Skip to main content

Alexa, Do What I Want To. Implementing a Voice Spoofing Attack Tool for Virtual Voice Assistants

  • Conference paper
  • First Online:
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022) (UCAmI 2022)

Abstract

Deepfakes are created by using artificial intelligence algorithms to generate realistic images, videos or even sound of people that do not actually exist. These fake images, videos or sound can be used to create fake news stories, or to impersonate someone for malicious purposes. As these deepfakes are becoming increasingly realistic and difficult to detect, they pose a serious threat to the security and integrity of our digital control and information.

In this work, spoofing techniques have been used to try to impersonate another person before Amazon Alexa or other Virtual Voice Assistants (VVA), and verify that unauthorized activities could be done. In order to do this, we use Coqui YourTTS to clone another person’s voice using a Telegram bot, which will create audios that tricks Alexa and its use of voice profiles that allow the identification of people.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Acostsa, L.H., Reinhardt, D.: Multi-user privacy with voice-controlled digital assistants. In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), pp. 30–33 (2022). https://doi.org/10.1109/PerComWorkshops53856.2022.9767270

  2. Blue, L., Vargas, L., Traynor, P.: Hello, is it me you’re looking for? differentiating between human and electronic speakers for voice interface security. In: Proceedings of the 11th ACM Conference on Security Privacy in Wireless and Mobile Networks, pp. 123–133 (2018)

    Google Scholar 

  3. Casanova et al.: YourTTS: towards zero-shot multi-speaker TTS and zero-shot voice conversion for everyone. Tech. rep. arXiv:2112.02418. arXiv, (2022) https://doi.org/10.48550/arXiv.2112.02418. http://arxiv.org/abs/2112.02418

  4. Hammi B., et al.: Survey on smart homes: vulnerabilities, risks, and countermeasures. In: Comput. Secur. 117 102677 (2022)

    Google Scholar 

  5. Lit, Y., Kim, S., Sy, E., .: A survey on amazon alexa attack surfaces. In: 2021 IEEE 18th Annual Consumer Communications Networking Conference (CCNC), IEEE pp. 1–7 (2021)

    Google Scholar 

  6. Meng, Y. et al. Wivo: Enhancing the security of voice control system via wireless signal in IoT environment. In: Proceedings of the Eighteenth ACM International Symposium on Mobile AD Hoc Networking and Computing, pp. 81–90 (2018)

    Google Scholar 

  7. Python Telegram Bot. (2022). https://python-telegram-bot.org/

  8. Telegram. Bots: An introduction for developers. (2022). https://core.telegram.org/bots

Download references

Acknowledgements

Work co-financed by the Canary Islands Agency for Research, Innovation and Information Society of the Ministry of Economy, Knowledge and Employment and by the European Social Fund (ESF) Integrated Operational Program of the Canary Islands 2014–2020, Axis 3 Priority Topic 74 (85% ).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eduardo Nacimiento-García .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nacimiento-García, E., Caballero-Gil, C., Nacimiento-García, A., González-González, C. (2023). Alexa, Do What I Want To. Implementing a Voice Spoofing Attack Tool for Virtual Voice Assistants. In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham. https://doi.org/10.1007/978-3-031-21333-5_41

Download citation

Publish with us

Policies and ethics