Nothing Special   »   [go: up one dir, main page]

Lei et al., 2018 - Google Patents

The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures

Lei et al., 2018

View PDF
Document ID
4084148693840176842
Author
Lei X
Tu G
Liu A
Li C
Xie T
Publication year
Publication venue
2018 IEEE conference on communications and network security (CNS)

External Links

Snippet

Home Digital Voice Assistants (HDVAs) are getting popular in recent years. Users can control smart devices and get living assistance through those HDVAs (eg, Amazon Alexa, Google Home) using voice. In this work, we study the insecurity of HDVA services by using …
Continue reading at www.cse.msu.edu (PDF) (other versions)

Classifications

    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61NELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
    • A61N1/00Electrotherapy; Circuits therefor
    • A61N1/18Applying electric currents by contact electrodes
    • A61N1/32Applying electric currents by contact electrodes alternating or intermittent currents
    • A61N1/36Applying electric currents by contact electrodes alternating or intermittent currents for stimulation, e.g. heart pace-makers

Similar Documents

Publication Publication Date Title
Lei et al. The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures
Lei et al. The insecurity of home digital voice assistants--amazon alexa as a case study
Heartfield et al. A taxonomy of cyber-physical threats and impact in the smart home
Karapanos et al. {Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
US10310082B2 (en) Acoustic spatial diagnostics for smart home management
Truong et al. Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
Xie et al. GeneWave: Fast authentication and key agreement on commodity mobile devices
Zhang et al. ${\ssr {PriWhisper}} $: Enabling Keyless Secure Acoustic Communication for Smartphones
US11436311B2 (en) Method and apparatus for secure and usable mobile two-factor authentication
Tang et al. Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes
Han et al. Proximity-proof: Secure and usable mobile two-factor authentication
WO2014113882A1 (en) Computer system and method for indoor geo-fencing and access control
US10999653B2 (en) Detecting and monitoring location of wireless-enabled devices in a physical space
Shrestha et al. Sensor-based proximity detection in the face of active adversaries
Wang et al. SoundAuth: Secure zero-effort two-factor authentication based on audio signals
Yi et al. WearLock: unlocking your phone via acoustics using smartwatch
US10656268B2 (en) Acoustic spatial diagnostics for smart home management
Zhu et al. QuickAuth: Two-factor quick authentication based on ambient sound
Al-Attar et al. Smartphone-key: Hands-free two-factor authentication for voice-controlled devices using wi-fi location
AlQahtani et al. 0ei2fa: Zero effort indoor two factor authentication
Yan et al. Real-time identification of rogue WiFi connections in the wild
Truong et al. DoubleEcho: Mitigating context-manipulation attacks in copresence verification
Zhu et al. Adversarial wifi sensing
US10880284B1 (en) Repurposing limited functionality devices as authentication factors
Fomichev et al. Next2You: robust copresence detection based on channel state information