A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

[HTML][HTML] The digital harms of smart home devices: A systematic literature review

D Buil-Gil, S Kemp, S Kuenzel, L Coventry… - Computers in Human …, 2023 - Elsevier
The connection of home electronic devices to the internet allows remote control of physical
devices and involves the collection of large volumes of data. With the increase in the uptake …

[HTML][HTML] On the security and privacy challenges of virtual assistants

T Bolton, T Dargahi, S Belguith, MS Al-Rakhami… - Sensors, 2021 - mdpi.com
Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual
assistants (VAs) have grown in number and popularity. The sophisticated natural language …

When speakers are all ears: Characterizing misactivations of iot smart speakers

DJ Dubois, R Kolcun, AM Mandalari… - Proceedings on …, 2020 - petsymposium.org
Internet-connected voice-controlled speakers, also known as smart speakers, are
increasingly popular due to their convenience for everyday tasks such as asking about the …

Exploring deceptive design patterns in voice interfaces

K Owens, J Gunawan, D Choffnes… - Proceedings of the …, 2022 - dl.acm.org
Deceptive design patterns (sometimes called “dark patterns”) are user interface design
elements that may trick, deceive, or mislead users into behaviors that often benefit the party …

[HTML][HTML] Data privacy concerns using mhealth apps and smart speakers: Comparative interview study among mature adults

T Schroeder, M Haug, H Gewald - JMIR formative research, 2022 - formative.jmir.org
Background New technologies such as mobile health (mHealth) apps and smart speakers
make intensive use of sensitive personal data. Users are typically aware of this and express …

An Ensemble‐Based Multiclass Classifier for Intrusion Detection Using Internet of Things

D Rani, NS Gill, P Gulia… - Computational …, 2022 - Wiley Online Library
Internet of Things (IoT) is the fastest growing technology that has applications in various
domains such as healthcare, transportation. It interconnects trillions of smart devices through …

Chatbot security and privacy in the age of personal assistants

W Ye, Q Li - 2020 IEEE/ACM Symposium on Edge Computing …, 2020 - ieeexplore.ieee.org
The rise of personal assistants serves as a testament to the growing popularity of chatbots.
However, as the field advances, it is important for the conversational AI community to keep in …

Fingerprinting encrypted voice traffic on smart speakers with deep learning

C Wang, S Kennedy, H Li, K Hudson, G Atluri… - Proceedings of the 13th …, 2020 - dl.acm.org
This paper investigates the privacy leakage of smart speakers under an encrypted traffic
analysis attack, referred to as voice command fingerprinting. In this attack, an adversary can …

On the use of artificial intelligence to deal with privacy in IoT systems: A systematic literature review

G Giordano, F Palomba, F Ferrucci - Journal of Systems and Software, 2022 - Elsevier
Abstract The Internet of Things (IoT) refers to a network of Internet-enabled devices that can
make different operations, like sensing, communicating, and reacting to changes arising in …