Defending Against Microphone-Based Attacks with Personalized Noise
نویسندگان
چکیده
Abstract Voice-activated commands have become a key feature of popular devices such as smartphones, home assistants, and wearables. For convenience, many people configure their to be ‘always on’ listening for voice from the user using trigger phrase “Hey Siri,” “Okay Google,” or “Alexa.” However, false positives these triggers often result in privacy violations with conversations being inadvertently uploaded cloud. In addition, malware that can record one’s remains signifi-cant threat privacy. Unlike cameras, which physically obscure assured privacy, do not way knowing whether microphone is indeed off are left no tangible defenses against based attacks. We envision general-purpose physical defense uses speaker inject specialized obfuscating ‘babble noise’ into microphones protect automated human present comprehensive study how specially crafted, personalized ‘babble’ noise (‘MyBabble’) effective at moderate signal-to-noise ratios provide viable eavesdropping
منابع مشابه
Defending BitTorrent against Strategic Attacks
BitTorrent has shown to be efficient for bulk file transfer, however, it is susceptible to free riding by strategic clients like BitTyrant. Strategic peers configure the client software such that for very less or no contribution, they can obtain good download speeds. Such strategic nodes exploit the altruism in the swarm and consume resources at the expense of other honest nodes and create an u...
متن کاملDefending Against XML-Based Attacks Using State-Based XML Firewall
With the proliferation of service-oriented systems and cloud computing, web services security has gained much attention in recent years. Web service attacks, called XML-based attacks, typically occur at the SOAP message level, thus they are not readily handled by existing security mechanisms such as a conventional firewall. In order to provide effective security mechanisms for service-oriented ...
متن کاملDefending Against the Wily Surfer-Web-based Attacks and Defenses
Intrusions are often viewed as catastrophic events which destroy systems, wreak havoc on data through corruption or substitution, yield access to closely guarded sensitive information, or provide a springboard for hackers to attack other systems. Yet not all intrusions on the Web are the blatant, smash-and-grab, trash-the-site kind of attacks. Many attacks are more subtle, and some involve what...
متن کاملDefending RFID authentication protocols against DoS attacks
In this paper, we present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, we point out that in the O-FRAP protocol, the server can be subject to a denial-of-service attack due to a flaw in the database querying procedure. Our attack also applies to ...
متن کاملDefending Against Distributed Denial of Service Attacks
The Denial of Service attack, especially the Distributed Denial of Service (DDoS) attack, has become one of the major threats to the Internet. Generally, attackers launch DDoS attacks by directing a massive number of attack sources to send useless traffic to the victim. The victim’s services are disrupted when its host or network resources are occupied by the attack traffic. The threat of DDoS ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings on Privacy Enhancing Technologies
سال: 2021
ISSN: ['2299-0984']
DOI: https://doi.org/10.2478/popets-2021-0021