Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems

H Abdullah, K Warren, V Bindschaedler… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Speech and speaker recognition systems are employed in a variety of applications, from
personal assistants to telephony surveillance and biometric authentication. The wide …

A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

The security of autonomous driving: Threats, defenses, and future directions

K Ren, Q Wang, C Wang, Z Qin… - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
Autonomous vehicles (AVs) have promised to drastically improve the convenience of driving
by releasing the burden of drivers and reducing traffic accidents with more precise control …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

Biometrics in the era of COVID-19: challenges and opportunities

M Gomez-Barrero, P Drozdowski… - … on Technology and …, 2022 - ieeexplore.ieee.org
Since early 2020, the COVID-19 pandemic has had a considerable impact on many aspects
of daily life. A range of different measures have been implemented worldwide to reduce the …

Vocalprint: exploring a resilient and secure voice authentication via mmwave biometric interrogation

H Li, C Xu, AS Rathore, Z Li, H Zhang, C Song… - Proceedings of the 18th …, 2020 - dl.acm.org
With the continuing growth of voice-controlled devices, voice metrics have been widely used
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …

Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction

L Blue, K Warren, H Abdullah, C Gibson… - 31st USENIX Security …, 2022 - usenix.org
Generative machine learning models have made convincing voice synthesis a reality. While
such tools can be extremely useful in applications where people consent to their voices …

" Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

E Wenger, M Bronckers, C Cianfarani, J Cryan… - Proceedings of the …, 2021 - dl.acm.org
Advances in deep learning have introduced a new wave of voice synthesis tools, capable of
producing audio that sounds as if spoken by a target speaker. If successful, such tools in the …

Your microphone array retains your identity: A robust voice liveness detection system for smart speakers

Y Meng, J Li, M Pillari, A Deopujari, L Brennan… - 31st USENIX Security …, 2022 - usenix.org
Though playing an essential role in smart home systems, smart speakers are vulnerable to
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …

LVID: A multimodal biometrics authentication system on smartphones

L Wu, J Yang, M Zhou, Y Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Voice authentication is becoming increasingly popular, which offers potential benefits over
knowledge and possession based authentication methods. Meanwhile, the unique features …