{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:17:11Z","timestamp":1777130231953,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-0845671"],"award-info":[{"award-number":["CNS-0845671"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities","award":["2017QNA4017"],"award-info":[{"award-number":["2017QNA4017"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472358,61702451"],"award-info":[{"award-number":["61472358,61702451"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134052","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"103-117","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":536,"title":["DolphinAttack"],"prefix":"10.1145","author":[{"given":"Guoming","family":"Zhang","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Chen","family":"Yan","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Tianchen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Taimin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2003.811312"},{"key":"e_1_3_2_1_2_1","unstructured":"Akustica. 2014. AKU143 Top Port analog silicon MEMS microphone. http:\/\/www.mouser.com\/ds\/2\/720\/DS37--1.01%20AKU143%20Datasheet-552974.pdf. (2014)."},{"key":"e_1_3_2_1_3_1","unstructured":"Akustica. 2014. AKU242 digital silicon MEMS microphone. http:\/\/www.mouser.com\/ds\/2\/720\/PB24--1.0%20-%20AKU242%20Product%20Brief-770082.pdf. (2014)."},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon. 2017. Alexa. https:\/\/developer.amazon.com\/alexa. (2017)."},{"key":"e_1_3_2_1_5_1","unstructured":"Apple. 2017. iOS-Siri-Apple. https:\/\/www.apple.com\/ios\/siri\/. (2017)."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Computer Security Applications Conference. 41--50","author":"Aviv Adam J.","unstructured":"Adam J. Aviv, Benjamin Sapp, Matt Blaze, and Jonathan M. Smith. 2012. Prac- ticality of accelerometer side channels on smartphones. In Proceedings of the Computer Security Applications Conference. 41--50."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the USENIX Security Symposium. 307--322","author":"Backes Michael","year":"2010","unstructured":"Michael Backes, Markus D\u00fcrmuth, Sebastian Gerling, Manfred Pinkal, and Caro- line Sporleder. 2010. Acoustic side-channel attacks on printers.. In Proceedings of the USENIX Security Symposium. 307--322."},{"key":"e_1_3_2_1_8_1","unstructured":"Baidu. 2017. Baidu Translate. http:\/\/fanyi.baidu.com\/. (2017)."},{"key":"e_1_3_2_1_9_1","unstructured":"Avisoft Bioacoustics. 2017. Ultrasonic Dynamic Speaker Vifa. http:\/\/www.avisoft. com\/usg\/vifa.htm. (2017)."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden voice commands. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the ASME International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers","author":"Castro Simon","year":"2007","unstructured":"Simon Castro, Robert Dean, Grant Roth, George T Flowers, and Brian Grantham. 2007. Influence of acoustic noise on the dynamic performance of MEMS gyro- scopes. In Proceedings of the ASME International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 1825--1831."},{"key":"e_1_3_2_1_12_1","unstructured":"CereProc. 2017. CereProc Text-to-Speech. https:\/\/www.cereproc.com\/. (2017)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.1981.7569908"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2070772"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2007.4374812"},{"key":"e_1_3_2_1_16_1","unstructured":"Analog Devices. 2011. ADMP401: Omnidirectional microphone with bottom port and analog output obsolete data sheet. http:\/\/www.analog.com\/media\/en\/technical-documentation\/obsolete-data-sheets\/ADMP401.pdf. (2011)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23059"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS).","author":"Francillon Aur\u00e9lien","year":"2011","unstructured":"Aur\u00e9lien Francillon, Boris Danev, and Srdjan Capkun. 2011. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of the Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2007.908845"},{"key":"e_1_3_2_1_21_1","unstructured":"Google. 2016. Google Now. http:\/\/www.androidcentral.com\/google-now. (2016)."},{"key":"e_1_3_2_1_22_1","unstructured":"Acapela Group. 2017. Acapela text to speech demo. http:\/\/www.acapela-group.com\/. (2017)."},{"key":"e_1_3_2_1_23_1","unstructured":"Carnegie Mellon University Speech Group. 2012. Statistical parametirc sythesis and voice conversion techniques. http:\/\/festvox.org\/11752\/slides\/lecture11a.pdf. (2012)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.34"},{"key":"e_1_3_2_1_25_1","volume-title":"The art of electronics","author":"Horowitz Paul","unstructured":"Paul Horowitz and Winfield Hill. 1989. The art of electronics. Cambridge Univ. Press."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the USENIX Security Symposium. 11--13","author":"Ishtiaq Roufa Rob Millerb","year":"2010","unstructured":"Rob Millerb Ishtiaq Roufa, Hossen Mustafaa, Sangho Ohb Travis Taylora, Wenyuan Xua, Marco Gruteserb, Wade Trappeb, and Ivan Seskarb. 2010. Se- curity and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the USENIX Security Symposium. 11--13."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the International Conference on Computer Graphics, Simulation and Modeling (ICGSM). 28--29","author":"Ittichaichareon Chadawan","year":"2012","unstructured":"Chadawan Ittichaichareon, Siwat Suksri, and Thaweesak Yingthawornsuk. 2012. Speech recognition using MFCC. In Proceedings of the International Conference on Computer Graphics, Simulation and Modeling (ICGSM). 28--29."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2015.2463089"},{"key":"e_1_3_2_1_29_1","unstructured":"Knowles. 2013. SPU0410LR5H-QB Zero-Height SiSonicTM Microphone. http:\/\/www.mouser.com\/ds\/2\/218\/-532675.pdf. (2013)."},{"key":"e_1_3_2_1_30_1","unstructured":"Dexus Pawel Krzywdzinski. 2017. Ultrasonic analyzer for iPad and iPhone. http:\/\/iaudioapps.com\/page1\/page1.html. (2017)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218629"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_6"},{"key":"e_1_3_2_1_34_1","unstructured":"Dog Park Software Ltd. 2017. iSpectrum - Macintosh Audio Spectrum Analyzer. https:\/\/dogparksoftware.com\/iSpectrum.html. (2017)."},{"key":"e_1_3_2_1_35_1","unstructured":"Ivo Mateljan. 2017. Audio measurement and analysis software. http:\/\/www.artalabs.hr\/. (2017)."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the USENIX Security Symposium. 1053--1067","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals. In Proceedings of the USENIX Security Symposium. 1053--1067."},{"key":"e_1_3_2_1_37_1","unstructured":"Microsoft. 2017. What is Cortana? https:\/\/support.microsoft.com\/en-us\/help\/17214\/windows-10-what-is. (2017)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"e_1_3_2_1_39_1","unstructured":"NeoSpeech. 2017. NeoSpeech Text-to-Speech. http:\/\/www.neospeech.com\/. (2017)."},{"key":"e_1_3_2_1_40_1","unstructured":"Emmanuel Owusu Jun Han Sauvik Das Adrian Perrig and Joy Zhang. 2006. ACCessory: password inference using accelerometers on smartphones. (2006)."},{"key":"e_1_3_2_1_41_1","unstructured":"Carl Reinke. 2017. Spectroid. https:\/\/play.google.com\/store\/apps\/details?id=org.intoorbit.spectrum&hl=en. (2017)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_43_1","unstructured":"Samsung. 2017. What is S Voice? http:\/\/www.samsung.com\/global\/galaxy\/what-is\/s-voice\/. (2017)."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","volume":"11","author":"Schlegel Roman","year":"2011","unstructured":"Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang. 2011. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Proceedings of the Network and Distributed System Security Symposium (NDSS), Vol. 11. 17--33."},{"key":"e_1_3_2_1_45_1","unstructured":"Sestek. 2017. Sestek TTS. http:\/\/www.sestek.com\/. (2017)."},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the USENIX Workshop on Offensive Technologies (WOOT). USENIX Association.","author":"Shin Hocheol","year":"2016","unstructured":"Hocheol Shin, Yunmok Son, Youngseok Park, Yujin Kwon, and Yongdae Kim. 2016. Sampling race: bypassing timing-based analog active sensor spoofing detection on analog-digital systems. In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT). USENIX Association."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516770"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the USENIX Security Symposium. 881--896","author":"Son Yunmok","year":"2015","unstructured":"Yunmok Son, Hocheol Shin, Dongkwan Kim, Young-Seok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim, et al. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In Proceedings of the USENIX Security Symposium. 881--896."},{"key":"e_1_3_2_1_50_1","unstructured":"Cry Sound. 2017. CRY343 free field measurment microphone. http:\/\/www.crysound.com\/product_info.php?4\/35\/63. (2017)."},{"key":"e_1_3_2_1_51_1","unstructured":"Selvy Speech. 2017. Demo-Selvy TTS. http:\/\/speech.selvasai.com\/en\/text-to-speech-demonstration.php. (2017)."},{"key":"e_1_3_2_1_52_1","unstructured":"STMicroelectronics. 2014. MP23AB02BTR MEMS audio sensor high- performance analog bottom-port microphone. http:\/\/www.mouser.com\/ds\/2\/389\/mp23ab02b-955093.pdf. (2014)."},{"key":"e_1_3_2_1_53_1","unstructured":"STMicroelectronics. 2016. MP34DB02 MEMS audio sensor omnidirectional digital microphone. http:\/\/www.mouser.com\/ds\/2\/389\/mp34db02--955149.pdf. (2016)."},{"key":"e_1_3_2_1_54_1","unstructured":"STMicroelectronics. 2017. Tutorial for MEMS microphones. http:\/\/www.st.com\/content\/ccc\/resource\/technical\/document\/application_note\/46\/0b\/3e\/74\/cf\/fb\/4b\/13\/DM00103199.pdf\/files\/DM00103199.pdf\/jcr:content\/translations\/en.DM00103199.pdf. (2017)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23060"},{"key":"e_1_3_2_1_56_1","unstructured":"Jinci Technologies. 2017. Open structure product review. http:\/\/www.jinci.cn\/en\/goods\/112.html. (2017)."},{"key":"e_1_3_2_1_57_1","unstructured":"Keysight Technologies. 2017. N5172B EXG X-Series RF Vector Signal Generator 9 kHz to 6 GHz. http:\/\/www.keysight.com\/en\/pdx-x201910-pn-N5172B. (2017)."},{"key":"e_1_3_2_1_58_1","unstructured":"From Text to Speech. 2017. Free online TTS service. http:\/\/www.fromtexttospeech.com\/. (2017)."},{"key":"e_1_3_2_1_59_1","unstructured":"Innoetics Text to Speech Technologies. 2017. Innoetics Text-to-Speech. https:\/\/www.innoetics.com\/. (2017)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the USENIX Workshop on Offensive Technologies (WOOT). USENIX Association.","author":"Vaidya Tavish","year":"2015","unstructured":"Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. 2015. Cocaine Noodles: Exploiting the gap between human and machine speech recognition. In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT). USENIX Association."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6393(98)00033-8"},{"key":"e_1_3_2_1_63_1","unstructured":"Vocalware. 2017. Vocalware TTS. https:\/\/www.vocalware.com\/. (2017)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2016.7733027"},{"key":"e_1_3_2_1_65_1","unstructured":"Xdadevelopers. 2017. HiVoice app what is it for? https:\/\/forum.xda-developers.com\/honor-7\/general\/hivoice-app-t3322763. (2017)."},{"key":"e_1_3_2_1_66_1","volume-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON","author":"Yan Chen","year":"2016","unstructured":"Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON (2016)."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134052","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134052","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134052"}},"subtitle":["Inaudible Voice Commands"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":66,"alternative-id":["10.1145\/3133956.3134052","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134052","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}