You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones

@article{Chen2017YouCH,
  title={You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones},
  author={S. Chen and K. Ren and Sixu Piao and C. Wang and Q. Wang and J. Weng and Lu Su and Aziz Mohaisen},
  journal={2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)},
  year={2017},
  pages={183-195}
}
  • S. Chen, K. Ren, +5 authors Aziz Mohaisen
  • Published 2017
  • Computer Science
  • 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
  • Voice, as a convenient and efficient way of information delivery, has a significant advantage over the conventional keyboard-based input methods, especially on small mobile devices such as smartphones and smartwatches. However, the human voice could often be exposed to the public, which allows an attacker to quickly collect sound samples of targeted victims and further launch voice impersonation attacks to spoof those voice-based applications. In this paper, we propose the design and… CONTINUE READING
    VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones
    • 9
    WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment
    • 17
    • PDF
    ABC: Enabling Smartphone Authentication with Built-in Camera
    • 16
    • PDF
    Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues
    • 8
    • Highly Influenced
    • PDF
    BreathLive: Liveness Detection for Heart Sound Authentication with Deep Breathing
    • 10
    SRVoice: A Robust Sparse Representation-Based Liveness Detection System
    • 5
    • PDF
    Combating Replay Attacks Against Voice Assistants
    • 4
    • PDF

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 62 REFERENCES
    Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
    • 82
    • PDF
    Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones
    • 34
    • PDF
    Enhancing security and privacy in biometrics-based authentication systems
    • 1,505
    • PDF
    Vulnerability in speaker verification - a study of technical impostor techniques
    • 117
    • PDF