You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones

@article{Chen2017YouCH,
  title={You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones},
  author={Si Chen and Kui Ren and Sixu Piao and Xinyu Wang and Qian Wang and Jian Weng and Lu Su and Aziz Mohaisen},
  journal={2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)},
  year={2017},
  pages={183-195}
}
Voice, as a convenient and efficient way of information delivery, has a significant advantage over the conventional keyboard-based input methods, especially on small mobile devices such as smartphones and smartwatches. However, the human voice could often be exposed to the public, which allows an attacker to quickly collect sound samples of targeted victims and further launch voice impersonation attacks to spoof those voice-based applications. In this paper, we propose the design and… CONTINUE READING

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…