{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:53:49Z","timestamp":1774536829761,"version":"3.50.1"},"reference-count":158,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T00:00:00Z","timestamp":1607212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2021,11,30]]},"abstract":"<jats:p>Smart Home Personal Assistants (SPA) are an emerging innovation that is changing the means by which home users interact with technology. However, several elements expose these systems to various risks: (i) the open nature of the voice channel they use, (ii) the complexity of their architecture, (iii) the AI features they rely on, and (iv) their use of a wide range of underlying technologies. This article presents an in-depth review of SPA\u2019s security and privacy issues, categorizing the most important attack vectors and their countermeasures. Based on this, we discuss open research challenges that can help steer the community to tackle and address current security and privacy issues in SPA. One of our key findings is that even though the attack surface of SPA is conspicuously broad and there has been a significant amount of recent research efforts in this area, research has so far focused on a small part of the attack surface, particularly on issues related to the interaction between the user and the SPA devices. To the best of our knowledge, this is the first article to conduct such a comprehensive review and characterization of the security and privacy issues and countermeasures of SPA.<\/jats:p>","DOI":"10.1145\/3412383","type":"journal-article","created":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T22:23:20Z","timestamp":1607293400000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":125,"title":["Smart Home Personal Assistants"],"prefix":"10.1145","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1325-8740","authenticated-orcid":false,"given":"Jide S.","family":"Edu","sequence":"first","affiliation":[{"name":"King\u2019s College London, London, UK"}]},{"given":"Jose M.","family":"Such","sequence":"additional","affiliation":[{"name":"King\u2019s College London, London, UK"}]},{"given":"Guillermo","family":"Suarez-Tangil","sequence":"additional","affiliation":[{"name":"King\u2019s College London, London, UK"}]}],"member":"320","published-online":{"date-parts":[[2020,12,6]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS\u201919)","author":"Abdi Noura","year":"2019"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747626"},{"key":"e_1_2_1_3_1","unstructured":"Amazon. 2017. About Alexa Voice Profiles. Retrieved from https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=202199440.  Amazon. 2017. About Alexa Voice Profiles. Retrieved from https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=202199440."},{"key":"e_1_2_1_4_1","unstructured":"Amazon. 2018. The Alexa Skill Store for France is a Fast Growing Land of Opportunity. Retrieved from https:\/\/developer.amazon.com\/docs\/ask-overviews\/understanding-the-different-types-of-skills.html.  Amazon. 2018. The Alexa Skill Store for France is a Fast Growing Land of Opportunity. Retrieved from https:\/\/developer.amazon.com\/docs\/ask-overviews\/understanding-the-different-types-of-skills.html."},{"key":"e_1_2_1_5_1","unstructured":"Amazon. 2019. All-new Echo Show (2nd Gen). Retrieved from https:\/\/www.amazon.com\/All-new-Echo-Show-2nd-Gen\/dp\/B077SXWSRP.  Amazon. 2019. All-new Echo Show (2nd Gen). Retrieved from https:\/\/www.amazon.com\/All-new-Echo-Show-2nd-Gen\/dp\/B077SXWSRP."},{"key":"e_1_2_1_6_1","unstructured":"Amazon. 2019. Configure Permissions for Customer Information in Your Skill. Retrieved from https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/configure-permissions-for-customer-information-in-your-skill.html.  Amazon. 2019. Configure Permissions for Customer Information in Your Skill. Retrieved from https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/configure-permissions-for-customer-information-in-your-skill.html."},{"key":"e_1_2_1_7_1","unstructured":"Amazon. n.d. Understand How Users Interact with Skills. Retrieved from https:\/\/developer.amazon.com\/en-GB\/docs\/alexa\/ask-overviews\/understanding-how-users-interact-with-skills.html.  Amazon. n.d. Understand How Users Interact with Skills. Retrieved from https:\/\/developer.amazon.com\/en-GB\/docs\/alexa\/ask-overviews\/understanding-how-users-interact-with-skills.html."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30806-7_15"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.326"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0040"},{"key":"e_1_2_1_11_1","unstructured":"Noah Apthorpe Dillon Reisman and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. Retrieved from http:\/\/arxiv.org\/abs\/1705.06805.  Noah Apthorpe Dillon Reisman and Nick Feamster. 2017. A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic. Retrieved from http:\/\/arxiv.org\/abs\/1705.06805."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the IFIP International Conference on Testing Software and Systems. Springer, 194--207","author":"Asadollah Sara Abbaspour","year":"2015"},{"key":"e_1_2_1_13_1","unstructured":"Ava Mutchler. 2018. Google Assistant App Total Reaches Nearly 2400. Retrieved from https:\/\/voicebot.ai\/2018\/01\/24\/google-assistant-app-total-reaches-nearly-2400-thats-not-real.  Ava Mutchler. 2018. Google Assistant App Total Reaches Nearly 2400. Retrieved from https:\/\/voicebot.ai\/2018\/01\/24\/google-assistant-app-total-reaches-nearly-2400-thats-not-real."},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Gildas Avoine Muhammed Ali Bingol Ioana Boureanu Srdjan Capkun Gerhard Hancke Suleyman Kardas Chong Hee Kim Cedric Lauradoux Benjamin Martin Jorge Munilla Alberto Peinado Kasper Bonne Rasmussen Dave Singelee Aslan Tchamkerten Rolando Trujillo-Rasua and Serge Vaudenay. 2018. Security of distance-bounding: A survey. ACM Comput. Surv. 51 5 Article 94 (Sept. 2018) 33 pages. DOI:https:\/\/doi.org\/10.1145\/3264628  Gildas Avoine Muhammed Ali Bingol Ioana Boureanu Srdjan Capkun Gerhard Hancke Suleyman Kardas Chong Hee Kim Cedric Lauradoux Benjamin Martin Jorge Munilla Alberto Peinado Kasper Bonne Rasmussen Dave Singelee Aslan Tchamkerten Rolando Trujillo-Rasua and Serge Vaudenay. 2018. Security of distance-bounding: A survey. ACM Comput. Surv. 51 5 Article 94 (Sept. 2018) 33 pages. DOI:https:\/\/doi.org\/10.1145\/3264628","DOI":"10.1145\/3264628"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892340"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241135"},{"key":"e_1_2_1_17_1","volume-title":"Wagner","author":"Carlini Nicholas","year":"2016"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the IEEE Security and Privacy Workshops (SP\u201918)","author":"Carlini Nicholas","year":"2018"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.133"},{"key":"e_1_2_1_20_1","volume-title":"Intelligent virtual assistant knows your life. CoRR abs\/1803.00466","author":"Chung Hyunji","year":"2018"},{"key":"e_1_2_1_21_1","volume-title":"Digital forensic approaches for Amazon Alexa ecosystem. Digital Investigat. 22","author":"Chung Hyunji","year":"2017"},{"key":"e_1_2_1_22_1","volume-title":"Such","author":"Ciholas Pierre","year":"2019"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the First International Workshop held on 06 April 2016 in conjunction with the International Symposium on Engineering Secure Software and Systems","author":"Ciholas Pierre","year":"2016"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 30th Annual Conference on Neural Information Processing Systems. 6980--6990","author":"Cisse Moustapha","year":"2017"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.07.002"},{"key":"e_1_2_1_26_1","volume-title":"Snips voice platform: An embedded spoken language understanding system for private-by-design voice interfaces. CoRR abs\/1805.10190","author":"Coucke Alice","year":"2018"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2350116.2350122"},{"key":"e_1_2_1_28_1","first-page":"48","article-title":"Implicit contextual integrity in online social networks. Info","volume":"325","author":"Criado Natalia","year":"2015","journal-title":"Sci."},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI\u201916)","author":"Criado Natalia"},{"key":"e_1_2_1_30_1","article-title":"User profiling-a short review","volume":"108","author":"Cufoglu Ayse","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"e_1_2_1_32_1","unstructured":"Google Developer. 2019. Developer Preview of Local Home SDK. Retrieved from https:\/\/developers.googleblog.com\/2019\/07\/developer-preview-of-local-home-sdk.html.  Google Developer. 2019. Developer Preview of Local Home SDK. Retrieved from https:\/\/developers.googleblog.com\/2019\/07\/developer-preview-of-local-home-sdk.html."},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. 332--346","author":"Dyer K. P.","year":"2012"},{"key":"e_1_2_1_34_1","first-page":"4","article-title":"Privacy concerns for use of voice activated personal assistant in the public space","volume":"31","author":"Moorthy Aarthi Easwara","year":"2015","journal-title":"Int. J. Hum. Comput. Interact."},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (MobiCom\u201917)","author":"Feng Huan"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201916)","author":"Fernandes E.","year":"2016"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIXSecurity\u201916)","author":"Fernandes Earlence","year":"2016"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038920"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_2_1_40_1","volume-title":"Consumer attitudes towards privacy and security in home assistants(CHI EA \u201918). ACM","author":"Fruchter Nathaniel"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-605"},{"key":"e_1_2_1_42_1","unstructured":"Yuan Gong and Christian Poellabauer. 2017. Crafting adversarial examples for speech paralinguistics applications. Retrieved from http:\/\/arxiv.org\/abs\/1711.03280.  Yuan Gong and Christian Poellabauer. 2017. Crafting adversarial examples for speech paralinguistics applications. Retrieved from http:\/\/arxiv.org\/abs\/1711.03280."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134599"},{"key":"e_1_2_1_44_1","unstructured":"Google. 2017. Set up Multiple Users for Your Speaker or Smart Display. Retrieved from https:\/\/support.google.com\/assistant\/answer\/9071681.  Google. 2017. Set up Multiple Users for Your Speaker or Smart Display. Retrieved from https:\/\/support.google.com\/assistant\/answer\/9071681."},{"key":"e_1_2_1_45_1","unstructured":"Google. 2018. Actions on Google. Retrieved from https:\/\/developers.google.com\/actions\/samples\/.  Google. 2018. Actions on Google. Retrieved from https:\/\/developers.google.com\/actions\/samples\/."},{"key":"e_1_2_1_46_1","unstructured":"Google. 2018. Invocation and Discovery. Retrieved from https:\/\/developers.google.com\/actions\/sdk\/invocation-and-discovery.  Google. 2018. Invocation and Discovery. Retrieved from https:\/\/developers.google.com\/actions\/sdk\/invocation-and-discovery."},{"key":"e_1_2_1_47_1","unstructured":"William Haack Madeleine Severance Michael Wallace and Jeremy Wohlwend. 2017. Security analysis of Amazon Echo. Retrieved from https:\/\/courses.csail.mit.edu\/6.857\/2017\/project\/8.pdf  William Haack Madeleine Severance Michael Wallace and Jeremy Wohlwend. 2017. Security analysis of Amazon Echo. Retrieved from https:\/\/courses.csail.mit.edu\/6.857\/2017\/project\/8.pdf"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.12"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277223"},{"key":"e_1_2_1_50_1","doi-asserted-by":"crossref","unstructured":"J. Hirschberg and C. D. Manning. 2015. Advances in natural language processing. Science 349 6245 (2015) 261--266. DOI:https:\/\/doi.org\/10.1126\/science.aaa8685  J. Hirschberg and C. D. Manning. 2015. Advances in natural language processing. Science 349 6245 (2015) 261--266. DOI:https:\/\/doi.org\/10.1126\/science.aaa8685","DOI":"10.1126\/science.aaa8685"},{"key":"e_1_2_1_51_1","unstructured":"Helena Horton. 2018. Amazon Alexa Recorded Owner\u2019s Conversation and Sent to \u201crandom\u201d Contact Couple Complains. Retrieved from www.telegraph.co.uk\/news\/2018\/05\/25\/amazon-alexa-recorded-owners-conversation-sent-random-contact\/.  Helena Horton. 2018. Amazon Alexa Recorded Owner\u2019s Conversation and Sent to \u201crandom\u201d Contact Couple Complains. Retrieved from www.telegraph.co.uk\/news\/2018\/05\/25\/amazon-alexa-recorded-owners-conversation-sent-random-contact\/."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/02763869.2018.1404391"},{"key":"e_1_2_1_53_1","unstructured":"Texas Instruments. 2013. AN-1973 Benefits and Challenges of High-Frequency Regulators. Retrieved from http:\/\/www.ti.com\/lit\/an\/snva399a\/snva399a.pdf.  Texas Instruments. 2013. AN-1973 Benefits and Challenges of High-Frequency Regulators. Retrieved from http:\/\/www.ti.com\/lit\/an\/snva399a\/snva399a.pdf."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_2_1_55_1","unstructured":"George Kadianakis Claudia V. Roberts Laura M. Roberts and Philipp Winter. 2017. Anomalous keys in Tor relays. Retrieved from http:\/\/arxiv.org\/abs\/1704.00792.  George Kadianakis Claudia V. Roberts Laura M. Roberts and Philipp Winter. 2017. Anomalous keys in Tor relays. Retrieved from http:\/\/arxiv.org\/abs\/1704.00792."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.89"},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the IEEE\/ACM 39th International Conference on Software Engineering (ICSE\u201917)","author":"Kafali \u00d6zg\u00fcr"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.92.22.10031"},{"key":"e_1_2_1_59_1","unstructured":"Heather Kelly. 2017. Apple\u2019s HomePod is Coming. Here\u2019s What You Need to Know About Smart Speakers. Retrieved from http:\/\/money.cnn.com\/2017\/06\/08\/technology\/gadgets\/apple-homepod-smart-speaker-faq\/index.html.  Heather Kelly. 2017. Apple\u2019s HomePod is Coming. Here\u2019s What You Need to Know About Smart Speakers. Retrieved from http:\/\/money.cnn.com\/2017\/06\/08\/technology\/gadgets\/apple-homepod-smart-speaker-faq\/index.html."},{"key":"e_1_2_1_60_1","unstructured":"Makena Kelly and Nick Statt. 2019. Amazon Confirms it Holds on to Alexa Data Even if You Delete Audio Files. Retrieved from https:\/\/www.theverge.com\/2019\/7\/3\/20681423\/amazon-alexa-echo-chris-coons-data-transcripts-recording-privacy.  Makena Kelly and Nick Statt. 2019. Amazon Confirms it Holds on to Alexa Data Even if You Delete Audio Files. Retrieved from https:\/\/www.theverge.com\/2019\/7\/3\/20681423\/amazon-alexa-echo-chris-coons-data-transcripts-recording-privacy."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301638"},{"key":"e_1_2_1_62_1","unstructured":"Bret Kinsella. 2018. Alexa Skill Store for France is a Fast Growing Land of Opportunity. Retrieved from https:\/\/voicebot.ai\/2018\/11\/03\/the-alexa-skill-store-for-france-is-a-fast-growing-land-of-opportunity\/.  Bret Kinsella. 2018. Alexa Skill Store for France is a Fast Growing Land of Opportunity. Retrieved from https:\/\/voicebot.ai\/2018\/11\/03\/the-alexa-skill-store-for-france-is-a-fast-growing-land-of-opportunity\/."},{"key":"e_1_2_1_63_1","unstructured":"Bret Kinsella. 2018. Amazon Introduces Skill Connections so Alexa Skills Can Work Together. Retrieved from https:\/\/voicebot.ai\/2018\/10\/04\/amazon-introduces-skill-connections-so-alexa-skills-can\/.  Bret Kinsella. 2018. Amazon Introduces Skill Connections so Alexa Skills Can Work Together. Retrieved from https:\/\/voicebot.ai\/2018\/10\/04\/amazon-introduces-skill-connections-so-alexa-skills-can\/."},{"key":"e_1_2_1_64_1","unstructured":"Bret Kinsella. 2018. The Information Says Alexa Struggles with Voice Commerce But Has 50 Million Devices Sold. Retrieved from https:\/\/voicebot.ai\/2018\/08\/06\/the-information-says-alexa-struggles-with.  Bret Kinsella. 2018. The Information Says Alexa Struggles with Voice Commerce But Has 50 Million Devices Sold. Retrieved from https:\/\/voicebot.ai\/2018\/08\/06\/the-information-says-alexa-struggles-with."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808705.2808710"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIXSecurity\u201918)","author":"Kumar Deepak","year":"2018"},{"key":"e_1_2_1_68_1","unstructured":"Angelica Lai. 2018. Sneaky Kid Orders $350 Worth of Toys on Her Mom\u2019s Amazon Account. Retrieved from https:\/\/mom.me\/news\/271144-sneaky-kid-orders-350-worth-toys-her-moms-amazon-account\/.  Angelica Lai. 2018. Sneaky Kid Orders $350 Worth of Toys on Her Mom\u2019s Amazon Account. Retrieved from https:\/\/mom.me\/news\/271144-sneaky-kid-orders-350-worth-toys-her-moms-amazon-account\/."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Galina Lavrentyeva Sergey Novoselov Egor Malykh Alexander Kozlov Oleg Kudashev and Vadim Shchemelinin. 2017. Audio-replay attack detection countermeasures. Retrieved from http:\/\/arxiv.org\/abs\/1705.08858.  Galina Lavrentyeva Sergey Novoselov Egor Malykh Alexander Kozlov Oleg Kudashev and Vadim Shchemelinin. 2017. Audio-replay attack detection countermeasures. Retrieved from http:\/\/arxiv.org\/abs\/1705.08858.","DOI":"10.1007\/978-3-319-66429-3_16"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1207\/S1532785XMEP0701_2"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2799820"},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the International Conference on Communication and Signal Processing (ICCSP\u201916)","author":"Londhe N. D."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858288"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.06.007"},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the IEEE Conference on Multimedia Information Processing and Retrieval (MIPR\u201919)","author":"Malik K. M."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"e_1_2_1_78_1","volume-title":"Bjorn Hoffmeister, and Arindam Mandal.","author":"Wu Minhua","year":"2018"},{"key":"e_1_2_1_79_1","unstructured":"Taylor Martin. 2018. 12 Reasons to use Alexa in the Kitchen. Retrieved from https:\/\/www.cnet.com\/how-to\/how-to-use-alexa-in-the-kitchen\/.  Taylor Martin. 2018. 12 Reasons to use Alexa in the Kitchen. Retrieved from https:\/\/www.cnet.com\/how-to\/how-to-use-alexa-in-the-kitchen\/."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_2_1_81_1","volume-title":"Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. [n.d.]. Security and privacy experiences and practices of survivors of intimate partner abuse","author":"Matthews Tara"},{"key":"e_1_2_1_82_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 413--427","author":"Jonathan"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.143"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.4180831"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110103"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-012-0831-5"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683422"},{"key":"e_1_2_1_88_1","volume-title":"Proceedings of the 7th International Conference on Privacy Enhancing Technologies (PET\u201907)","author":"Steven"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1035"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1999.tb00142.x"},{"key":"e_1_2_1_91_1","volume-title":"Poster. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201919)","author":"Natatsuka Atsuko","year":"2019"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363274"},{"key":"e_1_2_1_93_1","unstructured":"Lily Hay Newman. 2018. Millions of Streaming Devices Are Vulnerable to a Retro Web Attack. Retrieved from https:\/\/www.wired.com\/story\/chromecast-roku-sonos-dns-rebinding-vulnerability\/.  Lily Hay Newman. 2018. Millions of Streaming Devices Are Vulnerable to a Retro Web Attack. Retrieved from https:\/\/www.wired.com\/story\/chromecast-roku-sonos-dns-rebinding-vulnerability\/."},{"key":"e_1_2_1_94_1","volume-title":"Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems. 1012--1017","author":"Ni Xudong","year":"2009"},{"key":"e_1_2_1_95_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","journal-title":"Washington Law Rev."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.25"},{"key":"e_1_2_1_97_1","volume-title":"Virtual digital assistants to overtake world population by","author":"OVUM.","year":"2021"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-2559"},{"key":"e_1_2_1_99_1","volume-title":"Proceedings of the 3rd IEEE European Symposium on Security and Privacy.","author":"Papernot Nicolas","year":"2018"},{"key":"e_1_2_1_100_1","volume-title":"Goodfellow","author":"Papernot Nicolas","year":"2016"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D16-1244"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.3390\/s140916235"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3125"},{"key":"e_1_2_1_104_1","unstructured":"Aimee Picchi. 2019. Amazon Workers are Listening to What You Tell Alexa. Retrieved from https:\/\/www.cbsnews.com\/news\/amazon-workers-are-listening-to-what-you-tell-alexa\/.  Aimee Picchi. 2019. Amazon Workers are Listening to What You Tell Alexa. Retrieved from https:\/\/www.cbsnews.com\/news\/amazon-workers-are-listening-to-what-you-tell-alexa\/."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9277-z"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2010.5546813"},{"key":"e_1_2_1_107_1","first-page":"1","article-title":"Security attacks on cloud computing with possible solution","volume":"6","author":"Chouhan Priyanka","year":"2016","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053246"},{"key":"e_1_2_1_109_1","volume-title":"Proceedings of the ACM Cloud Computing Security Workshop. 97--108","author":"Ramokapane Kopo M."},{"key":"e_1_2_1_110_1","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS\u201917)","author":"Ramokapane Kopo M."},{"key":"e_1_2_1_111_1","volume-title":"Everything Alexa Learned","author":"Reid Toni","year":"2018"},{"key":"e_1_2_1_112_1","unstructured":"Mary Lou Roberts. 2019. Are Your Voice Assistants Always Listening? The Simplistic Answer is \u201cYes.\u201d Retrieved from http:\/\/www.capecodtoday.com\/article\/2019\/08\/11\/248280-Are-Your-Voice-Assistants-Always-Listening.  Mary Lou Roberts. 2019. Are Your Voice Assistants Always Listening? The Simplistic Answer is \u201cYes.\u201d Retrieved from http:\/\/www.capecodtoday.com\/article\/2019\/08\/11\/248280-Are-Your-Voice-Assistants-Always-Listening."},{"key":"e_1_2_1_113_1","unstructured":"Mike Rodehorst. 2019. Why Alexa Won\u2019t Wake Up When She Hears Her Name in Amazon\u2019s Super Bowl Ad. Retrieved from http:\/\/web.archive.org\/web\/20190211063816\/https:\/\/developer.amazon.com\/blogs\/alexa\/post\/37857f29-dd82-4cf4-9ebd-6ebe632f74d3\/why-alexa-won-t-wake-up-when-she-hears-her-name-in-amazon-s-super-bowl-ad.  Mike Rodehorst. 2019. Why Alexa Won\u2019t Wake Up When She Hears Her Name in Amazon\u2019s Super Bowl Ad. Retrieved from http:\/\/web.archive.org\/web\/20190211063816\/https:\/\/developer.amazon.com\/blogs\/alexa\/post\/37857f29-dd82-4cf4-9ebd-6ebe632f74d3\/why-alexa-won-t-wake-up-when-she-hears-her-name-in-amazon-s-super-bowl-ad."},{"key":"e_1_2_1_114_1","volume-title":"Evolution and trends in the security of the Internet of Things","author":"Roman Rodrigo","year":"2018"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2867613"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1331033"},{"key":"e_1_2_1_117_1","volume-title":"Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201918)","author":"Roy Nirupam","year":"2018"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161187"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.75"},{"key":"e_1_2_1_120_1","doi-asserted-by":"crossref","unstructured":"Lea Schonherr Katharina Kohls Steffen Zeiler Thorsten Holz and Dorothea Kolossa. 2018. Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding. Retrieved from http:\/\/arxiv.org\/abs\/1808.05665.  Lea Schonherr Katharina Kohls Steffen Zeiler Thorsten Holz and Dorothea Kolossa. 2018. Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding. Retrieved from http:\/\/arxiv.org\/abs\/1808.05665.","DOI":"10.14722\/ndss.2019.23288"},{"key":"e_1_2_1_121_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201917)","author":"Shokri R."},{"key":"e_1_2_1_122_1","unstructured":"Micah Singleton. 2017. Alexa Can Now Set Reminders for You. Retrieved from https:\/\/www.theverge.com\/circuitbreaker\/2017\/6\/1\/15724474\/alexa-echo-amazon-reminders-named-timers.  Micah Singleton. 2017. Alexa Can Now Set Reminders for You. Retrieved from https:\/\/www.theverge.com\/circuitbreaker\/2017\/6\/1\/15724474\/alexa-echo-amazon-reminders-named-timers."},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_2_1_124_1","volume-title":"Smart Spies: Alexa and Google Home Expose Users to Vishing and Eavesdropping.","year":"2019"},{"key":"e_1_2_1_125_1","unstructured":"Statista. 2018. Worldwide Intelligent\/Digital Assistant Market Share in 2017 and 2020 by Product. Retrieved from https:\/\/www.statista.com\/statistics\/789633\/worldwide-digital-assistant-market-share\/.  Statista. 2018. Worldwide Intelligent\/Digital Assistant Market Share in 2017 and 2020 by Product. Retrieved from https:\/\/www.statista.com\/statistics\/789633\/worldwide-digital-assistant-market-share\/."},{"key":"e_1_2_1_126_1","unstructured":"Nick Statt. 2019. Google Defends Letting Human Workers Listen to Assistant Voice Conversations. Retrieved from https:\/\/www.theverge.com\/2019\/7\/11\/20691021\/google-assistant-ai-training-controversy-human-workers-listening-privacy.  Nick Statt. 2019. Google Defends Letting Human Workers Listen to Assistant Voice Conversations. Retrieved from https:\/\/www.theverge.com\/2019\/7\/11\/20691021\/google-assistant-ai-training-controversy-human-workers-listening-privacy."},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.5555\/3171837.3171953"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2888766"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208039"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.79"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.009"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821512"},{"key":"e_1_2_1_135_1","volume-title":"29th USENIX Security Symposium (USENIX Security'20)","author":"Sugawara Takeshi","year":"2020"},{"key":"e_1_2_1_136_1","volume-title":"Proceedings of the 17th International Security Protocols Workshop.","author":"Syverson Paul","year":"2009"},{"key":"e_1_2_1_137_1","volume-title":"Proceedings of the HotPETS Conference.","author":"Syverson Paul","year":"2011"},{"key":"e_1_2_1_138_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian J. Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. CoRR abs\/1312.6199.  Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian J. Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. CoRR abs\/1312.6199."},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369807"},{"key":"e_1_2_1_140_1","volume-title":"Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS\u201919)","author":"Tabassum Madiha","year":"2019"},{"key":"e_1_2_1_141_1","volume-title":"C (Sep.","author":"Todisco Massimiliano","year":"2017"},{"key":"e_1_2_1_142_1","volume-title":"Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT\u201915)","author":"Vaidya Tavish","year":"2015"},{"key":"e_1_2_1_143_1","volume-title":"Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS\u201918)","volume":"11099","author":"Wang Xueou","year":"2018"},{"key":"e_1_2_1_144_1","volume-title":"China: Voice biometric collection threatens privacy.","author":"Watch Human Right","year":"2017"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185336"},{"key":"e_1_2_1_146_1","unstructured":"Sam Wolfson. 2018. Amazon\u2019s Alexa Recorded Private Conversation and Sent it to Random Contact. Retrieved from www.theguardian.com\/technology\/2018\/may\/24\/amazon-alexa-recorded-conversation.  Sam Wolfson. 2018. Amazon\u2019s Alexa Recorded Private Conversation and Sent it to Random Contact. Retrieved from www.theguardian.com\/technology\/2018\/may\/24\/amazon-alexa-recorded-conversation."},{"key":"e_1_2_1_147_1","unstructured":"Venessa Wong. 2017. Burger King\u2019s New Ad Will Hijack Your Google Home. Retrieved from https:\/\/www.cnbc.com\/2017\/04\/12\/burger-kings-new-ad-will-hijack-your-google-home.html.  Venessa Wong. 2017. Burger King\u2019s New Ad Will Hijack Your Google Home. Retrieved from https:\/\/www.cnbc.com\/2017\/04\/12\/burger-kings-new-ad-will-hijack-your-google-home.html."},{"key":"e_1_2_1_148_1","volume-title":"Proceedings of the Network and Distributed Security Symposium. IEEE.","author":"Wright Charles","year":"2009"},{"key":"e_1_2_1_149_1","volume-title":"Privacy Impact Assessment","author":"Wright David"},{"key":"e_1_2_1_150_1","volume-title":"Alex X. Liu, Li Chi Yu, and Tian Xie.","author":"Xinyu Lei","year":"2017"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461354"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235924.3235931"},{"key":"e_1_2_1_153_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIXSecurity\u201919)","author":"Zeng Eric","year":"2019"},{"key":"e_1_2_1_154_1","volume-title":"DolphinAttack. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201917)","author":"Zhang Guoming","year":"2017"},{"key":"e_1_2_1_155_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201919)","author":"Zhang N."},{"key":"e_1_2_1_156_1","volume-title":"Web Information Systems and Mining","author":"Zhao Sendong"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2007.04.005"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412383","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:01Z","timestamp":1750195501000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412383"}},"subtitle":["A Security and Privacy Review"],"short-title":[],"issued":{"date-parts":[[2020,12,6]]},"references-count":158,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,11,30]]}},"alternative-id":["10.1145\/3412383"],"URL":"https:\/\/doi.org\/10.1145\/3412383","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,6]]},"assertion":[{"value":"2019-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}