SoK: A Study of the Security on Voice Processing Systems

12/24/2021
by   Robert Chang, et al.
0

As the use of Voice Processing Systems (VPS) continues to become more prevalent in our daily lives through the increased reliance on applications such as commercial voice recognition devices as well as major text-to-speech software, the attacks on these systems are increasingly complex, varied, and constantly evolving. With the use cases for VPS rapidly growing into new spaces and purposes, the potential consequences regarding privacy are increasingly more dangerous. In addition, the growing number and increased practicality of over-the-air attacks have made system failures much more probable. In this paper, we will identify and classify an arrangement of unique attacks on voice processing systems. Over the years research has been moving from specialized, untargeted attacks that result in the malfunction of systems and the denial of services to more general, targeted attacks that can force an outcome controlled by an adversary. The current and most frequently used machine learning systems and deep neural networks, which are at the core of modern voice processing systems, were built with a focus on performance and scalability rather than security. Therefore, it is critical for us to reassess the developing voice processing landscape and to identify the state of current attacks and defenses so that we may suggest future developments and theoretical improvements.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/24/2018

An Overview of Vulnerabilities of Voice Controlled Systems

Over the last few years, a rapidly increasing number of Internet-of-Thin...
research
10/11/2019

Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

Automatic speech recognition and voice identification systems are being ...
research
05/28/2022

SuperVoice: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech

Voice-activated systems are integrated into a variety of desktop, mobile...
research
07/30/2021

Practical Attacks on Voice Spoofing Countermeasures

Voice authentication has become an integral part in security-critical op...
research
11/25/2019

Failure Modes in Machine Learning Systems

In the last two years, more than 200 papers have been written on how mac...
research
01/24/2018

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition

ASR (automatic speech recognition) systems like Siri, Alexa, Google Voic...
research
03/18/2019

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Voice Processing Systems (VPSes), now widely deployed, have been made si...

Please sign up or login with your details

Forgot password? Click here to reset