{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:54:30Z","timestamp":1750308870180,"version":"3.41.0"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,5,25]],"date-time":"2018-05-25T00:00:00Z","timestamp":1527206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2018,5,25]]},"DOI":"10.1145\/3229316.3229328","type":"journal-article","created":{"date-parts":[[2018,5,25]],"date-time":"2018-05-25T15:56:11Z","timestamp":1527263771000},"page":"35-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Wearable Technology Brings Security to Alexa and Siri"],"prefix":"10.1145","volume":"22","author":[{"given":"Huan","family":"Feng","sequence":"first","affiliation":[{"name":"Facebook Inc"}]},{"given":"Kassem","family":"Fawaz","sequence":"additional","affiliation":[{"name":"University of Wisconsin - Madison"}]},{"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"320","published-online":{"date-parts":[[2018,5,25]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Nicholas Carlini Pratyush Mishra Tavish Vaidya Yuankai Zhang Micah Sherr Clay Shields David Wagner and Wenchao Zhou. 2016. \"Hidden voice commands.\" In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16). USENIX Association Austin TX 513?530. https:\/\/www.usenix.org\/ conference\/usenixsecurity16\/technical-sessions\/ presentation\/carlini  Nicholas Carlini Pratyush Mishra Tavish Vaidya Yuankai Zhang Micah Sherr Clay Shields David Wagner and Wenchao Zhou. 2016. \"Hidden voice commands.\" In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16). USENIX Association Austin TX 513?530. https:\/\/www.usenix.org\/ conference\/usenixsecurity16\/technical-sessions\/ presentation\/carlini"},{"volume-title":"Exploiting the gap between human and machine speech recognition.\" In 9th USENIX Workshop on Offensive Technologies (WOOT 15)","author":"Vaidya Tavish","key":"e_1_2_1_2_1","unstructured":"Tavish Vaidya , Yuankai Zhang , Micah Sherr , and Clay Shields . 2015. \" Cocaine noodles : Exploiting the gap between human and machine speech recognition.\" In 9th USENIX Workshop on Offensive Technologies (WOOT 15) . Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. 2015. \"Cocaine noodles: Exploiting the gap between human and machine speech recognition.\" In 9th USENIX Workshop on Offensive Technologies (WOOT 15)."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2015.2463089"},{"key":"e_1_2_1_4_1","volume-title":"Your AI assistant goes crazy for NPR too.\" http:\/\/www.npr. org\/2016\/03\/06\/469383361\/listen-up-your-aiassistant- goescrazy-for-npr-too. (Mar","author":"Martin Rachel","year":"2016","unstructured":"Rachel Martin . 2016. \" Listen up : Your AI assistant goes crazy for NPR too.\" http:\/\/www.npr. org\/2016\/03\/06\/469383361\/listen-up-your-aiassistant- goescrazy-for-npr-too. (Mar . 2016 ). Rachel Martin. 2016. \"Listen up: Your AI assistant goes crazy for NPR too.\" http:\/\/www.npr. org\/2016\/03\/06\/469383361\/listen-up-your-aiassistant- goescrazy-for-npr-too. (Mar. 2016)."},{"key":"e_1_2_1_5_1","unstructured":"Nuance Communications Inc. 2018. FreeSpeech biometric voice authentication system. https:\/\/ www.nuance.com\/omni-channel-customerengagement\/ security\/multi-modal-biometrics\/ freespeech.html (2018).  Nuance Communications Inc. 2018. FreeSpeech biometric voice authentication system. https:\/\/ www.nuance.com\/omni-channel-customerengagement\/ security\/multi-modal-biometrics\/ freespeech.html (2018)."},{"key":"e_1_2_1_6_1","volume-title":"archive.org\/web\/20141017174847\/http:\/\/now.avg. com\/voice-hacking-devices","author":"Ben-Itzhak Yuval","year":"2014","unstructured":"Yuval Ben-Itzhak . 2014. \" What if smart devices could be hacked with just a voice?\" https:\/\/web. archive.org\/web\/20141017174847\/http:\/\/now.avg. com\/voice-hacking-devices ( 2014 ). Yuval Ben-Itzhak. 2014. \"What if smart devices could be hacked with just a voice?\" https:\/\/web. archive.org\/web\/20141017174847\/http:\/\/now.avg. com\/voice-hacking-devices (2014)."},{"key":"e_1_2_1_7_1","volume-title":"hacking into your account is easier than you think.\" https:\/\/www.ft.com\/ content\/959b64fe-9f66-11e6-891e-abe238dee8e2","author":"Martin Arnold","year":"2016","unstructured":"Arnold Martin and Greenhalgh Hugo . 2016. \" Best of money : hacking into your account is easier than you think.\" https:\/\/www.ft.com\/ content\/959b64fe-9f66-11e6-891e-abe238dee8e2 ( 2016 ). Accessed : 2017-07-26. Arnold Martin and Greenhalgh Hugo. 2016. \"Best of money: hacking into your account is easier than you think.\" https:\/\/www.ft.com\/ content\/959b64fe-9f66-11e6-891e-abe238dee8e2 (2016). Accessed: 2017-07-26."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Dibya Mukhopadhyay Maliheh Shirvanian and Nitesh Saxena. 2015. \"All your voices are belong to us: Stealing voices to fool humans and machines\" Springer International Publishing Cham 599?621.  Dibya Mukhopadhyay Maliheh Shirvanian and Nitesh Saxena. 2015. \"All your voices are belong to us: Stealing voices to fool humans and machines\" Springer International Publishing Cham 599?621.","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"e_1_2_1_10_1","volume-title":"USA","author":"Panjwani Saurabh","year":"2014","unstructured":"Saurabh Panjwani and Achintya Prakash . 2014 . \" Crowdsourcing attacks on biometric systems.\" In Proceedings of Tenth Symposium on Usable Privacy and Security (SOUPS 2014) Menlo Park, CA , USA , July 9-11, 2014. 257?269. https:\/\/www. usenix.org\/conference\/soups2014\/proceedings\/ presentation\/panjwani Saurabh Panjwani and Achintya Prakash. 2014. \"Crowdsourcing attacks on biometric systems.\" In Proceedings of Tenth Symposium on Usable Privacy and Security (SOUPS 2014) Menlo Park, CA, USA, July 9-11, 2014. 257?269. https:\/\/www. usenix.org\/conference\/soups2014\/proceedings\/ presentation\/panjwani"},{"volume-title":"Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks.\" In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017)","author":"Trippel Timothy","key":"e_1_2_1_11_1","unstructured":"Timothy Trippel , Or Weisse , Wenyuan Xu , Peter Honeyman , and Kevin Fu. \"WALNUT : Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks.\" In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017) Timothy Trippel, Or Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. \"WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks.\" In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017)"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229316.3229328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3229316.3229328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:15:12Z","timestamp":1750281312000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229316.3229328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,25]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,5,25]]}},"alternative-id":["10.1145\/3229316.3229328"],"URL":"https:\/\/doi.org\/10.1145\/3229316.3229328","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"type":"print","value":"2375-0529"},{"type":"electronic","value":"2375-0537"}],"subject":[],"published":{"date-parts":[[2018,5,25]]},"assertion":[{"value":"2018-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}