Publication | Closed Access
Fingerprinting encrypted voice traffic on smart speakers with deep learning
51
Citations
2
References
2020
Year
Unknown Venue
Privacy ProtectionEngineeringMachine LearningEncrypted TrafficInformation SecurityInformation ForensicsAmazon EchoSide-channel AttackSmart SpeakerSpeech RecognitionAdversarial Machine LearningRobust Speech RecognitionVoice RecognitionHealth SciencesSmart SpeakersData PrivacyComputer ScienceDeep LearningDistant Speech RecognitionPrivacyPrivacy LeakageData SecurityCryptographyVoiceAttack ModelSpeech ProcessingSpeaker Recognition
This paper investigates the privacy leakage of smart speakers under an encrypted traffic analysis attack, referred to as voice command fingerprinting. In this attack, an adversary can eavesdrop both outgoing and incoming encrypted voice traffic of a smart speaker, and infers which voice command a user says over encrypted traffic. We first built an automatic voice traffic collection tool and collected two large-scale datasets on two smart speakers, Amazon Echo and Google Home. Then, we implemented proof-of-concept attacks by leveraging deep learning. Our experimental results over the two datasets indicate disturbing privacy concerns. Specifically, compared to 1% accuracy with random guess, our attacks can correctly infer voice commands over encrypted traffic with 92.89% accuracy on Amazon Echo.
| Year | Citations | |
|---|---|---|
Page 1
Page 1