Location-aware Inaudible Attack Defense Towards Smart Speakers

Author:

Li Ping1ORCID,He Xinrui2ORCID,Zhang Zhenfei2ORCID,Han Feiyu3ORCID,Yang Panlong3ORCID,Lv Zhao2ORCID

Affiliation:

1. School of Computer Science and Technology, Anhui University, Hefei, China

2. Anhui University, Hefei, China

3. Nanjing University of Information Science and Technology, Nanjing, China

Abstract

Recent studies show that inaudible attacks pose a non-negligible security risk to smart speakers. While several countermeasures have been proposed to detect the occurrence of the inaudible attack passively, accurately locating the attack source in 3D free space remains an unresolved challenge. Arrow  is designed to bridge this gap by attempting to detect the occurrence of inaudible attacks and determine their localization simultaneously. Instead of relying on dedicated hardware components, Arrow  is implemented with the microphone array widely deployed on COTS(Commercial Off-The-Shelf) smart speakers. Throughout the spatial information captured by the microphone array, Arrow  establishes a spatial mapping model and derives orientation-related features to pinpoint the location of the attack source. Furthermore, to improve the robustness against co-channel interference, Arrow  adopt carefully-modulated ultrasonic waveforms to achieve noise-robust attack detection. Through the above technical mechanism, Arrow  can significantly improve the security level of voice assistants on smart speakers with nearly zero deployment cost. We implement a prototype of Arrow and conduct comprehensive performance evaluation. The results show Arrow can achieve 2.5° and 7° error in DoA estimation for horizontal and vertical angles, respectively.

Publisher

Association for Computing Machinery (ACM)

Reference38 articles.

1. Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, and Hyoungshick Kim. 2020. Void: A fast and light voice liveness detection system. In 29th USENIX Security Symposium (USENIX Security 20). 2685–2702.

2. Time delay estimation by generalized cross correlation methods

3. Zhongjie Ba, Bin Gong, Yuwei Wang, Yuxuan Liu, Peng Cheng, Feng Lin, Li Lu, and Kui Ren. 2024. Indelible “Footprints” of Inaudible Command Injection. IEEE Transactions on Information Forensics and Security (2024).

4. SPiDR

5. Joe C Chen, Kung Yao, and Ralph E Hudson. 2003. Acoustic source localization and beamforming: theory and practice. EURASIP journal on advances in signal processing 2003, 4(2003), 1–12.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.7亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2025 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3