A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

On the security and privacy challenges of virtual assistants

T Bolton, T Dargahi, S Belguith, MS Al-Rakhami… - Sensors, 2021 - mdpi.com
Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual
assistants (VAs) have grown in number and popularity. The sophisticated natural language …

Sensing beyond itself: Multi-functional use of ubiquitous signals towards wearable applications

Z Wang, J Li, Y Jin, J Wang, F Yang, G Li, X Ni… - Digital Signal …, 2021 - Elsevier
Wearable technologies provide a non-invasive way to monitor user's activity, identity, and
health in real-time, which have attracted tremendous interests from both academia and …

[HTML][HTML] Security and privacy problems in voice assistant applications: A survey

J Li, C Chen, MR Azghadi, H Ghodosi, L Pan… - Computers & …, 2023 - Elsevier
Voice assistant applications have become omniscient nowadays. Two models that provide
the two most important functions for real-life applications (ie, Google Home, Amazon Alexa …

Smartphone-key: Hands-free two-factor authentication for voice-controlled devices using wi-fi location

ZS Al-Attar, T Abbes, F Zerai - IEEE Transactions on Network …, 2023 - ieeexplore.ieee.org
In the last few years, Internet of Things (IoT) devices have evolved at an accelerated rate.
Smart technology is leaning towards new human-device interaction interfaces that lack …

Voice liveness detection for voice assistants using ear canal pressure

J Shang, J Wu - 2020 IEEE 17th International Conference on …, 2020 - ieeexplore.ieee.org
With the success of voice recognition techniques, users can easily control any device in
smart home environments by simply saying a voice command. Based on this idea, a new …

Privacy‐preserving hands‐free voice authentication leveraging edge technology

ZS Alattar, T Abbes, F Zerai - Security and Privacy, 2023 - Wiley Online Library
Although speech recognition technology has improved significantly over the past few years,
the absence of reliable voice authentication methods has negatively affected the Internet of …

VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers

X Xu, C Fu, X Du, EP Ratazzi - 2023 53rd Annual IEEE/IFIP …, 2023 - ieeexplore.ieee.org
Smart speakers bring convenience to people's daily lives. However, various attacks can be
launched against smart speakers to execute malicious commands, which may cause serious …

Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns

SMM Islam, Y Zheng, Y Pan, M Millan… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
At-home screening systems for obstructive sleep apnea (OSA) can bring convenience to
remote chronic disease management. However, the unsupervised home environment is …

Accuth: Accelerometer-based Anti-Spoofing Voice Authentication on Wrist-worn Wearables

F Han, P Yang, H Du, XY Li - IEEE Transactions on Mobile …, 2023 - ieeexplore.ieee.org
Most existing voice-based user authentication systems mainly rely on microphones to
capture the unique vocal characteristics of an individual, which are vulnerable to various …