{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T05:13:02Z","timestamp":1746249182869,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/cybersecurity49315.2020.9138860","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T18:45:17Z","timestamp":1594665917000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Shouting Through Letterboxes: A study on attack susceptibility of voice assistants"],"prefix":"10.1109","author":[{"given":"Andrew","family":"McCarthy","sequence":"first","affiliation":[]},{"given":"Benedict R.","family":"Gaster","sequence":"additional","affiliation":[]},{"given":"Phil","family":"Legg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2019","author":"first","article-title":"100 most common words in english &#x2014; learn english","key":"ref39"},{"year":"2007","author":"duddington","article-title":"espeak text to speech","key":"ref38"},{"year":"2019","author":"mccarthy","article-title":"Voice assistant survey report","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1016\/j.ijhcs.2013.09.002"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1111\/1556-4029.13804"},{"year":"2019","author":"siddique","article-title":"Nhs teams up with amazon to bring alexa to patients","key":"ref30"},{"year":"2017","author":"limited","article-title":"South park: White people renovating houses","key":"ref37"},{"year":"2019","author":"mills","article-title":"Scott mills daily - alexa, who is scott mills?","key":"ref36"},{"year":"2019","article-title":"Amazon echo (2nd gen) - smart speaker with alexa - heather grey fabric","key":"ref35"},{"year":"2017","author":"zhang","article-title":"Speechrecognition 3.8.1","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2976749.2978392"},{"key":"ref40","article-title":"Alexa guard can now listen for alarms - or, perhaps, a cheating spouse?","author":"graham","year":"2019","journal-title":"USA Today"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ACCESS.2019.2915971"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.future.2020.04.013"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3274371","article-title":"Alexa, are you listening? privacy perceptions, concerns and privacy-seeking behaviors with smart speakers","volume":"2","author":"lau","year":"2018","journal-title":"Proc ACM SIG Computer-Human Interaction"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1002\/j.2637-496X.2013.tb00626.x"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ACCESS.2017.2747626"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3072959.3073702"},{"key":"ref18","first-page":"33","article-title":"Cyber criminals cons energy company in artificial intelligence scam","author":"titcomb","year":"2019","journal-title":"Daily Telegraph"},{"key":"ref19","first-page":"15","article-title":"Blackiot: Iot botnet of high wattage devices can disrupt the power grid","author":"soltan","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/1240624.1240683"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3133956.3134052"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1177\/1095796018819461"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1515\/iss-2017-0034"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s13347-018-0317-3"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/501158.501163"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/IWBF.2014.6914244"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICASSP.2018.8462227"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1093\/mind\/LIX.236.433"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1177\/2472630318788040"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1038\/s41467-019-08931-6"},{"key":"ref1","article-title":"Apple contractors &#x2018;regularly hear confidential details&#x2019; on siri recordings","volume":"26","author":"hern","year":"2019","journal-title":"The Guardian"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ISSPIT.2018.8642623"},{"key":"ref22","first-page":"513","article-title":"Hidden voice commands","author":"carlini","year":"2016","journal-title":"25th USENIX Security Symposium ( USENIX Security 16)"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TEMC.2015.2463089"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1518\/001872095779049543"},{"key":"ref23","first-page":"49","article-title":"Commandersong: A systematic approach for practical adversarial voice recognition","author":"yuan","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref26","first-page":"421","article-title":"Alexa, what should we do about privacy: Protecting privacy for users of voice-activated devices","volume":"93","author":"pfeifle","year":"2018","journal-title":"Wash L Rev"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.compedu.2008.06.011"}],"event":{"name":"2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","start":{"date-parts":[[2020,6,15]]},"location":"Dublin, Ireland","end":{"date-parts":[[2020,6,19]]}},"container-title":["2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9136807\/9138848\/09138860.pdf?arnumber=9138860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:33:39Z","timestamp":1656329619000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9138860\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/cybersecurity49315.2020.9138860","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}