Voice Command Fingerprinting with Locality Sensitive Hashes

作者: Batyr Charyyev , Mehmet Hadi Gunes

DOI: 10.1145/3411498.3419963

关键词:

摘要: Smart home speakers are deployed in millions of homes around the world. These enable users to interact with other IoT devices household and provide voice assistance such as telling weather reminding appointments. Although smart facilitate many aspects our life, security privacy concerns should be analyzed addressed. In this paper, we show that an attacker sniffing network traffic can infer commands compromise users. Specifically, propose a method utilizes fingerprint without need for extracting features machine learning algorithms. We evaluated proposed on traces 100 different speakers. Our approach correctly infers 42% while models 22% 34%. also effectiveness padding recommended preventing command fingerprinting observed accuracy drops down 15% methods ranges from 6% padding.

参考文章(12)
Xin Rong, word2vec Parameter Learning Explained arXiv: Computation and Language. ,(2014)
Konstantin Berlin, Sergey Koren, Chen-Shan Chin, James P Drake, Jane M Landolin, Adam M Phillippy, Assembling large genomes with single-molecule sequencing and locality-sensitive hashing Nature Biotechnology. ,vol. 33, pp. 623- 630 ,(2015) , 10.1038/NBT.3238
Muhammad N. Marsono, Packet-level open-digest fingerprinting for spam detection on middleboxes International Journal of Network Management. ,vol. 22, pp. 12- 26 ,(2012) , 10.1002/NEM.780
Vassil Roussev, An evaluation of forensic similarity hashes Digital Investigation. ,vol. 8, ,(2011) , 10.1016/J.DIIN.2011.05.005
Esra Erdin, Chris Zachor, Mehmet Hadi Gunes, How to Find Hidden Users: A Survey of Attacks on Anonymity Networks IEEE Communications Surveys and Tutorials. ,vol. 17, pp. 2296- 2316 ,(2015) , 10.1109/COMST.2015.2453434
Ying Zhang, Huchuan Lu, Lihe Zhang, Xiang Ruan, Shun Sakai, Video anomaly detection based on locality sensitive hashing filters Pattern Recognition. ,vol. 59, pp. 302- 311 ,(2016) , 10.1016/J.PATCOG.2015.11.018
Hyunji Chung, Michaela Iorga, Jeffrey Voas, Sangjin Lee, “Alexa, Can I Trust You?” Computer. ,vol. 50, pp. 100- 104 ,(2017) , 10.1109/MC.2017.3571053
Metin Bilgin, İzzet Fatih Şentürk, None, Sentiment analysis on Twitter data with semi-supervised Doc2Vec 2017 International Conference on Computer Science and Engineering (UBMK). pp. 661- 666 ,(2017) , 10.1109/UBMK.2017.8093492
Ayyoob Hamza, Hassan Habibi Gharakheili, Theophilus A. Benson, Vijay Sivaraman, Detecting Volumetric Attacks on loT Devices via SDN-Based Monitoring of MUD Activity symposium on sdn research. pp. 36- 48 ,(2019) , 10.1145/3314148.3314352
Antônio J. Pinheiro, Jeandro de M. Bezerra, Caio A.P. Burgardt, Divanilson R. Campelo, Identifying IoT devices and events based on packet length from encrypted traffic Computer Communications. ,vol. 144, pp. 8- 17 ,(2019) , 10.1016/J.COMCOM.2019.05.012