Abstract
Deepfakes are created by using artificial intelligence algorithms to generate realistic images, videos or even sound of people that do not actually exist. These fake images, videos or sound can be used to create fake news stories, or to impersonate someone for malicious purposes. As these deepfakes are becoming increasingly realistic and difficult to detect, they pose a serious threat to the security and integrity of our digital control and information.
In this work, spoofing techniques have been used to try to impersonate another person before Amazon Alexa or other Virtual Voice Assistants (VVA), and verify that unauthorized activities could be done. In order to do this, we use Coqui YourTTS to clone another person’s voice using a Telegram bot, which will create audios that tricks Alexa and its use of voice profiles that allow the identification of people.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Acostsa, L.H., Reinhardt, D.: Multi-user privacy with voice-controlled digital assistants. In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), pp. 30–33 (2022). https://doi.org/10.1109/PerComWorkshops53856.2022.9767270
Blue, L., Vargas, L., Traynor, P.: Hello, is it me you’re looking for? differentiating between human and electronic speakers for voice interface security. In: Proceedings of the 11th ACM Conference on Security Privacy in Wireless and Mobile Networks, pp. 123–133 (2018)
Casanova et al.: YourTTS: towards zero-shot multi-speaker TTS and zero-shot voice conversion for everyone. Tech. rep. arXiv:2112.02418. arXiv, (2022) https://doi.org/10.48550/arXiv.2112.02418. http://arxiv.org/abs/2112.02418
Hammi B., et al.: Survey on smart homes: vulnerabilities, risks, and countermeasures. In: Comput. Secur. 117 102677 (2022)
Lit, Y., Kim, S., Sy, E., .: A survey on amazon alexa attack surfaces. In: 2021 IEEE 18th Annual Consumer Communications Networking Conference (CCNC), IEEE pp. 1–7 (2021)
Meng, Y. et al. Wivo: Enhancing the security of voice control system via wireless signal in IoT environment. In: Proceedings of the Eighteenth ACM International Symposium on Mobile AD Hoc Networking and Computing, pp. 81–90 (2018)
Python Telegram Bot. (2022). https://python-telegram-bot.org/
Telegram. Bots: An introduction for developers. (2022). https://core.telegram.org/bots
Acknowledgements
Work co-financed by the Canary Islands Agency for Research, Innovation and Information Society of the Ministry of Economy, Knowledge and Employment and by the European Social Fund (ESF) Integrated Operational Program of the Canary Islands 2014–2020, Axis 3 Priority Topic 74 (85% ).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Nacimiento-García, E., Caballero-Gil, C., Nacimiento-García, A., González-González, C. (2023). Alexa, Do What I Want To. Implementing a Voice Spoofing Attack Tool for Virtual Voice Assistants. In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham. https://doi.org/10.1007/978-3-031-21333-5_41
Download citation
DOI: https://doi.org/10.1007/978-3-031-21333-5_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21332-8
Online ISBN: 978-3-031-21333-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)