Adversarial Agents For Attacking Inaudible Voice Activated Devices

07/23/2023
by   Forrest McKee, et al.
0

The paper applies reinforcement learning to novel Internet of Thing configurations. Our analysis of inaudible attacks on voice-activated devices confirms the alarming risk factor of 7.6 out of 10, underlining significant security vulnerabilities scored independently by NIST National Vulnerability Database (NVD). Our baseline network model showcases a scenario in which an attacker uses inaudible voice commands to gain unauthorized access to confidential information on a secured laptop. We simulated many attack scenarios on this baseline network model, revealing the potential for mass exploitation of interconnected devices to discover and own privileged information through physical access without adding new hardware or amplifying device skills. Using Microsoft's CyberBattleSim framework, we evaluated six reinforcement learning algorithms and found that Deep-Q learning with exploitation proved optimal, leading to rapid ownership of all nodes in fewer steps. Our findings underscore the critical need for understanding non-conventional networks and new cybersecurity measures in an ever-expanding digital landscape, particularly those characterized by mobile devices, voice activation, and non-linear microphones susceptible to malicious actors operating stealth attacks in the near-ultrasound or inaudible ranges. By 2024, this new attack surface might encompass more digital voice assistants than people on the planet yet offer fewer remedies than conventional patching or firmware fixes since the inaudible attacks arise inherently from the microphone design and digital signal processing.

READ FULL TEXT

page 2

page 9

page 10

research
08/06/2018

Nonsense Attacks on Google Assistant

This paper presents a novel attack on voice-controlled digital assistant...
research
02/15/2023

Vulnerability Analysis of Digital Banks' Mobile Applications

There is a rapid increase in the number of mobile banking applications' ...
research
04/25/2023

NUANCE: Near Ultrasound Attack On Networked Communication Environments

This study investigates a primary inaudible attack vector on Amazon Alex...
research
02/04/2023

BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers

The growing adoption of voice-enabled devices (e.g., smart speakers), pa...
research
04/01/2016

AuDroid: Preventing Attacks on Audio Channels in Mobile Devices

Voice control is a popular way to operate mobile devices, enabling users...
research
02/20/2023

Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants

The radical advances in telecommunications and computer science have ena...
research
05/09/2019

Mitigating Deep Learning Vulnerabilities from Adversarial Examples Attack in the Cybersecurity Domain

Deep learning models are known to solve classification and regression pr...

Please sign up or login with your details

Forgot password? Click here to reset