{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T14:43:43Z","timestamp":1772117023937,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SFB 1119 - 236615297"],"award-info":[{"award-number":["SFB 1119 - 236615297"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427277","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"694-705","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["LeakyPick: IoT Audio Spy Detector"],"prefix":"10.1145","author":[{"given":"Richard","family":"Mitev","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]},{"given":"Anna","family":"Pazii","sequence":"additional","affiliation":[{"name":"University of Paris Saclay"}]},{"given":"Markus","family":"Miettinen","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"North Carolina State University, United States of America"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Scikit-learn Python machine learning library. https:\/\/github.com\/scikit-learn\/  2020. Scikit-learn Python machine learning library. https:\/\/github.com\/scikit-learn\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Instance-based learning algorithms. Machine learning 6, 1","author":"Aha W","year":"1991"},{"key":"e_1_3_2_1_3_1","volume-title":"Monkey says, monkey does: security and privacy on voice assistants","author":"Alepis Efthimios","year":"2017"},{"key":"e_1_3_2_1_4_1","unstructured":"Amazon. [n.d.]. Alexa Built-in Products with AVS - SpeechRecognizer. https:\/\/developer.amazon.com\/de-DE\/docs\/alexa\/alexa-voice-service\/speechrecognizer.html  Amazon. [n.d.]. Alexa Built-in Products with AVS - SpeechRecognizer. https:\/\/developer.amazon.com\/de-DE\/docs\/alexa\/alexa-voice-service\/speechrecognizer.html"},{"key":"e_1_3_2_1_5_1","volume-title":"Random forests. Machine learning 45, 1","author":"Breiman Leo","year":"2001"},{"key":"e_1_3_2_1_6_1","unstructured":"Dell Cameron. 2018. Hack Can Turn Robotic Vacuum Into Creepy Rolling Surveillance Machine. https:\/\/gizmodo.com\/hack-can-turn-robotic-vacuum-into-creepy-rolling-survei-1827726378  Dell Cameron. 2018. Hack Can Turn Robotic Vacuum Into Creepy Rolling Surveillance Machine. https:\/\/gizmodo.com\/hack-can-turn-robotic-vacuum-into-creepy-rolling-survei-1827726378"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Carlini Nicholas","year":"2016"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2018. Audio adversarial examples: Targeted attacks on speech-to-text. arXiv preprint arXiv:1801.01944(2018).  Nicholas Carlini and David Wagner. 2018. Audio adversarial examples: Targeted attacks on speech-to-text. arXiv preprint arXiv:1801.01944(2018).","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_9_1","volume-title":"199. Statistical Inference. Duxbury","author":"Casella G.","edition":"2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196509"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Maximilian Christ Nils Braun Julius Neuffer and Andreas\u00a0W. Kempa-Liehr. 2018. Time Series FeatuRe Extraction on basis of Scalable Hypothesis tests (tsfresh \u2013 A Python package). Neurocomputing 307(2018). https:\/\/doi.org\/10.1016\/j.neucom.2018.03.067  Maximilian Christ Nils Braun Julius Neuffer and Andreas\u00a0W. Kempa-Liehr. 2018. Time Series FeatuRe Extraction on basis of Scalable Hypothesis tests (tsfresh \u2013 A Python package). Neurocomputing 307(2018). https:\/\/doi.org\/10.1016\/j.neucom.2018.03.067","DOI":"10.1016\/j.neucom.2018.03.067"},{"key":"e_1_3_2_1_13_1","unstructured":"Joseph Cox. [n.d.]. Revealed: Microsoft Contractors Are Listening to Some Skype Calls. https:\/\/www.vice.com\/en_us\/article\/xweqbq\/microsoft-contractors-listen-to-skype-calls  Joseph Cox. [n.d.]. Revealed: Microsoft Contractors Are Listening to Some Skype Calls. https:\/\/www.vice.com\/en_us\/article\/xweqbq\/microsoft-contractors-listen-to-skype-calls"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"e_1_3_2_1_15_1","unstructured":"DIODES Incorporated. [n.d.]. FILTERLESS 3W CLASS-D STEREO AUDIO AMPLIFIER. https:\/\/www.diodes.com\/assets\/Datasheets\/PAM8403.pdf  DIODES Incorporated. [n.d.]. FILTERLESS 3W CLASS-D STEREO AUDIO AMPLIFIER. https:\/\/www.diodes.com\/assets\/Datasheets\/PAM8403.pdf"},{"key":"e_1_3_2_1_16_1","unstructured":"Education First. [n.d.]. 1000 most common words in English. https:\/\/www.ef.com\/wwen\/english-resources\/english-vocabulary\/top-1000-words\/  Education First. [n.d.]. 1000 most common words in English. https:\/\/www.ef.com\/wwen\/english-resources\/english-vocabulary\/top-1000-words\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML), Vol.\u00a096","author":"Freund Yoav","year":"1996"},{"key":"e_1_3_2_1_18_1","unstructured":"Sarah Frier. 2019. Facebook Paid Contractors to Transcribe Users\u2019 Audio Chats. https:\/\/www.bloomberg.com\/news\/articles\/2019-08-13\/facebook-paid-hundreds-of-contractors-to-transcribe-users-audio  Sarah Frier. 2019. Facebook Paid Contractors to Transcribe Users\u2019 Audio Chats. https:\/\/www.bloomberg.com\/news\/articles\/2019-08-13\/facebook-paid-hundreds-of-contractors-to-transcribe-users-audio"},{"key":"e_1_3_2_1_19_1","unstructured":"Google. [n.d.]. Learn about Nest Protect\u2019s automatic Sound Check test. https:\/\/support.google.com\/googlenest\/answer\/9242130?hl=en  Google. [n.d.]. Learn about Nest Protect\u2019s automatic Sound Check test. https:\/\/support.google.com\/googlenest\/answer\/9242130?hl=en"},{"key":"e_1_3_2_1_20_1","unstructured":"Google. [n.d.]. Learn how Nest cameras and Nest Hello detect sound and motion. https:\/\/support.google.com\/googlenest\/answer\/9250426?hl=en  Google. [n.d.]. Learn how Nest cameras and Nest Hello detect sound and motion. https:\/\/support.google.com\/googlenest\/answer\/9250426?hl=en"},{"key":"e_1_3_2_1_21_1","unstructured":"Andy Greenberg. 2017. This hack lets Amazon Echo \u2019remotely snoop\u2019 on users. https:\/\/www.wired.co.uk\/article\/amazon-echo-alexa-hack  Andy Greenberg. 2017. This hack lets Amazon Echo \u2019remotely snoop\u2019 on users. https:\/\/www.wired.co.uk\/article\/amazon-echo-alexa-hack"},{"key":"e_1_3_2_1_22_1","unstructured":"Caroline Haskins. 2019. Amazon Is Coaching Cops on How to Obtain Surveillance Footage Without a Warrant. https:\/\/www.vice.com\/en_us\/article\/43kga3\/amazon-is-coaching-cops-on-how-to-obtain-surveillance-footage-without-a-warrant  Caroline Haskins. 2019. Amazon Is Coaching Cops on How to Obtain Surveillance Footage Without a Warrant. https:\/\/www.vice.com\/en_us\/article\/43kga3\/amazon-is-coaching-cops-on-how-to-obtain-surveillance-footage-without-a-warrant"},{"key":"e_1_3_2_1_23_1","unstructured":"Lente\u00a0Van Hee Ruben Van\u00a0Den Heuvel Tim Verheyden and Denny Baert. [n.d.]. Google employees are eavesdropping even in your living room VRT NWS has discovered. https:\/\/www.vrt.be\/vrtnws\/en\/2019\/07\/10\/google-employees-are-eavesdropping-even-in-flemish-living-rooms\/  Lente\u00a0Van Hee Ruben Van\u00a0Den Heuvel Tim Verheyden and Denny Baert. [n.d.]. Google employees are eavesdropping even in your living room VRT NWS has discovered. https:\/\/www.vrt.be\/vrtnws\/en\/2019\/07\/10\/google-employees-are-eavesdropping-even-in-flemish-living-rooms\/"},{"key":"e_1_3_2_1_24_1","volume-title":"Apple contractors \u2019regularly hear confidential details","author":"Hern Alex","year":"2019"},{"key":"e_1_3_2_1_25_1","volume-title":"https:\/\/www.hivehome.com\/products\/hive-hub-360 (Accessed","author":"Hive Hub","year":"2020"},{"key":"e_1_3_2_1_26_1","unstructured":"Infochimps.com. [n.d.]. 350000 simple english words. http:\/\/www.infochimps.com\/datasets\/word-list-350000-simple-english-words-excel-readable  Infochimps.com. [n.d.]. 350000 simple english words. http:\/\/www.infochimps.com\/datasets\/word-list-350000-simple-english-words-excel-readable"},{"key":"e_1_3_2_1_27_1","unstructured":"Business Insider. [n.d.]. Google says the built-in microphone it never told Nest users about was \u2019never supposed to be a secret\u2019. https:\/\/www.businessinsider.com\/nest-microphone-was-never-supposed-to-be-a-secret-2019-2  Business Insider. [n.d.]. Google says the built-in microphone it never told Nest users about was \u2019never supposed to be a secret\u2019. https:\/\/www.businessinsider.com\/nest-microphone-was-never-supposed-to-be-a-secret-2019-2"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Kumar Deepak","year":"2018"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210332"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329842"},{"key":"e_1_3_2_1_31_1","unstructured":"David Monsees. [n.d.]. More information about our processes to safeguard speech data. https:\/\/www.blog.google\/products\/assistant\/more-information-about-our-processes-safeguard-speech-data\/  David Monsees. [n.d.]. More information about our processes to safeguard speech data. https:\/\/www.blog.google\/products\/assistant\/more-information-about-our-processes-safeguard-speech-data\/"},{"key":"e_1_3_2_1_32_1","unstructured":"Alfred Ng. 2019. Alexa and Google Assistant fall victim to eavesdropping apps. https:\/\/www.cnet.com\/news\/alexa-and-google-voice-assistants-app-exploits-left-it-vulnerable-to-eavesdropping\/  Alfred Ng. 2019. Alexa and Google Assistant fall victim to eavesdropping apps. https:\/\/www.cnet.com\/news\/alexa-and-google-voice-assistants-app-exploits-left-it-vulnerable-to-eavesdropping\/"},{"key":"e_1_3_2_1_33_1","unstructured":"Thien\u00a0Duc Nguyen Samuel Marchal Markus Miettinen Minh\u00a0Hoang Dang N. Asokan and Ahmad-Reza Sadeghi. 2018. D\u00cfoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. CoRR abs\/1804.07474(2018). arxiv:1804.07474http:\/\/arxiv.org\/abs\/1804.07474  Thien\u00a0Duc Nguyen Samuel Marchal Markus Miettinen Minh\u00a0Hoang Dang N. Asokan and Ahmad-Reza Sadeghi. 2018. D\u00cfoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. CoRR abs\/1804.07474(2018). arxiv:1804.07474http:\/\/arxiv.org\/abs\/1804.07474"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323409"},{"key":"e_1_3_2_1_35_1","volume-title":"Hanging on the metaphone. Computer Language 7, 12","author":"Philips Lawrence","year":"1990"},{"key":"e_1_3_2_1_36_1","unstructured":"Raspberry Pi Foundation. [n.d.]. Raspberry Pi 3 Model B. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-3-model-b\/  Raspberry Pi Foundation. [n.d.]. Raspberry Pi 3 Model B. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-3-model-b\/"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Roy Nirupam","year":"2018"},{"key":"e_1_3_2_1_39_1","unstructured":"Alex Rudnicky. [n.d.]. The CMU Pronouncing Dictionary. http:\/\/www.speech.cs.cmu.edu\/cgi-bin\/cmudict  Alex Rudnicky. [n.d.]. The CMU Pronouncing Dictionary. http:\/\/www.speech.cs.cmu.edu\/cgi-bin\/cmudict"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Lea Sch\u00f6nherr Katharina Kohls Steffen Zeiler Thorsten Holz and Dorothea Kolossa. 2018. Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. arXiv preprint arXiv:1808.05665(2018).  Lea Sch\u00f6nherr Katharina Kohls Steffen Zeiler Thorsten Holz and Dorothea Kolossa. 2018. Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. arXiv preprint arXiv:1808.05665(2018).","DOI":"10.14722\/ndss.2019.23288"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116438"},{"key":"e_1_3_2_1_42_1","unstructured":"Liwei Song and Prateek Mittal. 2017. Inaudible voice commands. arXiv preprint arXiv:1708.07238(2017).  Liwei Song and Prateek Mittal. 2017. Inaudible voice commands. arXiv preprint arXiv:1708.07238(2017)."},{"key":"e_1_3_2_1_43_1","unstructured":"Texas Instruments. [n.d.]. Low-Power Low-OffsetVoltage Dual Comparators. https:\/\/www.ti.com\/lit\/ds\/symlink\/lm393-n.pdf  Texas Instruments. [n.d.]. Low-Power Low-OffsetVoltage Dual Comparators. https:\/\/www.ti.com\/lit\/ds\/symlink\/lm393-n.pdf"},{"key":"e_1_3_2_1_44_1","unstructured":"Kevin\u00a0C. Tofel. 2018. Here\u2019s why smart home hubs seem to be dying a slow painful death. https:\/\/staceyoniot.com\/heres-why-smart-home-hubs-seem-to-be-dying-a-slow-painful-death\/  Kevin\u00a0C. Tofel. 2018. Here\u2019s why smart home hubs seem to be dying a slow painful death. https:\/\/staceyoniot.com\/heres-why-smart-home-hubs-seem-to-be-dying-a-slow-painful-death\/"},{"key":"e_1_3_2_1_45_1","unstructured":"tp-link. [n.d.]. 150Mbps High Gain Wireless USB Adapter - TL-WN722N. https:\/\/www.tp-link.com\/en\/home-networking\/adapter\/tl-wn722n\/  tp-link. [n.d.]. 150Mbps High Gain Wireless USB Adapter - TL-WN722N. https:\/\/www.tp-link.com\/en\/home-networking\/adapter\/tl-wn722n\/"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the USENIX Workshop on Offensive Technologies (WOOT).","author":"Vaidya Tavish","year":"2015"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"e_1_3_2_1_48_1","unstructured":"Merriam Webster. [n.d.]. .  Merriam Webster. [n.d.]. ."},{"key":"e_1_3_2_1_49_1","unstructured":"Xuejing Yuan Yuxuan Chen Yue Zhao Yunhui Long Xiaokang Liu Kai Chen Shengzhi Zhang Heqing Huang Xiaofeng Wang and Carl\u00a0A Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. arXiv preprint arXiv:1801.08535(2018).  Xuejing Yuan Yuxuan Chen Yue Zhao Yunhui Long Xiaokang Liu Kai Chen Shengzhi Zhang Heqing Huang Xiaofeng Wang and Carl\u00a0A Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. arXiv preprint arXiv:1801.08535(2018)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_51_1","unstructured":"Nan Zhang Xianghang Mi Xuan Feng XiaoFeng Wang Yuan Tian and Feng Qian. 2018. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. arXiv preprint arXiv:1805.01525(2018).  Nan Zhang Xianghang Mi Xuan Feng XiaoFeng Wang Yuan Tian and Feng Qian. 2018. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. arXiv preprint arXiv:1805.01525(2018)."}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427277","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":51,"alternative-id":["10.1145\/3427228.3427277","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427277","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}