{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T08:11:12Z","timestamp":1770711072718,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS1820624, CNS1814590, CNS1801630, CNS1714807, CNS1526524, DOE1662762"],"award-info":[{"award-number":["CNS1820624, CNS1814590, CNS1801630, CNS1714807, CNS1526524, DOE1662762"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-18-1-0221"],"award-info":[{"award-number":["W911NF-18-1-0221"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359830","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"42-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations"],"prefix":"10.1145","author":[{"given":"Chen","family":"Wang","sequence":"first","affiliation":[{"name":"WINLAB, Rutgers University"}]},{"given":"S Abhishek","family":"Anand","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham"}]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[{"name":"WINLAB, Rutgers University"}]},{"given":"Payton","family":"Walker","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham"}]},{"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"WINLAB, Rutgers University"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. PDV-100 PORTABLE DIGITAL VIBROMETER: Vibration sensor for mobile use. https:\/\/www.polytec.com\/us\/vibrometry\/products\/single-point-vibrometers\/pdv-100-portable-digital-vibrometer\/. Accessed: 12\/13\/2018.  [n.d.]. PDV-100 PORTABLE DIGITAL VIBROMETER: Vibration sensor for mobile use. https:\/\/www.polytec.com\/us\/vibrometry\/products\/single-point-vibrometers\/pdv-100-portable-digital-vibrometer\/. Accessed: 12\/13\/2018."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Text To Speech (TTS) service. http:\/\/www.fromtexttospeech.com\/.  2018. Text To Speech (TTS) service. http:\/\/www.fromtexttospeech.com\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Voice Assistant Market Research Report- Global Forecast","year":"2023","unstructured":"2018. Voice Assistant Market Research Report- Global Forecast 2023 . https:\/\/www.marketresearchfuture.com\/reports\/voice-assistant-market-4003. 2018. Voice Assistant Market Research Report- Global Forecast 2023. https:\/\/www.marketresearchfuture.com\/reports\/voice-assistant-market-4003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.4830853"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P). 116--133","author":"Abhishek Anand S","year":"2018","unstructured":"S Abhishek Anand and Nitesh Saxena . 2018 . Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors . In Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P). 116--133 . S Abhishek Anand and Nitesh Saxena. 2018. Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. In Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P). 116--133."},{"key":"e_1_3_2_1_6_1","volume-title":"An experimental evaluation of apple siri and google speech recognition. Proccedings of the 2015 ISCA SEDE","author":"Assefi Mehdi","year":"2015","unstructured":"Mehdi Assefi , Guangchi Liu , Mike P Wittie , and Clemente Izurieta . 2015. An experimental evaluation of apple siri and google speech recognition. Proccedings of the 2015 ISCA SEDE ( 2015 ). Mehdi Assefi, Guangchi Liu, Mike P Wittie, and Clemente Izurieta. 2015. An experimental evaluation of apple siri and google speech recognition. Proccedings of the 2015 ISCA SEDE (2015)."},{"key":"e_1_3_2_1_7_1","volume-title":"Orlikoff","author":"Baken Ronald J.","year":"1987","unstructured":"Ronald J. Baken and Robert F . Orlikoff . 1987 . Clinical Measurement of Speech and Voice . London : Taylor and Francis Ltd . Ronald J. Baken and Robert F. Orlikoff. 1987. Clinical Measurement of Speech and Voice. London: Taylor and Francis Ltd."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196545"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Security Symposium. 513--530","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou . 2016 . Hidden Voice Commands .. In USENIX Security Symposium. 513--530 . Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands.. In USENIX Security Symposium. 513--530."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1115\/IMECE2007-42108"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2201472"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2070772"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2007.4374812"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_3_2_1_17_1","unstructured":"Jeff Gamet. 2018. Need Your HomePod to Recalibrate its Sound for Your Room? Give it a Shake. https:\/\/www.macobserver.com\/tips\/quick-tip\/homepod-recalibrate-shake\/.  Jeff Gamet. 2018. Need Your HomePod to Recalibrate its Sound for Your Room? Give it a Shake. https:\/\/www.macobserver.com\/tips\/quick-tip\/homepod-recalibrate-shake\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2015.05.002"},{"key":"e_1_3_2_1_19_1","volume-title":"I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry.. In Interspeech. Citeseer, 930--934","author":"Hautam\u00e4ki Rosa Gonz\u00e1lez","year":"2013","unstructured":"Rosa Gonz\u00e1lez Hautam\u00e4ki , Tomi Kinnunen , Ville Hautam\u00e4ki , Timo Leino , and Anne-Maria Laukkanen . 2013 . I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry.. In Interspeech. Citeseer, 930--934 . Rosa Gonz\u00e1lez Hautam\u00e4ki, Tomi Kinnunen, Ville Hautam\u00e4ki, Timo Leino, and Anne-Maria Laukkanen. 2013. I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry.. In Interspeech. Citeseer, 930--934."},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Computer Graphics, Simulation and Modeling (ICGSM'2012)","author":"Ittichaichareon Chadawan","year":"2012","unstructured":"Chadawan Ittichaichareon , Siwat Suksri , and Thaweesak Yingthawornsuk . 2012 . Speech recognition using MFCC . In International Conference on Computer Graphics, Simulation and Modeling (ICGSM'2012) July. 28 --29. Chadawan Ittichaichareon, Siwat Suksri, and Thaweesak Yingthawornsuk. 2012. Speech recognition using MFCC. In International Conference on Computer Graphics, Simulation and Modeling (ICGSM'2012) July. 28--29."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2015.2463089"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium. 1053--1067","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky , Dan Boneh , and Gabi Nakibly . 2014 . Gyrophone: Recognizing Speech from Gyroscope Signals .. In USENIX Security Symposium. 1053--1067 . Yan Michalevsky, Dan Boneh, and Gabi Nakibly. 2014. Gyrophone: Recognizing Speech from Gyroscope Signals.. In USENIX Security Symposium. 1053--1067."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"e_1_3_2_1_25_1","volume-title":"Combining evidence from residual phase and MFCC features for speaker recognition","author":"Murty K Sri Rama","year":"2006","unstructured":"K Sri Rama Murty and Bayya Yegnanarayana . 2006. Combining evidence from residual phase and MFCC features for speaker recognition . IEEE signal processing letters 13, 1 ( 2006 ), 52--55. K Sri Rama Murty and Bayya Yegnanarayana. 2006. Combining evidence from residual phase and MFCC features for speaker recognition. IEEE signal processing letters 13, 1 (2006), 52--55."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.424266"},{"key":"e_1_3_2_1_27_1","volume-title":"2017 IEEE European Symposium on. IEEE, 3--18","author":"Trippel Timothy","year":"2017","unstructured":"Timothy Trippel , Ofir Weisse , Wenyuan Xu , Peter Honeyman , and Kevin Fu . 2017 . WALNUT: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks. In Security and Privacy (EuroS&P) , 2017 IEEE European Symposium on. IEEE, 3--18 . Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. 2017. WALNUT: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks. In Security and Privacy (EuroS&P), 2017 IEEE European Symposium on. IEEE, 3--18."},{"key":"e_1_3_2_1_28_1","first-page":"10","article-title":"Cocaine noodles: exploiting the gap between human and machine speech recognition","volume":"15","author":"Vaidya Tavish","year":"2015","unstructured":"Tavish Vaidya , Yuankai Zhang , Micah Sherr , and Clay Shields . 2015 . Cocaine noodles: exploiting the gap between human and machine speech recognition . WOOT 15 (2015), 10 -- 11 . Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. 2015. Cocaine noodles: exploiting the gap between human and machine speech recognition. WOOT 15 (2015), 10--11.","journal-title":"WOOT"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6393(98)00033-8"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639067"},{"key":"e_1_3_2_1_31_1","volume-title":"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In USENIX Security Symposium.","author":"Yuan Xuejing","year":"2018","unstructured":"Xuejing Yuan , Yuxuan Chen , Yue Zhao , Yunhui Long , Xiaokang Liu , Kai Chen , Shengzhi Zhang , Heqing Huang , Xiaofeng Wang , and Carl A Gunter . 2018 . CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In USENIX Security Symposium. Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In USENIX Security Symposium."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742658"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359830","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359830","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":34,"alternative-id":["10.1145\/3359789.3359830","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359830","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}