{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:23Z","timestamp":1750309223335,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT)","award":["RS-2022-00155966"],"award-info":[{"award-number":["RS-2022-00155966"]}]},{"name":"The National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT)","award":["RS-2022-00166669","RS-2023-00222385"],"award-info":[{"award-number":["RS-2022-00166669","RS-2023-00222385"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3657017","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"667-683","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["WhisperVoiceTrace: A Comprehensive Analysis of Voice Command Fingerprinting"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9573-1240","authenticated-orcid":false,"given":"Hyojin","family":"Kim","sequence":"first","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4174-6030","authenticated-orcid":false,"given":"Minji","family":"Jo","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2010-8478","authenticated-orcid":false,"given":"Jiwoo","family":"Hong","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2392-7860","authenticated-orcid":false,"given":"Hosung","family":"Kang","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6186-7001","authenticated-orcid":false,"given":"Nate","family":"Mathews","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7100-4613","authenticated-orcid":false,"given":"Se Eun","family":"Oh","sequence":"additional","affiliation":[{"name":"Ewha Womans University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"volume-title":"smart speaker owners (18-84 y\/o) surveyed oct. 2022 - sep","year":"2023","key":"e_1_3_2_1_1_1","unstructured":"2,697 u.s. smart speaker owners (18-84 y\/o) surveyed oct. 2022 - sep. 2023. Statista Consumer Insights."},{"key":"e_1_3_2_1_2_1","unstructured":"Alexa application. https:\/\/www.amazon.com\/b?node=21576558011&ref=MARS_NAV_desktop_skills_feat."},{"key":"e_1_3_2_1_3_1","unstructured":"Alexa blog. https:\/\/alexaanswers.amazon.com\/blog."},{"key":"e_1_3_2_1_4_1","unstructured":"deepvc-github. https:\/\/github.com\/SmartHomePrivacyProject\/DeepVCFingerprinting."},{"key":"e_1_3_2_1_5_1","unstructured":"Google nest help. https:\/\/support.google.com\/googlenest\/answer\/7207759?hl=en&ref_topic=7196346."},{"key":"e_1_3_2_1_6_1","unstructured":"Google search help. https:\/\/support.google.com\/websearch."},{"key":"e_1_3_2_1_7_1","unstructured":"shame-github. https:\/\/github.com\/jock0rama\/automated-voice-command-traffic-collection."},{"key":"e_1_3_2_1_8_1","unstructured":"Siri-apple. https:\/\/www.apple.com\/siri\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Tts-narakeet. https:\/\/www.narakeet.com."},{"key":"e_1_3_2_1_10_1","first-page":"2419","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Ahmed Dilawer","year":"2023","unstructured":"Dilawer Ahmed, Aafaq Sabir, and Anupam Das. Spying through your voice assistants: realistic voice command fingerprinting. In 32nd USENIX Security Symposium (USENIX Security 23), pages 2419--2436, 2023."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616639"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings on Privacy Enhancing Technologies (PETS)","author":"Bhat Sanjit","year":"2019","unstructured":"Sanjit Bhat, David Lu, Albert Kwon, and Srinivas Devadas. Var-CNN: A data-efficient website fingerprinting attack based on deep learning. Proceedings on Privacy Enhancing Technologies (PETS), 2019(4):292--310, 2019."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"1971","DOI":"10.1145\/3372297.3423351","volume-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","author":"la Cadena Wladimir De","year":"2020","unstructured":"Wladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, and Andriy Panchenko. Traffic-sliver: Fighting website fingerprinting attacks with traffic splitting. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pages 1971--1985, 2020."},{"key":"e_1_3_2_1_14_1","first-page":"717","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Gong Jiajun","year":"2020","unstructured":"Jiajun Gong and Tao Wang. Zero-delay lightweight defenses against website fingerprinting. In 29th USENIX Security Symposium (USENIX Security 20), pages 717--734, 2020."},{"key":"e_1_3_2_1_15_1","first-page":"1187","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. k-fingerprinting: A robust scalable website fingerprinting technique. In 25th USENIX Security Symposium (USENIX Security 16), pages 1187--1203, 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"344","DOI":"10.2478\/popets-2022-0049","article-title":"A straightforward website fingerprinting defense","volume":"2","author":"Holland James K","year":"2022","unstructured":"James K Holland and Nicholas Hopper. Regulator: A straightforward website fingerprinting defense. Proceedings on Privacy Enhancing Technologies, 2:344--362, 2022.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/3463676.3485615","volume-title":"Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society","author":"Hyland Jack","year":"2021","unstructured":"Jack Hyland, Conrad Schneggenburger, Nick Lim, Jake Ruud, Nate Mathews, and Matthew Wright. What a shame: Smart assistant voice command fingerprinting utilizing deep learning. In Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, pages 237--243, 2021."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_1_19_1","first-page":"27","volume-title":"European Symposium on Research in Computer Security (ESORICS)","author":"Juarez Marc","year":"2016","unstructured":"Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright. Toward an efficient website fingerprinting defense. In European Symposium on Research in Computer Security (ESORICS), pages 27--46. Springer, 2016."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/CNS.2019.8802686","volume-title":"2019 IEEE Conference on Communications and Network Security (CNS)","author":"Kennedy Sean","year":"2019","unstructured":"Sean Kennedy, Haipeng Li, Chenggang Wang, Hao Liu, Boyang Wang, and Wenhai Sun. I can hear your alexa: Voice command fingerprinting on smart home speakers. In 2019 IEEE Conference on Communications and Network Security (CNS), pages 232--240. IEEE, 2019."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103085"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1109\/SP46215.2023.10179289","volume-title":"2023 IEEE Symposium on Security and Privacy (SP)","author":"Mathews Nate","year":"2023","unstructured":"Nate Mathews, James K Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, and Matthew Wright. Sok: A critical evaluation of efficient website fingerprinting defenses. In 2023 IEEE Symposium on Security and Privacy (SP), pages 969--986. IEEE, 2023."},{"key":"e_1_3_2_1_23_1","first-page":"2705","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Nasr Milad","year":"2021","unstructured":"Milad Nasr, Alireza Bahramali, and Amir Houmansadr. Defeating {DNN-Based} traffic analysis systems in {Real-Time} with blind adversarial perturbations. In 30th USENIX Security Symposium (USENIX Security 21), pages 2705--2722, 2021."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings on Privacy Enhancing Technologies (PETS)","author":"Oh Se Eun","year":"2021","unstructured":"Se Eun Oh, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright, and Nicholas Hopper. GANDaLF: GAN for data-limited fingerprinting. Proceedings on Privacy Enhancing Technologies (PETS), 2021(2):305--322, 2021."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings on Privacy Enhancing Technologies (PETS)","author":"Oh Se Eun","year":"2019","unstructured":"Se Eun Oh, Saikrishna Sunkam, and Nicholas Hopper. p1-FP: Extraction, classification, and prediction of website fingerprints with deep learning. Proceedings on Privacy Enhancing Technologies (PETS), 2019(3):191--209, 2019."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_27_1","volume-title":"Workshop on Privacy in the Electronic Society (WPES). ACM","author":"Panchenko Andriy","year":"2011","unstructured":"Andriy Panchenko, Lukas Niessen, Andreas Zinnen, and Thomas Engel. Website fingerprinting in onion routing based anonymization networks. In Workshop on Privacy in the Electronic Society (WPES). ACM, 2011."},{"key":"e_1_3_2_1_28_1","volume-title":"Kantha Girish Gangadhara, and Matthew Wright. Tik-tok: The utility of packet timing in website fingerprinting attacks. arXiv preprint arXiv:1902.06421","author":"Rahman Mohammad Saidur","year":"2019","unstructured":"Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, and Matthew Wright. Tik-tok: The utility of packet timing in website fingerprinting attacks. arXiv preprint arXiv:1902.06421, 2019."},{"key":"e_1_3_2_1_29_1","volume-title":"Tom Van Goethem, and Wouter Joosen. Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376","author":"Rimmer Vera","year":"2017","unstructured":"Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen. Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376, 2017."},{"key":"e_1_3_2_1_30_1","first-page":"607","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Shen Meng","year":"2023","unstructured":"Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, and Ke Xu. Subverting website fingerprinting defenses with robust traffic representation. In 32nd USENIX Security Symposium (USENIX Security 23), pages 607--624, 2023."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3046876"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399357"},{"key":"e_1_3_2_1_34_1","first-page":"143","volume-title":"USENIX Security Symposium","author":"Wang Tao","year":"2014","unstructured":"Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. Effective attacks and provable defenses for website fingerprinting. In USENIX Security Symposium, pages 143--157, 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517851"},{"key":"e_1_3_2_1_36_1","first-page":"1375","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Wang Tao","year":"2017","unstructured":"Tao Wang and Ian Goldberg. {Walkie-Talkie}: An efficient defense against passive website fingerprinting attacks. In 26th USENIX Security Symposium (USENIX Security 17), pages 1375--1390, 2017."}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3657017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3657017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":36,"alternative-id":["10.1145\/3634737.3657017","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3657017","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}