skip to main content
10.1145/3444370.3444560acmotherconferencesArticle/Chapter ViewAbstractPublication PagesciatConference Proceedingsconference-collections
research-article

A defense scheme of voice control system against DolphinAttack

Authors Info & Claims
Published:04 January 2021Publication History

ABSTRACT

DolphinAttack is an attack model aiming at audio frequency identification vulnerabilities in voice control system microphones. It modulates voice command on the ultrasonic carrier to achieve inaudibility, and the modulated low frequency audio command can be successfully demodulated, recorded, and interpreted by the speech recognition system. The DolphinAttack threatens the property right and privacy of smart device users. In the paper, we propose a security reinforcement method for voice control system based on disconnected loop authentication that combines software and hardware to prevent DolphinAttack. The security enhancement solution that we proposed based on secondary authentication also can mitigate some unknown vulnerabilities. When the attacker or user wakes up the speech recognition system and performs command control, it will force the voice control system at a high security level to perform secondary authentication. If the command passes the secondary authentication, it enters the execution state. Otherwise, the command is discarded and the report is sent to the user. This kind of security enhancement avoids the privacy leakage and property damage caused by the DolphinAttack at some degree.

References

  1. Your home at your command. [Online]. Available URL: https://www.apple.com/ios/home/ (2017-12-14).Google ScholarGoogle Scholar
  2. Ruohan Meng, Steven G. Rice, Jin Wang and Xingming Sun. A fusion steganographic algorithm based on faster R-CNN[J]. Computers, Materials & Continua, 2018, 55(1): 1--16.Google ScholarGoogle Scholar
  3. Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. Hidden voice commands. In Proceedings of the USENIX Security Symposium 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Yi Cao, Zhili Zhou, Xingming Sun and Chongzhi Gao. Coverless information hiding based on the molecular structure images of material[J]. Computers, Materials & Continua, 2018, 54 (2): 197--207.Google ScholarGoogle Scholar
  5. Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. DolphinAttack: Inaudible Voice Commands. In Proceedings of the 2017 ACM SIGSAC Conf. on Computer and Communications Security (CCS) Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa. Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding. arXiv preprint arXiv:1808.05665, 2018.Google ScholarGoogle Scholar
  7. Microphone. [Online]. Available URL: https://en.wikipedia.org/wiki/Microphone (2018-12-09)Google ScholarGoogle Scholar
  8. Dibya Mukhopadhyay, Maliheh Shirvanian, and Nitesh Saxena. All your voices are belong to us: Stealing voices to fool humans and machines. In Proceedings of the European Symposium on Research in Computer Security. Springer, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. CommanderSong. [Online]. Available URL: https://mp.weixin.qq.com/s/VnhSCFVeQwHuYRFqL5JP4g (2020-12-01)Google ScholarGoogle Scholar

Index Terms

  1. A defense scheme of voice control system against DolphinAttack

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CIAT 2020: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
      December 2020
      597 pages
      ISBN:9781450387828
      DOI:10.1145/3444370

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 January 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      CIAT 2020 Paper Acceptance Rate94of232submissions,41%Overall Acceptance Rate94of232submissions,41%
    • Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader