Tangible privacy for smart voice assistants: Bystanders' perceptions of physical device controls

I Ahmad, T Akter, Z Buher, R Farzan… - Proceedings of the …, 2022 - dl.acm.org
Smart voice assistants such as Amazon Alexa and Google Home are becoming increasingly
pervasive in our everyday environments. Despite their benefits, their miniaturized and …

Thwarting unauthorized voice eavesdropping via touch sensing in mobile systems

W Huang, W Tang, K Zhang, H Zhu… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Enormous mobile applications (apps) now support voice functionality for convenient user-
device interaction. However, these voice-enabled apps may spitefully invoke microphone to …

“You offer privacy like you offer tea”: Investigating mechanisms for improving guest privacy in IoT-equipped households

K Marky, N Gerber, MG Pelzer, M Khamis… - Proceedings on …, 2022 - petsymposium.org
IoT devices are becoming more common and prevalent in private households. Since guests
can be present in IoT-equipped households, IoT devices can pose considerable privacy …

Unauthorized microphone access restraint based on user behavior perception in mobile devices

W Huang, W Tang, H Chen, H Jiang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Microphone has been widely integrated into mobile devices to provide physical basis for
human-device voice interaction. However, the microphone may be spitefully invoked by …

Privacy controls for always-listening devices

N Malkin, S Egelman, D Wagner - Proceedings of the New Security …, 2019 - dl.acm.org
Intelligent voice assistants (IVAs) and other voice-enabled devices already form an integral
component of the Internet of Things and will continue to grow in popularity. As their …

TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals

S Ramesh, GS Hadi, S Yang, MC Chan… - Proceedings of the 2022 …, 2022 - dl.acm.org
We are witnessing a heightened surge in remote privacy attacks on laptop computers. These
attacks often exploit malware to remotely gain access to webcams and microphones in order …

Effects of privacy permissions on user choices in voice assistant app stores

G Liu, N Malkin - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
Intelligent voice assistants, and the thirdparty apps (aka “skills” or “actions”) that power them,
are increasing in popularity and beginning to experiment with the ability to continuously …

SoK:(Un) usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research

Y Iravantchi, P Emami-Naeini… - Proceedings on Privacy …, 2025 - petsymposium.org
As the number of smart devices increases in our lives, the data they collect to perform
valuable tasks, such as voice assistant requests, comes at the cost of user privacy. To …

[PDF][PDF] Preventing sensitive-word recognition using self-supervised learning to preserve user-privacy for automatic speech recognition.

Y Liu, A Kapadia, DS Williamson - INTERSPEECH, 2022 - the-aspire-group.github.io
Smart voice assistants that rely on automatic speech recognition (ASR) are widely used by
people for multiple reasons. These devices, however, feature “always on” microphones that …

Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives

N Malkin, D Wagner, S Egelman - Proceedings of the ACM on Human …, 2022 - dl.acm.org
As intelligent voice assistants become more widespread and the scope of their listening
increases, they become attractive targets for attackers. In the future, a malicious actor could …