We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Cryptography and Security

Title: An Overview of Vulnerabilities of Voice Controlled Systems

Abstract: Over the last few years, a rapidly increasing number of Internet-of-Things (IoT) systems that adopt voice as the primary user input have emerged. These systems have been shown to be vulnerable to various types of voice spoofing attacks. However, how exactly these techniques differ or relate to each other has not been extensively studied. In this paper, we provide a survey of recent attack and defense techniques for voice controlled systems and propose a classification of these techniques. We also discuss the need for a universal defense strategy that protects a system from various types of attacks.
Comments: 1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI)
Cite as: arXiv:1803.09156 [cs.CR]
  (or arXiv:1803.09156v1 [cs.CR] for this version)

Submission history

From: Yuan Gong [view email]
[v1] Sat, 24 Mar 2018 19:41:25 GMT (3390kb)

Link back to: arXiv, form interface, contact.