An Overview of Vulnerabilities of Voice Controlled Systems

03/24/2018
by   Yuan Gong, et al.
0

Over the last few years, a rapidly increasing number of Internet-of-Things (IoT) systems that adopt voice as the primary user input have emerged. These systems have been shown to be vulnerable to various types of voice spoofing attacks. However, how exactly these techniques differ or relate to each other has not been extensively studied. In this paper, we provide a survey of recent attack and defense techniques for voice controlled systems and propose a classification of these techniques. We also discuss the need for a universal defense strategy that protects a system from various types of attacks.

READ FULL TEXT
research
11/16/2018

Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues

Over the last few years, a rapidly increasing number of Internet-of-Thin...
research
12/24/2021

SoK: A Study of the Security on Voice Processing Systems

As the use of Voice Processing Systems (VPS) continues to become more pr...
research
07/23/2023

Backdoor Attacks against Voice Recognition Systems: A Survey

Voice Recognition Systems (VRSs) employ deep learning for speech recogni...
research
04/06/2019

ReMASC: Realistic Replay Attack Corpus for Voice Controlled Systems

This paper introduces a new database of voice recordings with the goal o...
research
08/06/2018

Nonsense Attacks on Google Assistant

This paper presents a novel attack on voice-controlled digital assistant...
research
10/06/2022

PSVRF: Learning to restore Pitch-Shifted Voice without reference

Pitch scaling algorithms have a significant impact on the security of Au...
research
05/28/2020

Adversarial Attacks and Defense on Texts: A Survey

Deep leaning models have been used widely for various purposes in recent...

Please sign up or login with your details

Forgot password? Click here to reset