@inproceedings{bf372d8836814dd4aece82daaed69700,
title = "BadVoice: Soundless voice-control replay attack on modern smartphones",
abstract = "Speech recognition is a technology that enables the recognition and translation of spoken language into data that can be interpreted by computers. With the development of speech recognition technologies, voice assistants on mobile devices, such as Siri or Google Voice have been introduced. Particularly, mobile device users can easily perform several commands on their mobile devices using these systems. However, this convenience causes a vulnerability in that an adversary can access the mobile device data and functions easily. This vulnerability could be exploited by the adversary because there are no authentication procedures. Recently, a remote attack on a voice assistant was introduced, but the attack can be considered to be unrealistic because of many assumptions. In this paper, we analyze the vulnerabilities of mobile device speech recognition systems. We also introduce the Toilet-time attack as a new realistic attack model. Furthermore, we prove the practicality of our attack model and evaluate attack scenarios using a new attack tool called BadVoice.",
keywords = "Mobile Application, Security, Voice Assistant",
author = "Young, {Park Joon} and Jin, {Jo Hyo} and Samuel Woo and Lee, {Dong Hoon}",
note = "Publisher Copyright: {\textcopyright} 2016 IEEE.; 8th International Conference on Ubiquitous and Future Networks, ICUFN 2016 ; Conference date: 05-07-2016 Through 08-07-2016",
year = "2016",
month = aug,
day = "9",
doi = "10.1109/ICUFN.2016.7537163",
language = "English",
series = "International Conference on Ubiquitous and Future Networks, ICUFN",
publisher = "IEEE Computer Society",
pages = "882--887",
booktitle = "ICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks",
}