SurfingAttack

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

SurfingAttack

gepr

https://surfingattack.github.io/

From the paper:
> Abstract—With recent advances in artificial intelligence and natural language processing, voice has become a primary method for human-computer interaction.  It has enabled game-changing new technologies in both commercial sectors and military sectors,such as Siri, Alexa, Google Assistant, and voice-controlled naval warships.  Recently, researchers have demonstrated that these voice assistant systems are susceptible to signal injection at the inaudible frequencies.  To date, most of the existing works focus primarily on delivering a single command via line-of-sight ultrasound speaker or extending the range of this attack via speaker array. However, besides air, sound waves also propagate through other materials where vibration is possible.  In this work, we aim to understand the characteristics of this new genre of attack in the context of different transmission media.Furthermore, by leveraging the unique properties of acoustic transmission in solid materials, we design a new attack called Surfing Attack that would enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer distance and without the need to be in line-of-sight. By completing the interaction loop of inaudible sound attack,Surfing Attack enables new attack scenarios, such as hijacking a mobile Short Message Service (SMS) passcode, making ghost fraud calls without owners’ knowledge, etc.  To accomplish Surfing Attack, we have solved several major challenges.  First, the signal has been specially designed to allow omni-directional transmission for performing effective attacks over a solid medium.  Second, the new attack enables multi-round interaction without alerting the legitimate user at the scene, which is challenging since the device is designed to interact with users in physical proximity rather than sensors.  To mitigate this newly discovered threat, we also provide discussions and experimental results on potential countermeasures to defend against this new threat.

--
☣ uǝlƃ
============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com
archives back to 2003: http://friam.471366.n2.nabble.com/
FRIAM-COMIC http://friam-comic.blogspot.com/ by Dr. Strangelove
uǝʃƃ ⊥ glen