{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:17:01Z","timestamp":1760080621026,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Project MEGABIT"},{"name":"PhD studentship from Royal Holloway University of London"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3497766","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"1064-1078","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["ALEXA VERSUS ALEXA"],"prefix":"10.1145","author":[{"given":"Sergio","family":"Esposito","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Daniele","family":"Sgandurra","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Egham, United Kingdom"}]},{"given":"Giampaolo","family":"Bella","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Catania, Catania, Italy"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Patrick Cardinal, and Alessandro L. Koerich.","author":"Abdoli Sajjad","year":"2019","unstructured":"Sajjad Abdoli , Luiz G. Hafemann , J\u00e9r\u00f4me Rony , Ismail Ben Ayed , Patrick Cardinal, and Alessandro L. Koerich. 2019 . Universal Adversarial Audio Perturbations. CoRR , Vol. abs\/ 1908 .03173 (2019). arxiv: 1908.03173 http:\/\/arxiv.org\/abs\/1908.03173 Sajjad Abdoli, Luiz G. Hafemann, J\u00e9r\u00f4me Rony, Ismail Ben Ayed, Patrick Cardinal, and Alessandro L. Koerich. 2019. Universal Adversarial Audio Perturbations. CoRR, Vol. abs\/1908.03173 (2019). arxiv: 1908.03173 http:\/\/arxiv.org\/abs\/1908.03173"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23362"},{"key":"e_1_3_2_2_3_1","unstructured":"Hadi Abdullah Muhammad Sajidur Rahman Washington Garcia Logan Blue Kevin Warren Anurag Swarnim Yadav Tom Shrimpton and Patrick Traynor. 2019 b. Hear \"No Evil\" See \"Kenansville\": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems. CoRR Vol. abs\/1910.05262 (2019). arxiv: 1910.05262 http:\/\/arxiv.org\/abs\/1910.05262  Hadi Abdullah Muhammad Sajidur Rahman Washington Garcia Logan Blue Kevin Warren Anurag Swarnim Yadav Tom Shrimpton and Patrick Traynor. 2019 b. Hear \"No Evil\" See \"Kenansville\": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems. CoRR Vol. abs\/1910.05262 (2019). arxiv: 1910.05262 http:\/\/arxiv.org\/abs\/1910.05262"},{"key":"e_1_3_2_2_4_1","volume-title":"SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. CoRR","author":"Abdullah Hadi","year":"2020","unstructured":"Hadi Abdullah , Kevin Warren , Vincent Bindschaedler , Nicolas Papernot , and Patrick Traynor . 2020. SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. CoRR , Vol. abs\/ 2007 .06622 ( 2020 ). arxiv: 2007.06622 https:\/\/arxiv.org\/abs\/2007.06622 Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, and Patrick Traynor. 2020. SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. CoRR, Vol. abs\/2007.06622 (2020). arxiv: 2007.06622 https:\/\/arxiv.org\/abs\/2007.06622"},{"key":"e_1_3_2_2_5_1","unstructured":"Erich Adams. 2018. Avoiding Wake-Word Self-Triggering. https:\/\/patents.google.com\/patent\/US20190311719A1\/en. Accessed: 2020--12-04.  Erich Adams. 2018. Avoiding Wake-Word Self-Triggering. https:\/\/patents.google.com\/patent\/US20190311719A1\/en. Accessed: 2020--12-04."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2747626"},{"key":"e_1_3_2_2_7_1","volume-title":"Srivastava","author":"Alzantot Moustafa","year":"2018","unstructured":"Moustafa Alzantot , Bharathan Balaji , and Mani B . Srivastava . 2018 . Did you hear that? Adversarial Examples Against Automatic Speech Recognition. CoRR , Vol. abs\/ 1801 .00554 (2018). arxiv: 1801.00554 http:\/\/arxiv.org\/abs\/1801.00554 Moustafa Alzantot, Bharathan Balaji, and Mani B. Srivastava. 2018. Did you hear that? Adversarial Examples Against Automatic Speech Recognition. CoRR, Vol. abs\/1801.00554 (2018). arxiv: 1801.00554 http:\/\/arxiv.org\/abs\/1801.00554"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007309500750087"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212505"},{"key":"e_1_3_2_2_10_1","volume-title":"Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou . 2016 . Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 513--530. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/carlini Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 513--530. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/carlini"},{"key":"e_1_3_2_2_11_1","volume-title":"Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In 2018 IEEE Security and Privacy Workshops, SP Workshops 2018","author":"Carlini Nicholas","year":"2018","unstructured":"Nicholas Carlini and David A. Wagner . 2018 . Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In 2018 IEEE Security and Privacy Workshops, SP Workshops 2018 , San Francisco, CA, USA , May 24, 2018 . IEEE Computer Society, 1--7. https:\/\/doi.org\/10.1109\/SPW.2018.00009 10.1109\/SPW.2018.00009 Nicholas Carlini and David A. Wagner. 2018. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In 2018 IEEE Security and Privacy Workshops, SP Workshops 2018, San Francisco, CA, USA, May 24, 2018. IEEE Computer Society, 1--7. https:\/\/doi.org\/10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_2_12_1","volume-title":"2019 a. Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. CoRR","author":"Chen Guangke","year":"1840","unstructured":"Guangke Chen , Sen Chen , Lingling Fan , Xiaoning Du , Zhe Zhao , Fu Song , and Yang Liu . 2019 a. Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. CoRR , Vol. abs\/ 1911 .0 1840 (2019). arxiv: 1911.01840 http:\/\/arxiv.org\/abs\/1911.01840 Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, and Yang Liu. 2019 a. Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. CoRR, Vol. abs\/1911.01840 (2019). arxiv: 1911.01840 http:\/\/arxiv.org\/abs\/1911.01840"},{"key":"e_1_3_2_2_13_1","unstructured":"Yuxuan Chen Xuejing Yuan Jiangshan Zhang Yue Zhao Shengzhi Zhang Kai Chen and XiaoFeng Wang. 2019 b. Devil's Whisper Docker Hub. https:\/\/hub.docker.com\/repository\/docker\/neeze\/devilwhisper. Accessed: 2021-01--25.  Yuxuan Chen Xuejing Yuan Jiangshan Zhang Yue Zhao Shengzhi Zhang Kai Chen and XiaoFeng Wang. 2019 b. Devil's Whisper Docker Hub. https:\/\/hub.docker.com\/repository\/docker\/neeze\/devilwhisper. Accessed: 2021-01--25."},{"key":"e_1_3_2_2_14_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Chen Yuxuan","year":"2020","unstructured":"Yuxuan Chen , Xuejing Yuan , Jiangshan Zhang , Yue Zhao , Shengzhi Zhang , Kai Chen , and XiaoFeng Wang . 2020 . Deviltextquoterights Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices . In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 2667--2684. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/chen-yuxuan Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, and XiaoFeng Wang. 2020. Deviltextquoterights Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2667--2684. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/chen-yuxuan"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423339"},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","author":"Cisse Moustapha","year":"2017","unstructured":"Moustapha Cisse , Yossi Adi , Natalia Neverova , and Joseph Keshet . 2017 . Houdini: Fooling Deep Structured Visual and Speech Recognition Models with Adversarial Examples . In Proceedings of the 31st International Conference on Neural Information Processing Systems ( Long Beach, California, USA) (NIPS'17). Curran Associates Inc., Red Hook, NY, USA, 6980--6990. Moustapha Cisse, Yossi Adi, Natalia Neverova, and Joseph Keshet. 2017. Houdini: Fooling Deep Structured Visual and Speech Recognition Models with Adversarial Examples. In Proceedings of the 31st International Conference on Neural Information Processing Systems (Long Beach, California, USA) (NIPS'17). Curran Associates Inc., Red Hook, NY, USA, 6980--6990."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"volume-title":"Echo Dot 3rd Gen Smart Speaker Teardown. https:\/\/www.briandorey.com\/post\/echo-dot-3rd-gen-smart-speaker-teardown. Accessed: 2021-02-03","author":"Dorey Brian","key":"e_1_3_2_2_18_1","unstructured":"Brian Dorey . 2019. Echo Dot 3rd Gen Smart Speaker Teardown. https:\/\/www.briandorey.com\/post\/echo-dot-3rd-gen-smart-speaker-teardown. Accessed: 2021-02-03 . Brian Dorey. 2019. Echo Dot 3rd Gen Smart Speaker Teardown. https:\/\/www.briandorey.com\/post\/echo-dot-3rd-gen-smart-speaker-teardown. Accessed: 2021-02-03."},{"key":"e_1_3_2_2_19_1","volume-title":"SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","author":"Du Tianyu","year":"2020","unstructured":"Tianyu Du , Shouling Ji , Jinfeng Li , Qinchen Gu , Ting Wang , and Raheem Beyah . 2020 . SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security , Taipei, Taiwan , October 5-9, 2020,, Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, and Giuseppe Ateniese (Eds.). ACM, 357--369. https:\/\/doi.org\/10.1145\/3320269.3384733 10.1145\/3320269.3384733 Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, and Raheem Beyah. 2020. SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. In ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020,, Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, and Giuseppe Ateniese (Eds.). ACM, 357--369. https:\/\/doi.org\/10.1145\/3320269.3384733"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/02763869.2018.1404391"},{"key":"e_1_3_2_2_21_1","unstructured":"Amazon.com Inc. 2017. Github - Alexa Voice Service Client: Python Client for Alexa Voice Service (AVS). https:\/\/github.com\/richtier\/alexa-voice-service-client. Accessed: 2021-01--25.  Amazon.com Inc. 2017. Github - Alexa Voice Service Client: Python Client for Alexa Voice Service (AVS). https:\/\/github.com\/richtier\/alexa-voice-service-client. Accessed: 2021-01--25."},{"key":"e_1_3_2_2_22_1","unstructured":"Amazon.com Inc. 2019. Speech Synthesis Markup Language (SSML) Reference - Alexa Skills Kit. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/speech-synthesis-markup-language-ssml-reference.html. Accessed: 2021-01-25.  Amazon.com Inc. 2019. Speech Synthesis Markup Language (SSML) Reference - Alexa Skills Kit. https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/custom-skills\/speech-synthesis-markup-language-ssml-reference.html. Accessed: 2021-01-25."},{"key":"e_1_3_2_2_23_1","unstructured":"Amazon.com Inc. 2020 a. Request and Response JSON Reference - Alexa Skills Kit. https:\/\/developer.amazon.com\/en-GB\/docs\/alexa\/custom-skills\/request-and-response-json-reference.html. Accessed: 2021-01--25.  Amazon.com Inc. 2020 a. Request and Response JSON Reference - Alexa Skills Kit. https:\/\/developer.amazon.com\/en-GB\/docs\/alexa\/custom-skills\/request-and-response-json-reference.html. Accessed: 2021-01--25."},{"key":"e_1_3_2_2_24_1","unstructured":"Statista Inc. 2020 b. Smart Home - Worldwide. https:\/\/www.statista.com\/outlook\/283\/100\/smart-home\/worldwide. Accessed: 2020-09-18.  Statista Inc. 2020 b. Smart Home - Worldwide. https:\/\/www.statista.com\/outlook\/283\/100\/smart-home\/worldwide. Accessed: 2020-09-18."},{"key":"e_1_3_2_2_25_1","unstructured":"Statista Inc. 2020 c. Smart Speakers - Statistics & Facts. https:\/\/www.statista.com\/topics\/4748\/smart-speakers. Accessed: 2020-09--18.  Statista Inc. 2020 c. Smart Speakers - Statistics & Facts. https:\/\/www.statista.com\/topics\/4748\/smart-speakers. Accessed: 2020-09--18."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660295"},{"key":"e_1_3_2_2_27_1","volume-title":"Fooling End-To-End Speaker Verification With Adversarial Examples. In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 1962--1966","author":"Kreuk F.","year":"2018","unstructured":"F. Kreuk , Y. Adi , M. Cisse , and J. Keshet . 2018 . Fooling End-To-End Speaker Verification With Adversarial Examples. In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 1962--1966 . https:\/\/doi.org\/10.1109\/ICASSP. 2018 .8462693 10.1109\/ICASSP.2018.8462693 F. Kreuk, Y. Adi, M. Cisse, and J. Keshet. 2018. Fooling End-To-End Speaker Verification With Adversarial Examples. In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 1962--1966. https:\/\/doi.org\/10.1109\/ICASSP.2018.8462693"},{"key":"e_1_3_2_2_28_1","first-page":"33","volume-title":"Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Kumar Deepak","year":"2018","unstructured":"Deepak Kumar , Riccardo Paccagnella , Paul Murley , Eric Hennenfent , Joshua Mason , Adam Bates , and Michael Bailey . 2018 . Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD , 33 - 47 . https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/kumar Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. 2018. Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 33-47. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/kumar"},{"key":"e_1_3_2_2_29_1","volume-title":"20th Annual Conference of the International Speech Communication Association","author":"Lai I","year":"2019","unstructured":"Cheng- I Lai , Nanxin Chen , Jes\u00fa s Villalba , and Najim Dehak . 2019 . ASSERT: Anti-Spoofing with Squeeze-Excitation and Residual Networks. In Interspeech 2019 , 20th Annual Conference of the International Speech Communication Association , Graz, Austria , 15-19 September 2019,, Gernot Kubin and Zdravko Kacic (Eds.). ISCA, 1013--1017. https:\/\/doi.org\/10.21437\/Interspeech.2019--1794 10.21437\/Interspeech.2019--1794 Cheng-I Lai, Nanxin Chen, Jes\u00fa s Villalba, and Najim Dehak. 2019. ASSERT: Anti-Spoofing with Squeeze-Excitation and Residual Networks. In Interspeech 2019, 20th Annual Conference of the International Speech Communication Association, Graz, Austria, 15-19 September 2019,, Gernot Kubin and Zdravko Kacic (Eds.). ISCA, 1013--1017. https:\/\/doi.org\/10.21437\/Interspeech.2019--1794"},{"key":"e_1_3_2_2_30_1","unstructured":"Jonathan P. Lang. 2017. Wake-word detection suppression. https:\/\/patents.google.com\/patent\/US10475449B2\/en. Accessed: 2020-12-04.  Jonathan P. Lang. 2017. Wake-word detection suppression. https:\/\/patents.google.com\/patent\/US10475449B2\/en. Accessed: 2020-12-04."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23111"},{"key":"e_1_3_2_2_32_1","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019","author":"Li Juncheng","year":"2019","unstructured":"Juncheng Li , Shuhui Qu , Xinjian Li , Joseph Szurley , J. Zico Kolter , and Florian Metze . 2019 . Adversarial Music: Real world Audio Adversary against Wake-word Detection System . In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019 , NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada, Hanna M. Wallach, Hugo Larochelle, Alina Beygelzimer, Florence d'Alch\u00e9 -Buc, Emily B. Fox, and Roman Garnett (Eds.). 11908--11918. https:\/\/proceedings.neurips.cc\/paper\/2019\/hash\/ebbdfea212e3a756a1fded7b35578525-Abstract.html Juncheng Li, Shuhui Qu, Xinjian Li, Joseph Szurley, J. Zico Kolter, and Florian Metze. 2019. Adversarial Music: Real world Audio Adversary against Wake-word Detection System. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada, Hanna M. Wallach, Hugo Larochelle, Alina Beygelzimer, Florence d'Alch\u00e9 -Buc, Emily B. Fox, and Roman Garnett (Eds.). 11908--11918. https:\/\/proceedings.neurips.cc\/paper\/2019\/hash\/ebbdfea212e3a756a1fded7b35578525-Abstract.html"},{"key":"e_1_3_2_2_33_1","unstructured":"Google LLC. 2013. Introduction to Audio Encoding - Cloud Speech-to-Text. https:\/\/cloud.google.com\/speech-to-text\/docs\/encoding. Accessed: 2021-01--25.  Google LLC. 2013. Introduction to Audio Encoding - Cloud Speech-to-Text. https:\/\/cloud.google.com\/speech-to-text\/docs\/encoding. Accessed: 2021-01--25."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329842"},{"key":"e_1_3_2_2_35_1","volume-title":"Md. Sahidullah, Junichi Yamagishi, and Kong Aik Lee.","author":"Nautsch Andreas","year":"2021","unstructured":"Andreas Nautsch , Xin Wang , Nicholas W. D. Evans , Tomi Kinnunen , Ville Vestman , Massimiliano Todisco , H\u00e9 ctor Delgado , Md. Sahidullah, Junichi Yamagishi, and Kong Aik Lee. 2021 . ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech. CoRR , Vol. abs\/ 2102 .05889 (2021). arxiv: 2102.05889 https:\/\/arxiv.org\/abs\/2102.05889 Andreas Nautsch, Xin Wang, Nicholas W. D. Evans, Tomi Kinnunen, Ville Vestman, Massimiliano Todisco, H\u00e9 ctor Delgado, Md. Sahidullah, Junichi Yamagishi, and Kong Aik Lee. 2021. ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech. CoRR, Vol. abs\/2102.05889 (2021). arxiv: 2102.05889 https:\/\/arxiv.org\/abs\/2102.05889"},{"key":"e_1_3_2_2_36_1","unstructured":"Michael Alan Pogue and Philip Ryan Hilmes. 2013. Detecting self-generated wake expressions. https:\/\/patents.google.com\/patent\/US9747899B2\/en. Accessed: 2020--12-04.  Michael Alan Pogue and Philip Ryan Hilmes. 2013. Detecting self-generated wake expressions. https:\/\/patents.google.com\/patent\/US9747899B2\/en. Accessed: 2020--12-04."},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9--15","volume":"5240","author":"Qin Yao","year":"2019","unstructured":"Yao Qin , Nicholas Carlini , Garrison W. Cottrell , Ian J. Goodfellow , and Colin Raffel . 2019 . Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition . In Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9--15 June 2019, Long Beach, California, USA (Proceedings of Machine Learning Research , Vol. 97), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR, 5231-- 5240 . http:\/\/proceedings.mlr.press\/v97\/qin19a.html Yao Qin, Nicholas Carlini, Garrison W. Cottrell, Ian J. Goodfellow, and Colin Raffel. 2019. Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition. In Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9--15 June 2019, Long Beach, California, USA (Proceedings of Machine Learning Research, Vol. 97), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR, 5231--5240. http:\/\/proceedings.mlr.press\/v97\/qin19a.html"},{"key":"e_1_3_2_2_38_1","volume-title":"Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems. In ACSAC '20: Annual Computer Security Applications Conference, Virtual Event \/ Austin, TX, USA","author":"Lea Sch\u00f6","year":"2020","unstructured":"Lea Sch\u00f6 nherr, Thorsten Eisenhofer , Steffen Zeiler , Thorsten Holz , and Dorothea Kolossa . 2020 . Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems. In ACSAC '20: Annual Computer Security Applications Conference, Virtual Event \/ Austin, TX, USA , 7-11 December, 2020. ACM, 843--855. https:\/\/doi.org\/10.1145\/3427228.3427276 10.1145\/3427228.3427276 Lea Sch\u00f6 nherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa. 2020. Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems. In ACSAC '20: Annual Computer Security Applications Conference, Virtual Event \/ Austin, TX, USA, 7-11 December, 2020. ACM, 843--855. https:\/\/doi.org\/10.1145\/3427228.3427276"},{"key":"e_1_3_2_2_39_1","volume-title":"26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Lea Sch\u00f6","year":"2019","unstructured":"Lea Sch\u00f6 nherr, Katharina Kohls , Steffen Zeiler , Thorsten Holz , and Dorothea Kolossa . 2019 . Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding . In 26th Annual Network and Distributed System Security Symposium, NDSS 2019 , San Diego, California, USA , February 24-27, 2019. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/adversarial-attacks-against-automatic-speech-recognition-systems-via-psychoacoustic-hiding\/ Lea Sch\u00f6 nherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa. 2019. Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/adversarial-attacks-against-automatic-speech-recognition-systems-via-psychoacoustic-hiding\/"},{"key":"e_1_3_2_2_40_1","volume-title":"abs\/2010.10788","author":"Su Dan","year":"2020","unstructured":"Dan Su , Jiqiang Liu , Sencun Zhu , Xiaoyang Wang , and Wei Wang . 2020. \" Are you home alone?\" \"Yes\" Disclosing Security and Privacy Vulnerabilities in Alexa Skills . Co RR , Vol . abs\/2010.10788 ( 2020 ). arxiv: 2010.10788 https:\/\/arxiv.org\/abs\/2010.10788 Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, and Wei Wang. 2020. \"Are you home alone?\" \"Yes\" Disclosing Security and Privacy Vulnerabilities in Alexa Skills. CoRR, Vol. abs\/2010.10788 (2020). arxiv: 2010.10788 https:\/\/arxiv.org\/abs\/2010.10788"},{"key":"e_1_3_2_2_41_1","volume-title":"Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Sugawara Takeshi","year":"2020","unstructured":"Takeshi Sugawara , Benjamin Cyr , Sara Rampazzi , Daniel Genkin , and Kevin Fu . 2020 . Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 2631--2648. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/sugawara Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu. 2020. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2631--2648. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/sugawara"},{"key":"e_1_3_2_2_42_1","volume-title":"Targeted Adversarial Examples for Black Box Audio Systems. In 2019 IEEE Security and Privacy Workshops, SP Workshops 2019","author":"Taori Rohan","year":"2019","unstructured":"Rohan Taori , Amog Kamsetty , Brenton Chu , and Nikita Vemuri . 2019 . Targeted Adversarial Examples for Black Box Audio Systems. In 2019 IEEE Security and Privacy Workshops, SP Workshops 2019 , San Francisco, CA, USA , May 19-23, 2019. IEEE, 15--20. https:\/\/doi.org\/10.1109\/SPW.2019.00016 10.1109\/SPW.2019.00016 Rohan Taori, Amog Kamsetty, Brenton Chu, and Nikita Vemuri. 2019. Targeted Adversarial Examples for Black Box Audio Systems. In 2019 IEEE Security and Privacy Workshops, SP Workshops 2019, San Francisco, CA, USA, May 19-23, 2019. IEEE, 15--20. https:\/\/doi.org\/10.1109\/SPW.2019.00016"},{"key":"e_1_3_2_2_43_1","volume-title":"Proceedings of the 9th USENIX Conference on Offensive Technologies (Washington, D.C.) (WOOT'15)","author":"Vaidya Tavish","year":"2015","unstructured":"Tavish Vaidya , Yuankai Zhang , Micah Sherr , and Clay Shields . 2015 . Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition . In Proceedings of the 9th USENIX Conference on Offensive Technologies (Washington, D.C.) (WOOT'15) . USENIX Association, USA, 16. Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. 2015. Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition. In Proceedings of the 9th USENIX Conference on Offensive Technologies (Washington, D.C.) (WOOT'15). USENIX Association, USA, 16."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369811"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/741"},{"key":"e_1_3_2_2_46_1","volume-title":"SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020","author":"Yan Qiben","year":"2020","unstructured":"Qiben Yan , Kehai Liu , Qin Zhou , Hanqing Guo , and Ning Zhang . 2020 . SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020 , San Diego, California, USA , February 23-26, 2020. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/surfingattack-interactive-hidden-attack-on-voice-assistants-using-ultrasonic-guided-waves\/ Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, and Ning Zhang. 2020. SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/surfingattack-interactive-hidden-attack-on-voice-assistants-using-ultrasonic-guided-waves\/"},{"volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium","author":"Yuan Xuejing","key":"e_1_3_2_2_47_1","unstructured":"Xuejing Yuan , Yuxuan Chen , Yue Zhao , Yunhui Long , Xiaokang Liu , Kai Chen , Shengzhi Zhang , Heqing Huang , XiaoFeng Wang , and Carl A. Gunter . 2018. Commandersong: A Systematic Approach for Practical Adversarial Voice Recognition . In Proceedings of the 27th USENIX Conference on Security Symposium ( Baltimore, MD, USA) (SEC'18). USENIX Association, USA, 49--64. Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, XiaoFeng Wang, and Carl A. Gunter. 2018. Commandersong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proceedings of the 27th USENIX Conference on Security Symposium (Baltimore, MD, USA) (SEC'18). USENIX Association, USA, 49--64."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"N. Zhang X. Mi X. Feng X. Wang Y. Tian and F. Qian. 2019. Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. In 2019 IEEE Symposium on Security and Privacy (SP). 1381--1396.  N. Zhang X. Mi X. Feng X. Wang Y. Tian and F. Qian. 2019. Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. In 2019 IEEE Symposium on Security and Privacy (SP). 1381--1396.","DOI":"10.1109\/SP.2019.00016"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3497766","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3497766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:29Z","timestamp":1750193309000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3497766"}},"subtitle":["Controlling Smart Speakers by Self-Issuing Voice Commands"],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":49,"alternative-id":["10.1145\/3488932.3497766","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3497766","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}