting popular in recent years. Users can
control smart devices and get living assistance through those HDVAs (eg, Amazon Alexa …

Traversing the quagmire that is privacy in your smart home

C Gao, V Chandrasekaran, K Fawaz… - Proceedings of the 2018 …, 2018 - dl.acm.org
Voice has become an increasingly popular User Interaction (UI) channel, with voice-
activated devices becoming regular fixtures in our homes. The popularity of voice-based …

Hands-free authentication for virtual assistants with trusted IoT device and machine learning

VT Hayashi, WV Ruggiero - Sensors, 2022 - mdpi.com
Virtual assistants, deployed on smartphone and smart speaker devices, enable hands-free
financial transactions by voice commands. Even though these voice transactions are …

HandLock: Enabling 2-FA for smart home voice assistants using inaudible acoustic signal

S Zhang, A Das - Proceedings of the 24th International Symposium on …, 2021 - dl.acm.org
The use of voice-control technology has become mainstream and is growing worldwide.
While voice assistants provide convenience through automation and control of home …

Security vetting process of smart-home assistant applications: A first look and case studies

H Hu, L Yang, S Lin, G Wang - arXiv preprint arXiv:2001.04520, 2020 - arxiv.org
The popularity of smart-home assistant systems such as Amazon Alexa and Google Home
leads to a booming third-party application market (over 70,000 applications across the two …

A case study of the security vetting process of smart-home assistant applications

H Hu, L Yang, S Lin, G Wang - 2020 IEEE Security and Privacy …, 2020 - ieeexplore.ieee.org
The popularity of smart-home assistant systems such as Amazon Alexa and Google Home
leads to a booming third-party application market (over 70,000 applications across the two …

Vision: Exploring challenges and opportunities for usable authentication in the smart home

S Prange, E Von Zezschwitz… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
In this work, we explore designs and possible threats of current smart home environments to
support the design of novel authentication mechanisms. Our work is motivated by the ever …

The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures

X Lei, GH Tu, AX Liu, CY Li, T Xie - 2018 IEEE conference on …, 2018 - ieeexplore.ieee.org
Home Digital Voice Assistants (HDVAs) are getting popular in recent years. Users can
control smart devices and get living assistance through those HDVAs (eg, Amazon Alexa …