Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony | IEEE Conference Publication | IEEE Xplore