{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:57:59Z","timestamp":1767988679889,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["CRC 1119 CROSSING (S2 and P3)"],"award-info":[{"award-number":["CRC 1119 CROSSING (S2 and P3)"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3321705.3329842","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"465-478","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["Alexa Lied to Me"],"prefix":"10.1145","author":[{"given":"Richard","family":"Mitev","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Markus","family":"Miettinen","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747626"},{"key":"e_1_3_2_1_2_1","volume-title":"Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Antonakakis Manos","year":"2017"},{"key":"e_1_3_2_1_3_1","volume-title":"Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Carlini Nicholas","year":"2016"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2018. Audio adversarial examples: Targeted attacks on speech-to-text. arXiv preprint arXiv:1801.01944 (2018).  Nicholas Carlini and David Wagner. 2018. Audio adversarial examples: Targeted attacks on speech-to-text. arXiv preprint arXiv:1801.01944 (2018).","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_5_1","volume-title":"Houdini: Fooling deep structured visual and speech recognition models with adversarial examples. In Advances in Neural Information Processing Systems. 6977--6987.","author":"Cisse Moustapha M","year":"2017"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"e_1_3_2_1_7_1","volume-title":"Hajime: Analysis of a decentralized internet worm for IoT devices. Technical Report. Rapidity Networks.","author":"Edwards Sam","year":"2016"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2015.2463089"},{"key":"e_1_3_2_1_11_1","unstructured":"John Koetsier. 2018. Amazon Echo Google Home Installed Base Hits 50 Million; Apple Has 6% Market Share Report Says. https:\/\/www.forbes.com\/sites\/johnkoetsier\/2018\/08\/02\/amazon-echo-google-home-installed-base-hits-50-million-apple-has-6-market-share-report-says.  John Koetsier. 2018. Amazon Echo Google Home Installed Base Hits 50 Million; Apple Has 6% Market Share Report Says. https:\/\/www.forbes.com\/sites\/johnkoetsier\/2018\/08\/02\/amazon-echo-google-home-installed-base-hits-50-million-apple-has-6-market-share-report-says."},{"key":"e_1_3_2_1_12_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Kumar Deepak","year":"2018"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191789.3191799"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2011","author":"Schlegel Roman","year":"2011"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Lea Sch\u00f6nherr Katharina Kohls Steffen Zeiler Thorsten Holz and Dorothea Kolossa. 2018. Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. arXiv preprint arXiv:1808.05665 (2018).  Lea Sch\u00f6nherr Katharina Kohls Steffen Zeiler Thorsten Holz and Dorothea Kolossa. 2018. Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. arXiv preprint arXiv:1808.05665 (2018).","DOI":"10.14722\/ndss.2019.23288"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1949.232969"},{"key":"e_1_3_2_1_18_1","volume-title":"24th USENIX Security symposium. USENIX Association.","author":"Son Yun Mok","year":"2015"},{"key":"e_1_3_2_1_19_1","unstructured":"Liwei Song and Prateek Mittal. 2017. Inaudible Voice Commands. CoRR Vol. abs\/1708.07238 (2017). arxiv: 1708.07238 http:\/\/arxiv.org\/abs\/1708.07238  Liwei Song and Prateek Mittal. 2017. Inaudible Voice Commands. CoRR Vol. abs\/1708.07238 (2017). arxiv: 1708.07238 http:\/\/arxiv.org\/abs\/1708.07238"},{"key":"e_1_3_2_1_20_1","volume-title":"2017 IEEE European Symposium on. IEEE, 3--18","author":"Trippel Timothy","year":"2017"},{"key":"e_1_3_2_1_21_1","volume-title":"9th USENIX Workshop on Offensive Technologies (WOOT 15)","author":"Vaidya Tavish","year":"2015"},{"key":"e_1_3_2_1_22_1","unstructured":"Tim Yeh Dove Chiu and Kenney Lu. {n. d.}. Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras. https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/persirai-new-internet-things-iot-botnet-targets-ip-cameras\/.  Tim Yeh Dove Chiu and Kenney Lu. {n. d.}. Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras. https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/persirai-new-internet-things-iot-botnet-targets-ip-cameras\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2016.7537163"},{"key":"e_1_3_2_1_24_1","unstructured":"Xuejing Yuan Yuxuan Chen Yue Zhao Yunhui Long Xiaokang Liu Kai Chen Shengzhi Zhang Heqing Huang Xiaofeng Wang and Carl A Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. arXiv preprint arXiv:1801.08535 (2018).   Xuejing Yuan Yuxuan Chen Yue Zhao Yunhui Long Xiaokang Liu Kai Chen Shengzhi Zhang Heqing Huang Xiaofeng Wang and Carl A Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. arXiv preprint arXiv:1801.08535 (2018)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_26_1","unstructured":"Nan Zhang Xianghang Mi Xuan Feng XiaoFeng Wang Yuan Tian and Feng Qian. 2018. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. arXiv preprint arXiv:1805.01525 (2018).  Nan Zhang Xianghang Mi Xuan Feng XiaoFeng Wang Yuan Tian and Feng Qian. 2018. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. arXiv preprint arXiv:1805.01525 (2018)."}],"event":{"name":"Asia CCS '19: ACM Asia Conference on Computer and Communications Security","location":"Auckland New Zealand","acronym":"Asia CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321705.3329842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:39Z","timestamp":1750204479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329842"}},"subtitle":["Skill-based Man-in-the-Middle Attacks on Virtual Assistants"],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":26,"alternative-id":["10.1145\/3321705.3329842","10.1145\/3321705"],"URL":"https:\/\/doi.org\/10.1145\/3321705.3329842","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}