NUANCE: Near Ultrasound Attack On Networked Communication Environments

04/25/2023
by   Forrest McKee, et al.
0

This study investigates a primary inaudible attack vector on Amazon Alexa voice services using near ultrasound trojans and focuses on characterizing the attack surface and examining the practical implications of issuing inaudible voice commands. The research maps each attack vector to a tactic or technique from the MITRE ATT CK matrix, covering enterprise, mobile, and Industrial Control System (ICS) frameworks. The experiment involved generating and surveying fifty near-ultrasonic audios to assess the attacks' effectiveness, with unprocessed commands having a 100 achieving a 58 previously unaddressed attack surfaces, ensuring comprehensive detection and attack design while pairing each ATT CK Identifier with a tested defensive method, providing attack and defense tactics for prompt-response options. The main findings reveal that the attack method employs Single Upper Sideband Amplitude Modulation (SUSBAM) to generate near-ultrasonic audio from audible sources, transforming spoken commands into a frequency range beyond human-adult hearing. By eliminating the lower sideband, the design achieves a 6 kHz minimum from 16-22 kHz while remaining inaudible after transformation. The research investigates the one-to-many attack surface where a single device simultaneously triggers multiple actions or devices. Additionally, the study demonstrates the reversibility or demodulation of the inaudible signal, suggesting potential alerting methods and the possibility of embedding secret messages like audio steganography.

READ FULL TEXT
research
02/23/2021

A Survey on Amazon Alexa Attack Surfaces

Since being launched in 2014, Alexa, Amazon's versatile cloud-based voic...
research
07/23/2023

Adversarial Agents For Attacking Inaudible Voice Activated Devices

The paper applies reinforcement learning to novel Internet of Thing conf...
research
06/28/2023

Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound

Automatic Speaker Recognition Systems (SRSs) have been widely used in vo...
research
02/13/2022

I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy

In this paper, we present AltVoice – a system designed to help user's pr...
research
06/27/2019

Sensitivity to Haptic-Audio Envelope Asynchrony

We want to understand the human capabilities to perceive amplitude simil...
research
02/04/2023

BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers

The growing adoption of voice-enabled devices (e.g., smart speakers), pa...
research
09/23/2019

Speech Replay Detection with x-Vector Attack Embeddings and Spectral Features

We present our system submission to the ASVspoof 2019 Challenge Physical...

Please sign up or login with your details

Forgot password? Click here to reset