{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:43:39Z","timestamp":1743126219872,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031105388"},{"type":"electronic","value":"9783031105395"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10539-5_4","type":"book-chapter","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T13:05:22Z","timestamp":1657890322000},"page":"49-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Look into\u00a0the\u00a0Vulnerability of\u00a0Voice Assisted IoT"],"prefix":"10.1007","author":[{"given":"Raghunath","family":"Maji","sequence":"first","affiliation":[]},{"given":"Atreyee","family":"Biswas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1060-5778","authenticated-orcid":false,"given":"Rituparna","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,16]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"4407","DOI":"10.17485\/IJST\/v13i43.1911","volume":"1343","author":"A Muthukumaran","year":"2020","unstructured":"Muthukumaran, A.: Optimizing the usage of voice assistants for shopping. Indian J. Sci. Tech. 1343, 4407\u20134416 (2020). https:\/\/doi.org\/10.17485\/IJST\/v13i43.1911","journal-title":"Indian J. Sci. Tech."},{"key":"4_CR2","unstructured":"Martin, T.: (2021). https:\/\/www.cnet.com\/home\/smart-home\/alexa-features-you-need-to-use-in-the-kitchen\/"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1080\/02763869.2018.1404391","volume":"37","author":"M Hoy","year":"2018","unstructured":"Hoy, M.: Alexa, Siri, Cortana, and more: an introduction to voice assistants. Med. Ref. Serv. Q. 37, 81\u201388 (2018). https:\/\/doi.org\/10.1080\/02763869.2018.1404391","journal-title":"Med. Ref. Serv. Q."},{"key":"4_CR4","unstructured":"Wolfson, S.: Amazon\u2019s Alexa recorded private conversation and sent it to random contact (2018). https:\/\/www.theguardian.com\/technology\/2018\/may\/24\/amazon-alexa-recorded-conversation"},{"issue":"12","key":"4_CR5","doi-asserted-by":"publisher","first-page":"2080","DOI":"10.1109\/TASLP.2019.2940662","volume":"27","author":"Y-H Tu","year":"2019","unstructured":"Tu, Y.-H., Du, J., Lee, C.-H.: Speech enhancement based on teacher-student deep learning using improved speech presence probability for noise-robust speech recognition. IEEE\/ACM Trans. Audio Speech Lang. Process. 27(12), 2080\u20132091 (2019)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Lei, X., Tu, G.-H., Liu, A.X., Li, C.-Y., Xie, T.: The insecurity of home digital voice assistants - vulnerabilities, attacks and countermeasures. In: IEEE Conference on Communications and Network Security (CNS), pp. 1\u20139 (2018). https:\/\/doi.org\/10.1109\/CNS.2018.8433167","DOI":"10.1109\/CNS.2018.8433167"},{"issue":"9","key":"4_CR7","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MC.2017.3571053","volume":"50","author":"H Chung","year":"2017","unstructured":"Chung, H., Iorga, M., Voas, J., Lee, S.: Alexa, can I trust you? Computer 50(9), 100\u2013104 (2017). https:\/\/doi.org\/10.1109\/MC.2017.3571053","journal-title":"Computer"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Wang, P., Lu, X., Hongyu, S., Lv, W.: Application of speech recognition technology in IoT smart home. In: 2019 IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (2019). https:\/\/doi.org\/10.1109\/IMCEC46724.2019.8984175","DOI":"10.1109\/IMCEC46724.2019.8984175"},{"issue":"5","key":"4_CR9","doi-asserted-by":"publisher","first-page":"8406","DOI":"10.1109\/JIOT.2019.2917933","volume":"6","author":"Z Ma","year":"2019","unstructured":"Ma, Z., Liu, Y., Liu, X., Ma, J., Li, F.: Privacy-preserving outsourced speech recognition for smart IoT devices. IEEE Int. Things J. 6(5), 8406\u20138420 (2019)","journal-title":"IEEE Int. Things J."},{"key":"4_CR10","unstructured":"JAMEY (2021). https:\/\/www.whatthetech.tv\/voice-assistants-are-always-listening-should-you-be-worried\/"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Lau, J., Zimmerman, B., Schaub, F.: Alexa, are you listening? privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 31 (2018). https:\/\/doi.org\/10.1145\/3274371, Article 102","DOI":"10.1145\/3274371"},{"key":"4_CR12","unstructured":"Barda, D., Zaikin, R., Shriki, Y.: Keeping the gate locked on your IoT devices: vulnerabilities found on Amazon\u2019s Alexa (2020). https:\/\/research.checkpoint.com\/2020\/amazons-alexa-hacked\/"},{"issue":"1","key":"4_CR13","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s00779-018-1174-x","volume":"23","author":"M Ford","year":"2018","unstructured":"Ford, M., Palmer, W.: Alexa, are you listening to me? an analysis of Alexa voice service network traffic. Pers. Ubiquit. Comput. 23(1), 67\u201379 (2018). https:\/\/doi.org\/10.1007\/s00779-018-1174-x","journal-title":"Pers. Ubiquit. Comput."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Alepis, E., Patsakis, C.: Monkey says, monkey does: security and privacy on voice assistants. IEEE Access 5(2017), 17841\u201317851 (2017). https:\/\/doi.org\/10.1109\/access.2017.2747626","DOI":"10.1109\/ACCESS.2017.2747626"},{"key":"4_CR15","unstructured":"Lei, X., Tu, G.H., Liu, A.X., Ali, K., Li, C.Y., Xie, T.: The insecurity of home digital voice assistants: Amazon Alexa as a case study (2017). https:\/\/arxiv.org\/pdf\/1712.03327.pdf"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., Xu, W.: DolphinAttack: inaudible voice commands. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017). Association for Computing Machinery, New York, pp. 103\u2013117 (2017). https:\/\/doi.org\/10.1145\/3133956.3134052","DOI":"10.1145\/3133956.3134052"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., Qian, F.: Dangerous skills: understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1381\u20131396 (2019)","DOI":"10.1109\/SP.2019.00016"},{"key":"4_CR18","unstructured":"Lai, A.: Sneaky kid orders \\$350 worth of Toys on Her Mom\u2019s Amazon account (2018). https:\/\/mom.me\/news\/271144-sneaky-kid-orders-350-worth-toys-her-moms-amazon-account\/"},{"key":"4_CR19","unstructured":"STMicroelectronics: MP23AB02BTR MEMS audio sensor, high-performance analog bottom-port microphone (2014). http:\/\/www.mouser.com\/ds\/2\/389\/mp23ab02b-955093.pdf"},{"key":"4_CR20","unstructured":"STMicroelectronics: . MP34DB02 MEMS audio sensor omnidirectional digital microphone (2016). http:\/\/www.mouser.com\/ds\/2\/389\/mp34db02-955149.pdf"},{"issue":"2","key":"4_CR21","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s11227-012-0831-5","volume":"63","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M.: A survey on security issues and solutions at different layers of Cloud computing. J. Supercomput. 63(2), 561\u2013592 (2013). https:\/\/doi.org\/10.1007\/s11227-012-0831-5","journal-title":"J. Supercomput."},{"key":"4_CR22","unstructured":"Picchi, A.: Amazon workers are listening to what you tell Alexa (2019). https:\/\/www.cbsnews.com\/news\/amazon workers-are-listening-to-what-you-tell-alexa\/"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Ramokapane, K.M., Rashid, A., Such, J.M.: Assured deletion in the cloud: requirements, challenges and future directions. In: Proceedings of the 2016 ACM on Cloud Computing Security Workshop, pp. 97\u2013108 (2016)","DOI":"10.1145\/2996429.2996434"},{"key":"4_CR24","unstructured":"Ramokapane, K.M., Rashid, A., Such, J.M.: I feel stupid I can\u2019t delete... : a study of users\u2019 cloud deletion practices and coping strategies. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 241\u2013256 (2017)"},{"key":"4_CR25","unstructured":"Kelly, M., Statt, N.: Amazon confirms it holds on to Alexa data even if you delete audio files (2019). https:\/\/www.theverge.com\/2019\/7\/3\/20681423\/Amazon-Alexa-echo-chris-coons-data-transcripts-ecording-privacy"},{"key":"4_CR26","unstructured":"Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic. arXiv preprint arXiv:1705.06805 (2017)"},{"key":"4_CR27","unstructured":"Tabassum, M., Kosinski, T., Lipford, H.R.: I don\u2019t own the data : end user perceptions of smart home device data practices and risks. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA (2019). https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/tabassum"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices., In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 163\u2013167 (2015). https:\/\/doi.org\/10.1109\/WiMOB.2015.7347956","DOI":"10.1109\/WiMOB.2015.7347956"},{"issue":"1","key":"4_CR29","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2018.1331033","volume":"16","author":"E Ronen","year":"2018","unstructured":"Ronen, E., Shamir, A., Weingarten, A.-O., O\u2019Flynn, C.: IoT goes nuclear: creating a Zigbee chain reaction. IEEE Secur. Priv. 16(1), 54\u201362 (2018). https:\/\/doi.org\/10.1109\/MSP.2018.1331033","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"4_CR30","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/SURV.2013.101613.00077","volume":"16","author":"G Suarez-Tangil","year":"2014","unstructured":"Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P., Ribagorda, A.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutor. 16(2), 961\u2013987 (2014). https:\/\/doi.org\/10.1109\/SURV.2013.101613.00077","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4_CR31","unstructured":"Wiggers, K.: The Alexa skills store now has more than 100,000 voice apps (2019). https:\/\/venturebeat.com\/2019\/09\/25\/the-alexa-skills-store-now-has-more-than-100000-voice-apps\/"},{"key":"4_CR32","unstructured":"Kinsella, B.: Google Assistant Actions rose about 2.5 times last year compared to 2.2 times growth for Amazon Alexa skills (2019). https:\/\/voicebot.ai\/2019\/02\/15\/google-assistant-actions-total-4253-in-january-2019-up-2-5x-in-past-year-but-7-5-the-total-number-alexa-skills-in-u-s\/"},{"key":"4_CR33","doi-asserted-by":"publisher","first-page":"2312","DOI":"10.3390\/s21072312","volume":"21","author":"T Bolton","year":"2021","unstructured":"Bolton, T., Dargahi, T., Belguith, S., Al-Rakhami, M.S., Sodhro, A.H.: On the security and privacy challenges of virtual assistants. Sensors 21, 2312 (2021). https:\/\/doi.org\/10.3390\/s21072312","journal-title":"Sensors"},{"issue":"4","key":"4_CR34","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1109\/JPROC.2022.3153167","volume":"110","author":"P Cheng","year":"2022","unstructured":"Cheng, P., Roedig, U.: Personal voice assistant security and privacy\u2014a survey. Proc. IEEE 110(4), 476\u2013507 (2022). https:\/\/doi.org\/10.1109\/JPROC.2022.3153167","journal-title":"Proc. IEEE"},{"key":"4_CR35","doi-asserted-by":"publisher","unstructured":"Germanos, G., Kavallieros, D., Kolokotronis, N., Georgiou, N.: Privacy issues in voice assistant ecosystems. In: IEEE World Congress on Services (SERVICES), pp. 205\u2013212 (2020). https:\/\/doi.org\/10.1109\/SERVICES48979.2020.00050","DOI":"10.1109\/SERVICES48979.2020.00050"},{"key":"4_CR36","doi-asserted-by":"publisher","first-page":"1401","DOI":"10.1080\/0267257X.2019.1687571","volume":"35","author":"TM Brill","year":"2019","unstructured":"Brill, T.M., Munoz, L., Miller, R.J.: Siri, Alexa, and other digital assistants: a study of customer satisfaction with artificial intelligence applications. J. Mark. Manag. 35, 1401\u20131436 (2019). https:\/\/doi.org\/10.1080\/0267257X.2019.1687571","journal-title":"J. Mark. Manag."},{"key":"4_CR37","unstructured":"Hainis, R.: Bixby, digital voice assistant in Samsung phone (2022). https:\/\/www.androidauthority.com\/bixby-879091\/"},{"key":"4_CR38","unstructured":"Ways, M.: AI virtual assistant for windows (2022). https:\/\/www.typinglounge.com\/braina-review"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10539-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T10:06:33Z","timestamp":1668506793000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10539-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031105388","9783031105395"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10539-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Information Systems and Industrial Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barranquilla","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisim2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cisim2022.wi.pb.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}