DolphinAttack: Inaudible Voice Commands

  title={DolphinAttack: Inaudible Voice Commands},
  author={G. Zhang and Chen Yan and Xiaoyu Ji and Tianchen Zhang and Taimin Zhang and W. Xu},
  journal={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security},
  • G. Zhang, Chen Yan, +3 authors W. Xu
  • Published 2017
  • Computer Science
  • Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
  • Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems (VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though "hidden", are nonetheless audible. In this work, we design a totally inaudible attack, DolphinAttack, that modulates voice commands on… CONTINUE READING
    262 Citations
    CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
    • 111
    • Highly Influenced
    • PDF
    Canceling Inaudible Voice Commands Against Voice Control Systems
    • 2
    • Highly Influenced
    SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves
    • 7
    • Highly Influenced
    • PDF
    Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations
    • 4
    • PDF
    Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
    • 27
    • PDF
    ReMASC: Realistic Replay Attack Corpus for Voice Controlled Systems
    • 4
    • PDF
    Voice Liveness Detection for Voice Assistants using Ear Canal Pressure


    Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition
    • 99
    • Highly Influential
    • PDF
    Hidden Voice Commands
    • 323
    • Highly Influential
    • PDF
    Audio measurement and analysis software
    • http://www.
    • 2017