{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:58:05Z","timestamp":1764784685190,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1846230"],"award-info":[{"award-number":["CNS-1846230"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,24]]},"DOI":"10.1145\/3458864.3467962","type":"proceedings-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T16:13:50Z","timestamp":1624378430000},"page":"109-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["MegaMind"],"prefix":"10.1145","author":[{"given":"Seyed Mohammadjavad Seyed","family":"Talebi","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Ardalan Amiri","family":"Sani","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Stefan","family":"Saroiu","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Alec","family":"Wolman","sequence":"additional","affiliation":[{"name":"Microsoft"}]}],"member":"320","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Toddler asks Amazon's Alexa to play song but gets porn instead. https:\/\/nypost.com\/2016\/12\/30\/toddler-asks-amazons-alexa-to-play-song-but-gets-porn-instead\/.  2016. Toddler asks Amazon's Alexa to play song but gets porn instead. https:\/\/nypost.com\/2016\/12\/30\/toddler-asks-amazons-alexa-to-play-song-but-gets-porn-instead\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. US First Names Database. https:\/\/data.world\/len\/us-first-names-database.  2016. US First Names Database. https:\/\/data.world\/len\/us-first-names-database."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Cortana in the car: Microsoft launches new automotive tech platform strikes Renault-Nissan partnership. https:\/\/www.geekwire.com\/2017\/cortana-car-microsoft-launches-new-automotive-tech-platform-strikes-renault-nissan-partnership\/.  2017. Cortana in the car: Microsoft launches new automotive tech platform strikes Renault-Nissan partnership. https:\/\/www.geekwire.com\/2017\/cortana-car-microsoft-launches-new-automotive-tech-platform-strikes-renault-nissan-partnership\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2017. Google Home can now power on your Vizio TV. https:\/\/www.cnet.com\/news\/google-home-can-now-power-on-your-vizio-tv\/.  2017. Google Home can now power on your Vizio TV. https:\/\/www.cnet.com\/news\/google-home-can-now-power-on-your-vizio-tv\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Amazon Alexa-Powered Device Recorded and Shared User's Conversation Without Permission. https:\/\/www.wsj.com\/articles\/amazon-alexa-powered-device-recorded-and-shared-users-conversation-without-permission-1527203250.  2018. Amazon Alexa-Powered Device Recorded and Shared User's Conversation Without Permission. https:\/\/www.wsj.com\/articles\/amazon-alexa-powered-device-recorded-and-shared-users-conversation-without-permission-1527203250."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. Google Assistant - LIFX.com. https:\/\/www.lifx.com\/products\/google-assistant.  2018. Google Assistant - LIFX.com. https:\/\/www.lifx.com\/products\/google-assistant."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. Hey I didn't order this dollhouse! 6 hilarious Alexa mishaps. https:\/\/www.digitaltrends.com\/home\/funny-accidental-amazon-alexa-ordering-stories\/\/.  2018. Hey I didn't order this dollhouse! 6 hilarious Alexa mishaps. https:\/\/www.digitaltrends.com\/home\/funny-accidental-amazon-alexa-ordering-stories\/\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2018. Is Alexa Listening? Amazon Echo Sent Out Recording of Couple's Conversation. https:\/\/www.nytimes.com\/2018\/05\/25\/business\/amazon-alexa-conversation-shared-echo.html\/.  2018. Is Alexa Listening? Amazon Echo Sent Out Recording of Couple's Conversation. https:\/\/www.nytimes.com\/2018\/05\/25\/business\/amazon-alexa-conversation-shared-echo.html\/."},{"volume-title":"Meet STEMosaur! https:\/\/cognitoys.com\/.","key":"e_1_3_2_1_9_1","unstructured":"2018. Meet STEMosaur! https:\/\/cognitoys.com\/. 2018. Meet STEMosaur! https:\/\/cognitoys.com\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2018. SmartThinQ with VoiceAssistants. https:\/\/www.lg.com\/us\/support\/works-with-google-alexa-voice-assistant.  2018. SmartThinQ with VoiceAssistants. https:\/\/www.lg.com\/us\/support\/works-with-google-alexa-voice-assistant."},{"key":"e_1_3_2_1_11_1","unstructured":"2018. Tesla's Siri integration now works with Model 3. https:\/\/electrek.co\/2018\/03\/20\/teslas-siri-integration-now-works-with-model-3\/.  2018. Tesla's Siri integration now works with Model 3. https:\/\/electrek.co\/2018\/03\/20\/teslas-siri-integration-now-works-with-model-3\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2018. Volkswagen now lets Apple users unlock their cars with Siri. https:\/\/www.theverge.com\/2018\/11\/12\/18087416\/volkswagen-vw-car-net-app-siri-shortcuts.  2018. Volkswagen now lets Apple users unlock their cars with Siri. https:\/\/www.theverge.com\/2018\/11\/12\/18087416\/volkswagen-vw-car-net-app-siri-shortcuts."},{"key":"e_1_3_2_1_13_1","unstructured":"2018. Was the Alexa Butt Dial a Big Deal? Steps You Can Take if You Are Concerned. https:\/\/voicebot.ai\/2018\/05\/28\/was-the-alexa-butt-dial-a-big-deal-steps-you-can-take-if-you-are-concerned\/.  2018. Was the Alexa Butt Dial a Big Deal? Steps You Can Take if You Are Concerned. https:\/\/voicebot.ai\/2018\/05\/28\/was-the-alexa-butt-dial-a-big-deal-steps-you-can-take-if-you-are-concerned\/."},{"key":"e_1_3_2_1_14_1","unstructured":"2019. Amazon's Alexa Allegedly Calls 911 During Domestic Violence Incident. https:\/\/wflanews.iheart.com\/featured\/pm-tampa-bay-with-ryan-gorman\/content\/2019-07-17-amazons-alexa-allegedly-calls-911-during-domestic-violence-incident\/.  2019. Amazon's Alexa Allegedly Calls 911 During Domestic Violence Incident. https:\/\/wflanews.iheart.com\/featured\/pm-tampa-bay-with-ryan-gorman\/content\/2019-07-17-amazons-alexa-allegedly-calls-911-during-domestic-violence-incident\/."},{"key":"e_1_3_2_1_15_1","unstructured":"2019. DeepSpeech 0.6: Mozilla's Speech-to-Text Engine Gets Fast Lean and Ubiquitous. https:\/\/hacks.mozilla.org\/2019\/12\/deepspeech-0-6-mozillas-speech-to-text-engine\/.  2019. DeepSpeech 0.6: Mozilla's Speech-to-Text Engine Gets Fast Lean and Ubiquitous. https:\/\/hacks.mozilla.org\/2019\/12\/deepspeech-0-6-mozillas-speech-to-text-engine\/."},{"key":"e_1_3_2_1_16_1","unstructured":"2020. DeepSpeech Slow Inference Speed Raspberry Pi 3B. https:\/\/github.com\/mozilla\/DeepSpeech\/issues\/3000\/.  2020. DeepSpeech Slow Inference Speed Raspberry Pi 3B. https:\/\/github.com\/mozilla\/DeepSpeech\/issues\/3000\/."},{"key":"e_1_3_2_1_17_1","unstructured":"2020. Raspberry Pi 4 vs Raspberry Pi 3B+. https:\/\/magpi.raspberrypi.org\/articles\/raspberry-pi-4-vs-raspberry-pi-3b-plus\/\/.  2020. Raspberry Pi 4 vs Raspberry Pi 3B+. https:\/\/magpi.raspberrypi.org\/articles\/raspberry-pi-4-vs-raspberry-pi-3b-plus\/\/."},{"key":"e_1_3_2_1_18_1","unstructured":"2021. Alexa for PC. https:\/\/developer.amazon.com\/en-US\/alexa\/devices\/pcs.  2021. Alexa for PC. https:\/\/developer.amazon.com\/en-US\/alexa\/devices\/pcs."},{"key":"e_1_3_2_1_19_1","unstructured":"2021. Alexa skill market. https:\/\/www.amazon.com\/alexa-skills\/b?ie=UTF8&node=13727921011.  2021. Alexa skill market. https:\/\/www.amazon.com\/alexa-skills\/b?ie=UTF8&node=13727921011."},{"key":"e_1_3_2_1_20_1","unstructured":"2021. Amazon Alexa. https:\/\/en.wikipedia.org\/wiki\/Amazon_Alexa.  2021. Amazon Alexa. https:\/\/en.wikipedia.org\/wiki\/Amazon_Alexa."},{"key":"e_1_3_2_1_21_1","unstructured":"2021. Amazon Echo. https:\/\/en.wikipedia.org\/wiki\/Amazon_Echo.  2021. Amazon Echo. https:\/\/en.wikipedia.org\/wiki\/Amazon_Echo."},{"key":"e_1_3_2_1_22_1","unstructured":"2021. AVS Device SDK. https:\/\/developer.amazon.com\/alexa-voice-service\/sdk.  2021. AVS Device SDK. https:\/\/developer.amazon.com\/alexa-voice-service\/sdk."},{"key":"e_1_3_2_1_23_1","unstructured":"2021. Cortana Devices SDK. https:\/\/developer.microsoft.com\/en-us\/cortana\/devices.  2021. Cortana Devices SDK. https:\/\/developer.microsoft.com\/en-us\/cortana\/devices."},{"key":"e_1_3_2_1_24_1","unstructured":"2021. Every Alexa command you can give your Amazon Echo smart speaker. https:\/\/www.cnet.com\/how-to\/every-alexa-command-you-can-give-your-amazon-echo-smart-speaker\/.  2021. Every Alexa command you can give your Amazon Echo smart speaker. https:\/\/www.cnet.com\/how-to\/every-alexa-command-you-can-give-your-amazon-echo-smart-speaker\/."},{"key":"e_1_3_2_1_25_1","unstructured":"2021. Firejail Security Sandbox. https:\/\/firejail.wordpress.com\/.  2021. Firejail Security Sandbox. https:\/\/firejail.wordpress.com\/."},{"key":"e_1_3_2_1_26_1","unstructured":"2021. Google Assistant. https:\/\/assistant.google.com.  2021. Google Assistant. https:\/\/assistant.google.com."},{"key":"e_1_3_2_1_27_1","unstructured":"2021. Google Assistant SDK for devices. https:\/\/developers.google.com\/assistant\/sdk\/.  2021. Google Assistant SDK for devices. https:\/\/developers.google.com\/assistant\/sdk\/."},{"key":"e_1_3_2_1_28_1","unstructured":"2021. Google Home. https:\/\/en.wikipedia.org\/wiki\/Google_Home.  2021. Google Home. https:\/\/en.wikipedia.org\/wiki\/Google_Home."},{"key":"e_1_3_2_1_29_1","unstructured":"2021. HomePod. https:\/\/en.wikipedia.org\/wiki\/HomePod.  2021. HomePod. https:\/\/en.wikipedia.org\/wiki\/HomePod."},{"key":"e_1_3_2_1_30_1","unstructured":"2021. Invoke. https:\/\/en.wikipedia.org\/wiki\/Invoke_(smart_speaker).  2021. Invoke. https:\/\/en.wikipedia.org\/wiki\/Invoke_(smart_speaker)."},{"key":"e_1_3_2_1_31_1","unstructured":"2021. Laugh factory joke bank. http:\/\/www.laughfactory.com\/jokes\/.  2021. Laugh factory joke bank. http:\/\/www.laughfactory.com\/jokes\/."},{"key":"e_1_3_2_1_32_1","unstructured":"2021. Mi AI Speaker. https:\/\/www.mi.com\/aispeaker\/.  2021. Mi AI Speaker. https:\/\/www.mi.com\/aispeaker\/."},{"key":"e_1_3_2_1_33_1","unstructured":"2021. Mozzila Common Voice. https:\/\/voice.mozilla.org\/en\/\/.  2021. Mozzila Common Voice. https:\/\/voice.mozilla.org\/en\/\/."},{"key":"e_1_3_2_1_34_1","unstructured":"2021. Offensive\/Profane Word List. http:\/\/www.cs.cmu.edu\/~biglou\/resources\/bad-words.txt.  2021. Offensive\/Profane Word List. http:\/\/www.cs.cmu.edu\/~biglou\/resources\/bad-words.txt."},{"key":"e_1_3_2_1_35_1","unstructured":"2021. Personal Digital Assistant - Cortana Home Assistant. https:\/\/www.microsoft.com\/en-us\/cortana.  2021. Personal Digital Assistant - Cortana Home Assistant. https:\/\/www.microsoft.com\/en-us\/cortana."},{"key":"e_1_3_2_1_36_1","unstructured":"2021. Pico Text-to-Speech. https:\/\/www.openhab.org\/addons\/voice\/picotts\/.  2021. Pico Text-to-Speech. https:\/\/www.openhab.org\/addons\/voice\/picotts\/."},{"key":"e_1_3_2_1_37_1","unstructured":"2021. Siri - Apple. https:\/\/www.apple.com\/siri\/.  2021. Siri - Apple. https:\/\/www.apple.com\/siri\/."},{"key":"e_1_3_2_1_38_1","unstructured":"2021. Slot Type Reference. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/slot-type-reference.html\/.  2021. Slot Type Reference. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/slot-type-reference.html\/."},{"volume-title":"Total number of Amazon Alexa skills from","year":"2016","key":"e_1_3_2_1_39_1","unstructured":"2021. Total number of Amazon Alexa skills from January 2016 to September 2019. https:\/\/www.statista.com\/statistics\/912856\/amazon-alexa-skills-growth\/. 2021. Total number of Amazon Alexa skills from January 2016 to September 2019. https:\/\/www.statista.com\/statistics\/912856\/amazon-alexa-skills-growth\/."},{"key":"e_1_3_2_1_40_1","unstructured":"2021. Understand How Users Invoke Custom Skills. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/understanding-how-users-invoke-custom-skills.html\/.  2021. Understand How Users Invoke Custom Skills. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/understanding-how-users-invoke-custom-skills.html\/."},{"key":"e_1_3_2_1_41_1","unstructured":"2021. Voice Assistant on Fitbit Smartwatches. https:\/\/www.fitbit.com\/global\/us\/technology\/voice.  2021. Voice Assistant on Fitbit Smartwatches. https:\/\/www.fitbit.com\/global\/us\/technology\/voice."},{"key":"e_1_3_2_1_42_1","unstructured":"2021. What is WordNet? https:\/\/wordnet.princeton.edu\/.  2021. What is WordNet? https:\/\/wordnet.princeton.edu\/."},{"key":"e_1_3_2_1_43_1","volume":"201","author":"Abdullah H.","unstructured":"H. Abdullah , W. Garcia , C. Peeters , P. Traynor , K. R. B. Butler , and J. Wilson. 201 9. Practical Hidden Voice Attacks Against Speech and Speaker Recognition Systems. (2019). H. Abdullah, W. Garcia, C. Peeters, P. Traynor, K. R. B. Butler, and J. Wilson. 2019. Practical Hidden Voice Attacks Against Speech and Speaker Recognition Systems. (2019).","journal-title":"J. Wilson."},{"volume-title":"Proceedings of the 17th Conference on Embedded Networked Sensor Systems (SenSys '19)","author":"Aloufi R.","key":"e_1_3_2_1_44_1","unstructured":"R. Aloufi , H. Haddadi , and D. Boyle . 2019. Privacy Preserving Speech Analysis Using Emotion Filtering at the Edge: Poster Abstract . In Proceedings of the 17th Conference on Embedded Networked Sensor Systems (SenSys '19) . R. Aloufi, H. Haddadi, and D. Boyle. 2019. Privacy Preserving Speech Analysis Using Emotion Filtering at the Edge: Poster Abstract. In Proceedings of the 17th Conference on Embedded Networked Sensor Systems (SenSys '19)."},{"volume-title":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop. 1--14","author":"Aloufi R.","key":"e_1_3_2_1_45_1","unstructured":"R. Aloufi , H. Haddadi , and D. Boyle . 2020. Privacy-preserving Voice Analysis via Disentangled Representations . In Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop. 1--14 . R. Aloufi, H. Haddadi, and D. Boyle. 2020. Privacy-preserving Voice Analysis via Disentangled Representations. In Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop. 1--14."},{"key":"e_1_3_2_1_46_1","unstructured":"Amazon Alexa. 2018. Create the Interaction Model for Your Skill. https:\/\/developer.amazon.com\/docs\/custom-skills\/create-the-interaction-model-for-your-skill.html.  Amazon Alexa. 2018. Create the Interaction Model for Your Skill. https:\/\/developer.amazon.com\/docs\/custom-skills\/create-the-interaction-model-for-your-skill.html."},{"key":"e_1_3_2_1_47_1","volume-title":"Android Security Framework: Enabling Generic and Extensible Access Control on Android. arXiv preprint arXiv:1404.1395","author":"Backes M.","year":"2014","unstructured":"M. Backes , S. Bugiel , S. Gerling , and P. von Styp-Rekowsky . 2014. Android Security Framework: Enabling Generic and Extensible Access Control on Android. arXiv preprint arXiv:1404.1395 ( 2014 ). M. Backes, S. Bugiel, S. Gerling, and P. von Styp-Rekowsky. 2014. Android Security Framework: Enabling Generic and Extensible Access Control on Android. arXiv preprint arXiv:1404.1395 (2014)."},{"volume-title":"Proc. ACM WWW.","author":"Campagna G.","key":"e_1_3_2_1_48_1","unstructured":"G. Campagna , R. Ramesh , S. Xu , M. Fischer , and M. S. Lam . 2017. Almond: The Architecture of an Open, Crowdsourced, Privacy-Preserving, Programmable Virtual Assistant . In Proc. ACM WWW. G. Campagna, R. Ramesh, S. Xu, M. Fischer, and M. S. Lam. 2017. Almond: The Architecture of an Open, Crowdsourced, Privacy-Preserving, Programmable Virtual Assistant. In Proc. ACM WWW."},{"volume-title":"Proc. of 25th USENIX Security Symposium (USENIX Security 16)","author":"Carlini N.","key":"e_1_3_2_1_49_1","unstructured":"N. Carlini , P. Mishra , Vaidya T., Y. Zhang , M. Sherr , C. Shields , D. Wagner , and W. Zhou . 2016. Hidden Voice Commands . In Proc. of 25th USENIX Security Symposium (USENIX Security 16) (Austin, TX). N. Carlini, P. Mishra, Vaidya T., Y. Zhang, M. Sherr, C. Shields, D. Wagner, and W. Zhou. 2016. Hidden Voice Commands. In Proc. of 25th USENIX Security Symposium (USENIX Security 16) (Austin, TX)."},{"key":"e_1_3_2_1_50_1","volume-title":"Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems.","author":"Chen T.","year":"2020","unstructured":"T. Chen , L. Shangguan , Z. Li , and K. Jamieson . 2020 . Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems. (2020). T. Chen, L. Shangguan, Z. Li, and K. Jamieson. 2020. Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems. (2020)."},{"volume-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20)","author":"Cheng L.","key":"e_1_3_2_1_51_1","unstructured":"L. Cheng , Ch. Wilson , S. Liao , J. Young , D. Dong , and H. Hu . 2020. Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms . In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20) . L. Cheng, Ch. Wilson, S. Liao, J. Young, D. Dong, and H. Hu. 2020. Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20)."},{"key":"e_1_3_2_1_52_1","volume-title":"Computer Security and the Modern Home. Commun. ACM 56","author":"Denning T.","year":"2013","unstructured":"T. Denning , T Kohno , and H Levy . 2013. Computer Security and the Modern Home. Commun. ACM 56 ( 2013 ). Issue 1. T. Denning, T Kohno, and H Levy. 2013. Computer Security and the Modern Home. Commun. ACM 56 (2013). Issue 1."},{"volume-title":"Proc. of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (SPSM)","author":"Diao W.","key":"e_1_3_2_1_53_1","unstructured":"W. Diao , X. Liu , Z. Zhou , and K. Zhang . 2014. Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone . In Proc. of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (SPSM) ( Scottsdale, AZ). W. Diao, X. Liu, Z. Zhou, and K. Zhang. 2014. Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. In Proc. of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (SPSM) (Scottsdale, AZ)."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Dubois D.","year":"2020","unstructured":"D. Dubois , R. Kolcun , A. Mandalari , M. Paracha , D. Choffnes , and H. Haddadi . 2020. When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers . Proceedings on Privacy Enhancing Technologies ( 2020 ). D. Dubois, R. Kolcun, A. Mandalari, M. Paracha, D. Choffnes, and H. Haddadi. 2020. When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers. Proceedings on Privacy Enhancing Technologies (2020)."},{"volume-title":"Proc. of 37th IEEE Symposium on Security and Privacy","author":"Fernandes E.","key":"e_1_3_2_1_55_1","unstructured":"E. Fernandes , J. Jung , and A. Prakash . 2016. Security Analysis of Emerging Smart Home Applications . In Proc. of 37th IEEE Symposium on Security and Privacy ( San Jose, CA). E. Fernandes, J. Jung, and A. Prakash. 2016. Security Analysis of Emerging Smart Home Applications. In Proc. of 37th IEEE Symposium on Security and Privacy (San Jose, CA)."},{"volume-title":"Proc. of 25th USENIX Security Symposium","author":"Fernandes E.","key":"e_1_3_2_1_56_1","unstructured":"E. Fernandes , J. Paupore , A. Rahmati , D. Simionato , M. Conti , and A. Prakash . 2016. FlowFence: Practice Data Protection for Emerging IoT Application Frameworks . In Proc. of 25th USENIX Security Symposium ( Austin, TX). E. Fernandes, J. Paupore, A. Rahmati, D. Simionato, M. Conti, and A. Prakash. 2016. FlowFence: Practice Data Protection for Emerging IoT Application Frameworks. In Proc. of 25th USENIX Security Symposium (Austin, TX)."},{"key":"e_1_3_2_1_57_1","unstructured":"Alex Hern. 2019. Apple contractors 'regularly hear confidential details' on Siri recordings. https:\/\/www.theguardian.com\/technology\/2019\/jul\/26\/apple-contractors-regularly-hear-confidential-details-on-siri-recordings.  Alex Hern. 2019. Apple contractors 'regularly hear confidential details' on Siri recordings. https:\/\/www.theguardian.com\/technology\/2019\/jul\/26\/apple-contractors-regularly-hear-confidential-details-on-siri-recordings."},{"volume-title":"Proc. USENIX Security Symposium. 1005--1019","author":"Heuser S.","key":"e_1_3_2_1_58_1","unstructured":"S. Heuser , A. Nadkarni , W. Enck , and A. Sadeghi . 2014. ASM: A Programmable Interface for Extending Android Security . In Proc. USENIX Security Symposium. 1005--1019 . S. Heuser, A. Nadkarni, W. Enck, and A. Sadeghi. 2014. ASM: A Programmable Interface for Extending Android Security. In Proc. USENIX Security Symposium. 1005--1019."},{"volume-title":"Proc. ACM Workshop on Mobile Computing Systems & Applications (HotMobile).","author":"Jain S.","key":"e_1_3_2_1_59_1","unstructured":"S. Jain , V. Tiwari , A. Balasubramanian , N. Balasubramanian , and S. Chakraborty . 2017. PrIA: A Private Intelligent Assistant . In Proc. ACM Workshop on Mobile Computing Systems & Applications (HotMobile). S. Jain, V. Tiwari, A. Balasubramanian, N. Balasubramanian, and S. Chakraborty. 2017. PrIA: A Private Intelligent Assistant. In Proc. ACM Workshop on Mobile Computing Systems & Applications (HotMobile)."},{"volume-title":"Proc. of 27th USENIX Security Symposium","author":"Kumar D.","key":"e_1_3_2_1_60_1","unstructured":"D. Kumar , R. Paccagnella , P. Murley , E. Hennenfent , J. Mason , A. Bates , and M. Bailey . 2018. Skill Squatting Attacks on Amazon Alexa . In Proc. of 27th USENIX Security Symposium ( Baltimore, MD). D. Kumar, R. Paccagnella, P. Murley, E. Hennenfent, J. Mason, A. Bates, and M. Bailey. 2018. Skill Squatting Attacks on Amazon Alexa. In Proc. of 27th USENIX Security Symposium (Baltimore, MD)."},{"volume-title":"Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. In Annual Computer Security Applications Conference (ACSAC '20)","author":"Liao S.","key":"e_1_3_2_1_61_1","unstructured":"S. Liao , Ch. Wilson , L. Cheng , H. Hu , and H. Deng . 2020 . Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. In Annual Computer Security Applications Conference (ACSAC '20) . S. Liao, Ch. Wilson, L. Cheng, H. Hu, and H. Deng. 2020. Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. In Annual Computer Security Applications Conference (ACSAC '20)."},{"volume-title":"Proc. ACM Asia Conference on Computer and Communications Security (AsiaCCS).","author":"Mitev R.","key":"e_1_3_2_1_62_1","unstructured":"R. Mitev , M. Miettinen , and A. Sadeghi . 2019. Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants . In Proc. ACM Asia Conference on Computer and Communications Security (AsiaCCS). R. Mitev, M. Miettinen, and A. Sadeghi. 2019. Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants. In Proc. ACM Asia Conference on Computer and Communications Security (AsiaCCS)."},{"volume-title":"Proc. of European Symposium on Research in Computer Security (ESORICS)","author":"Mukhopadhyay D.","key":"e_1_3_2_1_63_1","unstructured":"D. Mukhopadhyay , M. Shirvanian , and N. Saxena . 2015. All your voices are belong to us: Stealing voices to fool humans and machines . In Proc. of European Symposium on Research in Computer Security (ESORICS) ( Vienna, Austria). D. Mukhopadhyay, M. Shirvanian, and N. Saxena. 2015. All your voices are belong to us: Stealing voices to fool humans and machines. In Proc. of European Symposium on Research in Computer Security (ESORICS) (Vienna, Austria)."},{"volume-title":"Proc. of the 15th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys)","author":"Roy N.","key":"e_1_3_2_1_64_1","unstructured":"N. Roy , H. Hassanieh , and R. Choudhury . 2017. BackDoor: Making Microphones Hear Inaudible Sounds . In Proc. of the 15th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys) ( Niagara Falls, NY). N. Roy, H. Hassanieh, and R. Choudhury. 2017. BackDoor: Making Microphones Hear Inaudible Sounds. In Proc. of the 15th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys) (Niagara Falls, NY)."},{"key":"e_1_3_2_1_65_1","volume-title":"Proc. of 15th Symposium on Networked Systems Design and Impalementation (NSDI)","author":"Roy N.","year":"2018","unstructured":"N. Roy , S Shen , H Hassanieh , and R Choudhury . 2018 . Inaudible Voice Commands: The Long-Range Attack and Defense . In Proc. of 15th Symposium on Networked Systems Design and Impalementation (NSDI) ( Renton, WA). N. Roy, S Shen, H Hassanieh, and R Choudhury. 2018. Inaudible Voice Commands: The Long-Range Attack and Defense. In Proc. of 15th Symposium on Networked Systems Design and Impalementation (NSDI) (Renton, WA)."},{"volume-title":"Proceedings of The Web Conference 2020 (WWW '20)","author":"Shezan F.","key":"e_1_3_2_1_66_1","unstructured":"F. Shezan , H. Hu , J. Wang , G. Wang , and Y. Tian . 2020. Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems . In Proceedings of The Web Conference 2020 (WWW '20) . Association for Computing Machinery. F. Shezan, H. Hu, J. Wang, G. Wang, and Y. Tian. 2020. Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems. In Proceedings of The Web Conference 2020 (WWW '20). Association for Computing Machinery."},{"volume-title":"Proc. of 1st International Workshop on Pervasive Smart Living Spaces (PerLS)","author":"Simpson A.K.","key":"e_1_3_2_1_67_1","unstructured":"A.K. Simpson , F. Roesner , and T. Kohno . 2017. Securing Vulnerable Home IoT Devices with an In-Hub Security Manager . In Proc. of 1st International Workshop on Pervasive Smart Living Spaces (PerLS) ( Malm\u00f3, Sweden). A.K. Simpson, F. Roesner, and T. Kohno. 2017. Securing Vulnerable Home IoT Devices with an In-Hub Security Manager. In Proc. of 1st International Workshop on Pervasive Smart Living Spaces (PerLS) (Malm\u00f3, Sweden)."},{"key":"e_1_3_2_1_68_1","volume-title":"Proc. of Workshop on Home Usable Privacy and Security (HUPS)","author":"Ur B.","year":"2013","unstructured":"B. Ur , J. Jung , and S Schechter . 2013 . The Current State of Access Control for Smart Devices in Homes . In Proc. of Workshop on Home Usable Privacy and Security (HUPS) ( Newcastle, UK). B. Ur, J. Jung, and S Schechter. 2013. The Current State of Access Control for Smart Devices in Homes. In Proc. of Workshop on Home Usable Privacy and Security (HUPS) (Newcastle, UK)."},{"volume-title":"Cocaine Noodles: Exploiting the Gap Between Human and Machine Speech Recognition. In In Proc. of the 9th USENIX Conference on Offensive Technologies (WOOT) (Washington, D.C.).","author":"Vaidya T.","key":"e_1_3_2_1_69_1","unstructured":"T. Vaidya , Y. Zhang , M. Sherr , and C. Shields . 2015 . Cocaine Noodles: Exploiting the Gap Between Human and Machine Speech Recognition. In In Proc. of the 9th USENIX Conference on Offensive Technologies (WOOT) (Washington, D.C.). T. Vaidya, Y. Zhang, M. Sherr, and C. Shields. 2015. Cocaine Noodles: Exploiting the Gap Between Human and Machine Speech Recognition. In In Proc. of the 9th USENIX Conference on Offensive Technologies (WOOT) (Washington, D.C.)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Q. Yan K. Liu Q. Zhou H. Guo and N. Zhang. 2020. SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. (2020).  Q. Yan K. Liu Q. Zhou H. Guo and N. Zhang. 2020. SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. (2020).","DOI":"10.14722\/ndss.2020.24068"},{"key":"e_1_3_2_1_71_1","volume-title":"Proc. of 27th USENIX Security Symposium","author":"Yuan X.","year":"2018","unstructured":"X. Yuan , Y. Chen , Y. Zhao , Y. Long , X Liu , K Chen , S Zhang , H Huang , X Wang , and C Gunter . 2018 . CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition . In Proc. of 27th USENIX Security Symposium ( Baltimore, MD). X. Yuan, Y. Chen, Y. Zhao, Y. Long, X Liu, K Chen, S Zhang, H Huang, X Wang, and C Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of 27th USENIX Security Symposium (Baltimore, MD)."},{"volume-title":"Proc. of the 13th USENIX Conference on Usable Privacy and Security (SOUPS)","author":"Zeng E.","key":"e_1_3_2_1_72_1","unstructured":"E. Zeng , Sh. Mare , and F. Roesner . 2017. End User Security & Privacy Concerns with Smart Homes . In Proc. of the 13th USENIX Conference on Usable Privacy and Security (SOUPS) ( Santa Clara, CA). E. Zeng, Sh. Mare, and F. Roesner. 2017. End User Security & Privacy Concerns with Smart Homes. In Proc. of the 13th USENIX Conference on Usable Privacy and Security (SOUPS) (Santa Clara, CA)."},{"volume-title":"Proc. USENIX Security Symposium.","author":"Zeng E.","key":"e_1_3_2_1_73_1","unstructured":"E. Zeng and F. Roesner . 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study . In Proc. USENIX Security Symposium. E. Zeng and F. Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In Proc. USENIX Security Symposium."},{"volume-title":"DolphinAttack: Inaudible Voice Commands. In CCS 2017","author":"Zhang G.","key":"e_1_3_2_1_74_1","unstructured":"G. Zhang , C. Yan , X. Ji , T. Zhang , T. Zhang , and W. Xu . 2017 . DolphinAttack: Inaudible Voice Commands. In CCS 2017 ( Dallas, TX). G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang, and W. Xu. 2017. DolphinAttack: Inaudible Voice Commands. In CCS 2017 (Dallas, TX)."},{"volume-title":"Proc. of the IEEE Symposium on Security and Privacy","author":"Zhang N.","key":"e_1_3_2_1_75_1","unstructured":"N. Zhang , X. Mi , X. Feng , X. Wang , Y. Tian , and F. Qian . 2019. Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems . In Proc. of the IEEE Symposium on Security and Privacy ( San Francisco, CA). N. Zhang, X. Mi, X. Feng, X. Wang, Y. Tian, and F. Qian. 2019. Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. In Proc. of the IEEE Symposium on Security and Privacy (San Francisco, CA)."},{"key":"e_1_3_2_1_76_1","volume-title":"Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications. In Proc","author":"Zhang Y.","year":"2019","unstructured":"Y. Zhang , L. Xu , A. Mendoza , G. Yang , P. Chinprutthiwong , and G. Gu . 2019 . Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications. In Proc . Internet Society NDSS. Y. Zhang, L. Xu, A. Mendoza, G. Yang, P. Chinprutthiwong, and G. Gu. 2019. Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications. In Proc. Internet Society NDSS."}],"event":{"name":"MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Virtual Event Wisconsin","acronym":"MobiSys '21"},"container-title":["Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458864.3467962","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3458864.3467962","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3458864.3467962","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3458864.3467962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:55Z","timestamp":1750195495000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458864.3467962"}},"subtitle":["a platform for security &amp; privacy extensions for voice assistants"],"short-title":[],"issued":{"date-parts":[[2021,6,24]]},"references-count":76,"alternative-id":["10.1145\/3458864.3467962","10.1145\/3458864"],"URL":"https:\/\/doi.org\/10.1145\/3458864.3467962","relation":{},"subject":[],"published":{"date-parts":[[2021,6,24]]},"assertion":[{"value":"2021-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}