Lei et al., 2018 - Google Patents
The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasuresLei et al., 2018
View PDF- Document ID
- 4084148693840176842
- Author
- Lei X
- Tu G
- Liu A
- Li C
- Xie T
- Publication year
- Publication venue
- 2018 IEEE conference on communications and network security (CNS)
External Links
Snippet
Home Digital Voice Assistants (HDVAs) are getting popular in recent years. Users can control smart devices and get living assistance through those HDVAs (eg, Amazon Alexa, Google Home) using voice. In this work, we study the insecurity of HDVA services by using …
- 238000011156 evaluation 0 abstract description 5
Classifications
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61N—ELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
- A61N1/00—Electrotherapy; Circuits therefor
- A61N1/18—Applying electric currents by contact electrodes
- A61N1/32—Applying electric currents by contact electrodes alternating or intermittent currents
- A61N1/36—Applying electric currents by contact electrodes alternating or intermittent currents for stimulation, e.g. heart pace-makers
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lei et al. | The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures | |
Lei et al. | The insecurity of home digital voice assistants--amazon alexa as a case study | |
Heartfield et al. | A taxonomy of cyber-physical threats and impact in the smart home | |
Karapanos et al. | {Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound | |
US10310082B2 (en) | Acoustic spatial diagnostics for smart home management | |
Truong et al. | Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication | |
Xie et al. | GeneWave: Fast authentication and key agreement on commodity mobile devices | |
Zhang et al. | ${\ssr {PriWhisper}} $: Enabling Keyless Secure Acoustic Communication for Smartphones | |
US11436311B2 (en) | Method and apparatus for secure and usable mobile two-factor authentication | |
Tang et al. | Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes | |
Han et al. | Proximity-proof: Secure and usable mobile two-factor authentication | |
WO2014113882A1 (en) | Computer system and method for indoor geo-fencing and access control | |
US10999653B2 (en) | Detecting and monitoring location of wireless-enabled devices in a physical space | |
Shrestha et al. | Sensor-based proximity detection in the face of active adversaries | |
Wang et al. | SoundAuth: Secure zero-effort two-factor authentication based on audio signals | |
Yi et al. | WearLock: unlocking your phone via acoustics using smartwatch | |
US10656268B2 (en) | Acoustic spatial diagnostics for smart home management | |
Zhu et al. | QuickAuth: Two-factor quick authentication based on ambient sound | |
Al-Attar et al. | Smartphone-key: Hands-free two-factor authentication for voice-controlled devices using wi-fi location | |
AlQahtani et al. | 0ei2fa: Zero effort indoor two factor authentication | |
Yan et al. | Real-time identification of rogue WiFi connections in the wild | |
Truong et al. | DoubleEcho: Mitigating context-manipulation attacks in copresence verification | |
Zhu et al. | Adversarial wifi sensing | |
US10880284B1 (en) | Repurposing limited functionality devices as authentication factors | |
Fomichev et al. | Next2You: robust copresence detection based on channel state information |