https://surfingattack.github.io/

From the paper:
> Abstract—With recent advances in artificial intelligence and natural language 
> processing, voice has become a primary method for human-computer interaction. 
>  It has enabled game-changing new technologies in both commercial sectors and 
> military sectors,such as Siri, Alexa, Google Assistant, and voice-controlled 
> naval warships.  Recently, researchers have demonstrated that these voice 
> assistant systems are susceptible to signal injection at the inaudible 
> frequencies.  To date, most of the existing works focus primarily on 
> delivering a single command via line-of-sight ultrasound speaker or extending 
> the range of this attack via speaker array. However, besides air, sound waves 
> also propagate through other materials where vibration is possible.  In this 
> work, we aim to understand the characteristics of this new genre of attack in 
> the context of different transmission media.Furthermore, by leveraging the 
> unique properties of acoustic transmission in solid materials, we design a 
> new attack called Surfing Attack that would enable multiple rounds of 
> interactions between the voice-controlled device and the attacker over a 
> longer distance and without the need to be in line-of-sight. By completing 
> the interaction loop of inaudible sound attack,Surfing Attack enables new 
> attack scenarios, such as hijacking a mobile Short Message Service (SMS) 
> passcode, making ghost fraud calls without owners’ knowledge, etc.  To 
> accomplish Surfing Attack, we have solved several major challenges.  First, 
> the signal has been specially designed to allow omni-directional transmission 
> for performing effective attacks over a solid medium.  Second, the new attack 
> enables multi-round interaction without alerting the legitimate user at the 
> scene, which is challenging since the device is designed to interact with 
> users in physical proximity rather than sensors.  To mitigate this newly 
> discovered threat, we also provide discussions and experimental results on 
> potential countermeasures to defend against this new threat.

-- 
☣ uǝlƃ
============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com
archives back to 2003: http://friam.471366.n2.nabble.com/
FRIAM-COMIC http://friam-comic.blogspot.com/ by Dr. Strangelove

Reply via email to