A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors

A Firc, K Malinka, P Hanáček - Heliyon, 2023 - cell.com
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …

Wavefake: A data set to facilitate audio deepfake detection

J Frank, L Schönherr - arXiv preprint arXiv:2111.02813, 2021 - arxiv.org
Deep generative modeling has the potential to cause significant harm to society.
Recognizing this threat, a magnitude of research into detecting so-called" Deepfakes" has …

Your microphone array retains your identity: A robust voice liveness detection system for smart speakers

Y Meng, J Li, M Pillari, A Deopujari, L Brennan… - 31st USENIX Security …, 2022 - usenix.org
Though playing an essential role in smart home systems, smart speakers are vulnerable to
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …

" Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

E Wenger, M Bronckers, C Cianfarani, J Cryan… - Proceedings of the …, 2021 - dl.acm.org
Advances in deep learning have introduced a new wave of voice synthesis tools, capable of
producing audio that sounds as if spoken by a target speaker. If successful, such tools in the …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Ghosttalk: Interactive attack on smartphone voice system through power line

Y Wang, H Guo, Q Yan - arXiv preprint arXiv:2202.02585, 2022 - arxiv.org
Inaudible voice command injection is one of the most threatening attacks towards voice
assistants. Existing attacks aim at injecting the attack signals over the air, but they require …

Voice in ear: Spoofing-resistant and passphrase-independent body sound authentication

Y Gao, Y Jin, J Chauhan, S Choi, J Li… - Proceedings of the ACM on …, 2021 - dl.acm.org
With the rapid growth of wearable computing and increasing demand for mobile
authentication scenarios, voiceprint-based authentication has become one of the prevalent …

Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array

Z Li, C Shi, T Zhang, Y Xie, J Liu, B Yuan… - Proceedings of the 2021 …, 2021 - dl.acm.org
With the popularity of intelligent audio systems in recent years, their vulnerabilities have
become an increasing public concern. Existing studies have designed a set of machine …

{QFA2SR}:{Query-Free} Adversarial Transfer Attacks to Speaker Recognition Systems

G Chen, Y Zhang, Z Zhao, F Song - 32nd USENIX Security Symposium …, 2023 - usenix.org
Current adversarial attacks against speaker recognition systems (SRSs) require either white-
box access or heavy black-box queries to the target SRS, thus still falling behind practical …