首页> 外文会议>International Conference on Machine Learning for Cyber Security >Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users' Awareness
【24h】

Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users' Awareness

机译:谁激活了我的语音助手?对没有用户意识的Android手机的隐身攻击

获取原文

摘要

Voice Assistant (VAs) are increasingly popular for human-computer interaction (HCI) smartphones. To help users automatically conduct various tasks, these tools usually come with high privileges and are able to access sensitive system resources. A comprised VA is a stepping stone for attackers to hack into users' phones. Prior work has experimentally demonstrated that VAs can be a promising attack point for HCI tools. However, the state-of-the-art approaches require ad-hoc mechanisms to activate VAs that are non-trivial to trigger in practice and are usually limited to specific mobile platforms. To mitigate the limitations faced by the state-of-the-art, we propose a novel attack approach, namely Vaspy, which crafts the users' 'activation voice' by silently listening to users' phone calls. Once the activation voice is formed, Vaspy can select a suitable occasion to launch an attack. Vaspy embodies a machine learning model that learns suitable attacking times to prevent the attack from being noticed by the user. We implement a proof-of-concept spyware and test it on a range of popular Android phones. The experimental results demonstrate that this approach can silently craft the activation voice of the users and launch attacks. In the wrong hands, a technique like Vaspy can enable automated attacks to HCI tools. By raising awareness, we urge the community and manufacturers to revisit the risks of VAs and subsequently revise the activation logic to be resilient to the style of attacks proposed in this work.
机译:语音助手(VA)在人机交互(HCI)智能手机中越来越受欢迎。为了帮助用户自动执行各种任务,这些工具通常具有很高的特权,并且能够访问敏感的系统资源。包含的VA是攻击者入侵用户电话的垫脚石。先前的工作已通过实验证明VA可以成为HCI工具的有希望的攻击点。但是,最新的方法需要临时机制来激活VA,这在实践中并不是很容易触发的,通常仅限于特定的移动平台。为了缓解现有技术所面临的局限性,我们提出了一种新颖的攻击方法,即Vaspy,该方法通过静默收听用户的电话来制作用户的“激活语音”。形成激活声音后,Vaspy可以选择合适的时机发起攻击。 Vaspy体现了一种机器学习模型,该模型学习适当的攻击时间以防止用户注意到攻击。我们实施了概念验证间谍软件,并在一系列流行的Android手机上对其进行了测试。实验结果表明,该方法可以静默地制作用户的激活声音并发起攻击。如果使用不当,Vaspy之类的技术可能会自动攻击HCI工具。通过提高意识,我们敦促社区和制造商重新评估VA的风险,并随后修改激活逻辑以适应本工作中提出的攻击方式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号