GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line

02/05/2022
by   Yuanda Wang, et al.
0

Inaudible voice command injection is one of the most threatening attacks towards voice assistants. Existing attacks aim at injecting the attack signals over the air, but they require the access to the authorized user's voice for activating the voice assistants. Moreover, the effectiveness of the attacks can be greatly deteriorated in a noisy environment. In this paper, we explore a new type of channel, the power line side-channel, to launch the inaudible voice command injection. By injecting the audio signals over the power line through a modified charging cable, the attack becomes more resilient against various environmental factors and liveness detection models. Meanwhile, the smartphone audio output can be eavesdropped through the modified cable, enabling a highly-interactive attack. To exploit the power line side-channel, we present GhostTalk, a new hidden voice attack that is capable of injecting and eavesdropping simultaneously. Via a quick modification of the power bank cables, the attackers could launch interactive attacks by remotely making a phone call or capturing private information from the voice assistants. GhostTalk overcomes the challenge of bypassing the speaker verification system by stealthily triggering a switch component to simulate the press button on the headphone. In case when the smartphones are charged by an unaltered standard cable, we discover that it is possible to recover the audio signal from smartphone loudspeakers by monitoring the charging current on the power line. To demonstrate the feasibility, we design GhostTalk-SC, an adaptive eavesdropper system targeting smartphones charged in the public USB ports. To correctly recognize the private information in the audio, GhostTalk-SC carefully extracts audio spectra and integrates a neural network model to classify spoken digits in the speech.

READ FULL TEXT

page 1

page 4

page 5

page 7

page 8

page 11

page 13

research
05/16/2018

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones

Intelligent Personal Assistant (IA), also known as Voice Assistant (VA),...
research
12/02/2022

AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary

With the increasing popularity of voice-based applications, acoustic eav...
research
06/22/2020

Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems

We propose a new class of signal injection attacks on microphones by phy...
research
07/12/2019

Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers

In this paper, we build a speech privacy attack that exploits speech rev...
research
05/26/2021

Wireless Charging Power Side-Channel Attacks

This paper shows that today's wireless charging interface is vulnerable ...
research
12/01/2020

Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant

Voice assistants are now ubiquitous and listen in on our everyday lives....
research
09/21/2020

Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony

New security and privacy concerns arise due to the growing popularity of...

Please sign up or login with your details

Forgot password? Click here to reset