{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:18:01Z","timestamp":1756462681084,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1722743, 1816851, 1433736, 1815757"],"award-info":[{"award-number":["1722743, 1816851, 1433736, 1815757"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3463676.3485615","type":"proceedings-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T22:07:38Z","timestamp":1636150058000},"page":"237-243","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["What a SHAME"],"prefix":"10.1145","author":[{"given":"Jack","family":"Hyland","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Conrad","family":"Schneggenburger","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Nick","family":"Lim","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Jake","family":"Ruud","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Nate","family":"Mathews","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]},{"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"ACK-J. 2021. SHAME Model Fingerprinting Smart Assistants (GitHub). https: \/\/github.com\/ACK-J\/SHAME_Model_Fingerprinting_Smart_Assistants  ACK-J. 2021. SHAME Model Fingerprinting Smart Assistants (GitHub). https: \/\/github.com\/ACK-J\/SHAME_Model_Fingerprinting_Smart_Assistants"},{"key":"e_1_3_2_2_2_1","unstructured":"Caio A.P. Burgardt Ant\u00f4nio J. Pinheiro Jeandro de M. Bezerra and Divanilson R. Campelo. [n. d.]. Identifying IoT devices and events based on packet length from encrypted traffic Computer Communications.  Caio A.P. Burgardt Ant\u00f4nio J. Pinheiro Jeandro de M. Bezerra and Divanilson R. Campelo. [n. d.]. Identifying IoT devices and events based on packet length from encrypted traffic Computer Communications."},{"key":"e_1_3_2_2_3_1","volume-title":"Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. CoRR abs\/1708.05044","author":"Apthorpe Noah","year":"2017","unstructured":"Noah Apthorpe , Dillon Reisman , Srikanth Sundaresan , Arvind Narayanan , and Nick Feamster . 2017. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. CoRR abs\/1708.05044 ( 2017 ). arXiv:1708.05044 http: \/\/arxiv.org\/abs\/1708.05044 Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. 2017. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. CoRR abs\/1708.05044 (2017). arXiv:1708.05044 http: \/\/arxiv.org\/abs\/1708.05044"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0070"},{"key":"e_1_3_2_2_5_1","volume-title":"25th USENIX Security Symposium (USENIX Security '16)","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou . 2016 . Hidden voice commands . In 25th USENIX Security Symposium (USENIX Security '16) . 513--530. Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden voice commands. In 25th USENIX Security Symposium (USENIX Security '16). 513--530."},{"key":"e_1_3_2_2_6_1","volume-title":"IoT Event Classification Based on Network Traffic. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE. https:\/\/doi.org\/10","author":"Charyyev Batyr","year":"2020","unstructured":"Batyr Charyyev and Mehmet Hadi Gunes . 2020 . IoT Event Classification Based on Network Traffic. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE. https:\/\/doi.org\/10 .1109\/ infocomwkshps50562.2020.9162885 Batyr Charyyev and Mehmet Hadi Gunes. 2020. IoT Event Classification Based on Network Traffic. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE. https:\/\/doi.org\/10.1109\/ infocomwkshps50562.2020.9162885"},{"key":"e_1_3_2_2_7_1","unstructured":"Chenggang Wang et al. 2020. DeepVC Alexa and Google Home Pcap Datasets. https:\/\/drive.google.com\/drive\/folders\/1l- fSX9VdZH5kF9z7gm82xgYX5ca0kRI0?usp=sharing  Chenggang Wang et al. 2020. DeepVC Alexa and Google Home Pcap Datasets. https:\/\/drive.google.com\/drive\/folders\/1l- fSX9VdZH5kF9z7gm82xgYX5ca0kRI0?usp=sharing"},{"volume-title":"Flite: A small run-time speech synthesis engine (Github). https: \/\/github.com\/festvox\/flite","year":"2021","key":"e_1_3_2_2_8_1","unstructured":"festvox. 2021 . Flite: A small run-time speech synthesis engine (Github). https: \/\/github.com\/festvox\/flite festvox. 2021. Flite: A small run-time speech synthesis engine (Github). https: \/\/github.com\/festvox\/flite"},{"key":"e_1_3_2_2_9_1","volume-title":"USENIX Security Symposium. USENIX Association, 1--17","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis . 2016 . k-fingerprinting: A robust scalable website fingerprinting technique . In USENIX Security Symposium. USENIX Association, 1--17 . Jamie Hayes and George Danezis. 2016. k-fingerprinting: A robust scalable website fingerprinting technique. In USENIX Security Symposium. USENIX Association, 1--17."},{"key":"e_1_3_2_2_10_1","unstructured":"Jack Hyland. 2021. Exploiting Amazon Alexa Using the SHAME Model POC Video. https:\/\/drive.google.com\/file\/d\/1nMd7PYX6JGB4ESqGlNlwv0fnka9_ QMOH\/view?usp=sharing  Jack Hyland. 2021. Exploiting Amazon Alexa Using the SHAME Model POC Video. https:\/\/drive.google.com\/file\/d\/1nMd7PYX6JGB4ESqGlNlwv0fnka9_ QMOH\/view?usp=sharing"},{"key":"e_1_3_2_2_11_1","unstructured":"Jack Hyland. 2021. SHAME Dynamic vs Static Dataset. https:\/\/drive.google.com\/file\/d\/1K19SDZ3IdvAv_0rK6mG9d8WTpHg85gzV\/view?usp=sharing  Jack Hyland. 2021. SHAME Dynamic vs Static Dataset. https:\/\/drive.google.com\/file\/d\/1K19SDZ3IdvAv_0rK6mG9d8WTpHg85gzV\/view?usp=sharing"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802686"},{"key":"#cr-split#-e_1_3_2_2_14_1.1","doi-asserted-by":"crossref","unstructured":"Marc Liberatore and Brian Levine. 2006. Inferring the source of encrypted HTTP connections. 255--263. https:\/\/doi.org\/10.1145\/1180405.1180437 10.1145\/1180405.1180437","DOI":"10.1145\/1180405.1180437"},{"key":"#cr-split#-e_1_3_2_2_14_1.2","doi-asserted-by":"crossref","unstructured":"Marc Liberatore and Brian Levine. 2006. Inferring the source of encrypted HTTP connections. 255--263. https:\/\/doi.org\/10.1145\/1180405.1180437","DOI":"10.1145\/1180405.1180437"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc49032.2021.9369553"},{"volume-title":"hostapd: IEEE 802.11 AP","author":"Malinen Jouni","key":"e_1_3_2_2_16_1","unstructured":"Jouni Malinen . 2021. hostapd: IEEE 802.11 AP , IEEE 802.1X WPA\/WPA2\/EAP\/RADIUS Authenticator . https:\/\/w1.fi\/hostapd\/ Jouni Malinen. 2021. hostapd: IEEE 802.11 AP, IEEE 802.1X WPA\/WPA2\/EAP\/RADIUS Authenticator. https:\/\/w1.fi\/hostapd\/"},{"key":"e_1_3_2_2_17_1","unstructured":"Mozilla. 2021. Project DeepSpeech (Github). https:\/\/github.com\/mozilla\/ DeepSpeech  Mozilla. 2021. Project DeepSpeech (Github). https:\/\/github.com\/mozilla\/ DeepSpeech"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3039691"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_2_21_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18)","author":"Roy Nirupam","year":"2018","unstructured":"Nirupam Roy , Sheng Shen , Haitham Hassanieh , and Romit Roy Choudhury . 2018 . Inaudible voice commands: The long-range attack and defense . In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18) . 547--560. Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit Roy Choudhury. 2018. Inaudible voice commands: The long-range attack and defense. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI '18). 547--560."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_2"},{"key":"e_1_3_2_2_23_1","volume-title":"Deep Fingerprinting. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM. https:\/\/doi.org\/10","author":"Sirinam Payap","year":"2018","unstructured":"Payap Sirinam , Mohsen Imani , Marc Juarez , and Matthew Wright . 2018 . Deep Fingerprinting. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM. https:\/\/doi.org\/10 .1145\/3243734.3243768 10.1145\/3243734.3243768 Payap Sirinam, Mohsen Imani, Marc Juarez, and Matthew Wright. 2018. Deep Fingerprinting. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM. https:\/\/doi.org\/10.1145\/3243734.3243768"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354217"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"e_1_3_2_2_26_1","first-page":"1","article-title":"Dropout: A Simple Way to Prevent Neural Networks from Overfitting","volume":"15","author":"Srivastava Nitish","year":"2014","unstructured":"Nitish Srivastava , Geoffrey Hinton , Alex Krizhevsky , Ilya Sutskever , and Ruslan Salakhutdinov . 2014 . Dropout: A Simple Way to Prevent Neural Networks from Overfitting . J. Mach. Learn. Res. 15 , 1 (Jan. 2014), 1929--1958. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A Simple Way to Prevent Neural Networks from Overfitting. J. Mach. Learn. Res. 15, 1 (Jan. 2014), 1929--1958.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298664"},{"key":"e_1_3_2_2_28_1","volume-title":"9th USENIX Workshop on Offensive Technologies (WOOT '15)","author":"Vaidya Tavish","year":"2015","unstructured":"Tavish Vaidya , Yuankai Zhang , Micah Sherr , and Clay Shields . 2015 . Cocaine noodles: exploiting the gap between human and machine speech recognition . In 9th USENIX Workshop on Offensive Technologies (WOOT '15) . Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. 2015. Cocaine noodles: exploiting the gap between human and machine speech recognition. In 9th USENIX Workshop on Offensive Technologies (WOOT '15)."},{"key":"e_1_3_2_2_29_1","unstructured":"Lionel Sujay Vailshery. 2021. Number of digital voice assistants in use worldwide 2019--2024. https:\/\/www.statista.com\/statistics\/973815\/worldwide-digital-voice-assistant-in-use\/  Lionel Sujay Vailshery. 2021. Number of digital voice assistants in use worldwide 2019--2024. https:\/\/www.statista.com\/statistics\/973815\/worldwide-digital-voice-assistant-in-use\/"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399357"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813645"},{"key":"e_1_3_2_2_32_1","volume-title":"27th USENIX Security Symposium (USENIX Security '18)","author":"Yuan Xuejing","year":"2018","unstructured":"Xuejing Yuan , Yuxuan Chen , Yue Zhao , Yunhui Long , Xiaokang Liu , Kai Chen , Shengzhi Zhang , Heqing Huang , XiaoFeng Wang , and Carl A Gunter . 2018 . Com- mandersong: A systematic approach for practical adversarial voice recognition . In 27th USENIX Security Symposium (USENIX Security '18) . 49--64. Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, XiaoFeng Wang, and Carl A Gunter. 2018. Com- mandersong: A systematic approach for practical adversarial voice recognition. In 27th USENIX Security Symposium (USENIX Security '18). 49--64."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00016"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463676.3485615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3463676.3485615","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3463676.3485615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:08Z","timestamp":1750195508000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463676.3485615"}},"subtitle":["Smart Assistant Voice Command Fingerprinting Utilizing Deep Learning"],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":34,"alternative-id":["10.1145\/3463676.3485615","10.1145\/3463676"],"URL":"https:\/\/doi.org\/10.1145\/3463676.3485615","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}