Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands

02/17/2022
by   Sergio Esposito, et al.
0

We present Alexa versus Alexa (AvA), a novel attack that leverages audio files containing voice commands and audio reproduction methods in an offensive fashion, to gain control of Amazon Echo devices for a prolonged amount of time. AvA leverages the fact that Alexa running on an Echo device correctly interprets voice commands originated from audio files even when they are played by the device itself – i.e., it leverages a command self-issue vulnerability. Hence, AvA removes the necessity of having a rogue speaker in proximity of the victim's Echo, a constraint that many attacks share. With AvA, an attacker can self-issue any permissible command to Echo, controlling it on behalf of the legitimate user. We have verified that, via AvA, attackers can control smart appliances within the household, buy unwanted items, tamper linked calendars and eavesdrop on the user. We also discovered two additional Echo vulnerabilities, which we call Full Volume and Break Tag Chain. The Full Volume increases the self-issue command recognition rate, by doubling it on average, hence allowing attackers to perform additional self-issue commands. Break Tag Chain increases the time a skill can run without user interaction, from eight seconds to more than one hour, hence enabling attackers to setup realistic social engineering scenarios. By exploiting these vulnerabilities, the adversary can self-issue commands that are correctly executed 99 and can keep control of the device for a prolonged amount of time. We reported these vulnerabilities to Amazon via their vulnerability research program, who rated them with a Medium severity score. Finally, to assess limitations of AvA on a larger scale, we provide the results of a survey performed on a study group of 18 users, and we show that most of the limitations against AvA are hardly used in practice.

READ FULL TEXT

page 5

page 6

page 13

research
02/04/2023

BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers

The growing adoption of voice-enabled devices (e.g., smart speakers), pa...
research
02/09/2023

PETIoT: PEnetration Testing the Internet of Things

Attackers may attempt exploiting Internet of Things (IoT) devices to ope...
research
12/09/2017

The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study

Home Digital Voice Assistants (HDVAs) are getting popular in recent year...
research
08/17/2023

Smart Bulbs can be Hacked to Hack into your Household

The IoT is getting more and more pervasive. Even the simplest devices, s...
research
05/20/2020

Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning

This paper investigates the privacy leakage of smart speakers under an e...
research
06/15/2020

Using Amazon Alexa APIs as a Source of Digital Evidence

With the release of Amazon Alexa and the first Amazon Echo device, the c...
research
08/31/2022

In Alexa, We Trust. Or Do We? : An analysis of People's Perception of Privacy Policies

Smart home devices have found their way through people's homes as well a...

Please sign up or login with your details

Forgot password? Click here to reset