{"id":"https://openalex.org/W2991076039","doi":"https://doi.org/10.1145/3359789.3359830","title":"Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations","display_name":"Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations","publication_year":2019,"publication_date":"2019-11-22","ids":{"openalex":"https://openalex.org/W2991076039","doi":"https://doi.org/10.1145/3359789.3359830","mag":"2991076039"},"language":"en","primary_location":{"id":"doi:10.1145/3359789.3359830","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359830","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359830","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359830","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100337522","display_name":"Chen Wang","orcid":"https://orcid.org/0000-0001-9737-1673"},"institutions":[{"id":"https://openalex.org/I4210096112","display_name":"Rutgers Sexual and Reproductive Health and Rights","ror":"https://ror.org/00rcvgx40","country_code":"NL","type":"other","lineage":["https://openalex.org/I4210096112"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Chen Wang","raw_affiliation_strings":["WINLAB, Rutgers University"],"affiliations":[{"raw_affiliation_string":"WINLAB, Rutgers University","institution_ids":["https://openalex.org/I4210096112"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103061877","display_name":"S Abhishek Anand","orcid":"https://orcid.org/0000-0002-6168-7649"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S Abhishek Anand","raw_affiliation_strings":["University of Alabama at Birmingham"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham","institution_ids":["https://openalex.org/I32389192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031787246","display_name":"Jian Liu","orcid":"https://orcid.org/0000-0001-5329-7408"},"institutions":[{"id":"https://openalex.org/I4210096112","display_name":"Rutgers Sexual and Reproductive Health and Rights","ror":"https://ror.org/00rcvgx40","country_code":"NL","type":"other","lineage":["https://openalex.org/I4210096112"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jian Liu","raw_affiliation_strings":["WINLAB, Rutgers University"],"affiliations":[{"raw_affiliation_string":"WINLAB, Rutgers University","institution_ids":["https://openalex.org/I4210096112"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000206951","display_name":"Payton Walker","orcid":"https://orcid.org/0000-0002-8296-6321"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Payton Walker","raw_affiliation_strings":["University of Alabama at Birmingham"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham","institution_ids":["https://openalex.org/I32389192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394750","display_name":"Yingying Chen","orcid":"https://orcid.org/0000-0002-3994-766X"},"institutions":[{"id":"https://openalex.org/I4210096112","display_name":"Rutgers Sexual and Reproductive Health and Rights","ror":"https://ror.org/00rcvgx40","country_code":"NL","type":"other","lineage":["https://openalex.org/I4210096112"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Yingying Chen","raw_affiliation_strings":["WINLAB, Rutgers University"],"affiliations":[{"raw_affiliation_string":"WINLAB, Rutgers University","institution_ids":["https://openalex.org/I4210096112"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059730489","display_name":"Nitesh Saxena","orcid":"https://orcid.org/0000-0001-6083-104X"},"institutions":[{"id":"https://openalex.org/I32389192","display_name":"University of Alabama at Birmingham","ror":"https://ror.org/008s83205","country_code":"US","type":"education","lineage":["https://openalex.org/I32389192"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nitesh Saxena","raw_affiliation_strings":["University of Alabama at Birmingham"],"affiliations":[{"raw_affiliation_string":"University of Alabama at Birmingham","institution_ids":["https://openalex.org/I32389192"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100337522"],"corresponding_institution_ids":["https://openalex.org/I4210096112"],"apc_list":null,"apc_paid":null,"fwci":5.6375,"has_fulltext":true,"cited_by_count":29,"citation_normalized_percentile":{"value":0.96233001,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"42","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12031","display_name":"Speech and dialogue systems","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7743091583251953},{"id":"https://openalex.org/keywords/voice-command-device","display_name":"Voice command device","score":0.5769069790840149},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5165787935256958},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.47775641083717346},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.45836079120635986},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.45062851905822754},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4214611351490021},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4119342267513275},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34820738434791565},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19239142537117004},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13170474767684937},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08184006810188293}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7743091583251953},{"id":"https://openalex.org/C178718744","wikidata":"https://www.wikidata.org/wiki/Q2350070","display_name":"Voice command device","level":2,"score":0.5769069790840149},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5165787935256958},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.47775641083717346},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.45836079120635986},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.45062851905822754},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4214611351490021},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4119342267513275},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34820738434791565},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19239142537117004},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13170474767684937},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08184006810188293}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3359789.3359830","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359830","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359830","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:alma.01RUT_INST:11685363790004646","is_oa":false,"landing_page_url":"https://scholarship.libraries.rutgers.edu/esploro/outputs/conferenceProceeding/Defeating-hidden-audio-channel-attacks-on/991031758008804646","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Proceedings"}],"best_oa_location":{"id":"doi:10.1145/3359789.3359830","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3359789.3359830","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3359789.3359830","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1163021116","display_name":null,"funder_award_id":"CNS1820624","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1164577867","display_name":null,"funder_award_id":"W911NF-18-1-0221","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G3290063559","display_name":null,"funder_award_id":"CNS1820624, CNS1814590","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3789506656","display_name":null,"funder_award_id":"CNS1801630","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G386031960","display_name":"SaTC: CORE: Small: Collaborative: Security Assurance in Short Range Communication with Wireless Channel Obfuscation","funder_award_id":"1814590","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G434073065","display_name":"TWC: Small: Collaborative: Spoof-Resistant Smartphone Authentication using Cooperating Wearables","funder_award_id":"1526524","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5754568726","display_name":"SaTC: CORE: Medium: Collaborative: Secure Distributed Coded Computations for IoT: An Information Theoretic and Network Approach","funder_award_id":"1801630","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7404630258","display_name":"Justice Science Meets Computer Science: Preparing an SFS Workforce Ready to Face Cyber-Crime Challenges","funder_award_id":"1662762","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7513519810","display_name":null,"funder_award_id":"CNS1820624, CNS1814590, CNS1801630, CNS1714807, CNS1526524, DOE1662762","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7862415474","display_name":"SaTC: TTP: Small: SPHINX: A Password Store that Perfectly Hides Passwords from Itself","funder_award_id":"1714807","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8464050431","display_name":null,"funder_award_id":"CNS1814590","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306084","display_name":"U.S. Department of Energy","ror":"https://ror.org/01bj3aw27"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2991076039.pdf","grobid_xml":"https://content.openalex.org/works/W2991076039.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W282499614","https://openalex.org/W1434018057","https://openalex.org/W1438441013","https://openalex.org/W1543676750","https://openalex.org/W1544215838","https://openalex.org/W1971243715","https://openalex.org/W1986310664","https://openalex.org/W2022217943","https://openalex.org/W2066561607","https://openalex.org/W2072473772","https://openalex.org/W2074864091","https://openalex.org/W2103075368","https://openalex.org/W2114302432","https://openalex.org/W2117544888","https://openalex.org/W2119775231","https://openalex.org/W2128368067","https://openalex.org/W2207618852","https://openalex.org/W2293407848","https://openalex.org/W2295176885","https://openalex.org/W2312101546","https://openalex.org/W2486441166","https://openalex.org/W2536166232","https://openalex.org/W2575585029","https://openalex.org/W2725499676","https://openalex.org/W2751902866","https://openalex.org/W2765636281","https://openalex.org/W2794804810","https://openalex.org/W2807513246","https://openalex.org/W2962717526","https://openalex.org/W2964301649","https://openalex.org/W3105332166","https://openalex.org/W4299301436","https://openalex.org/W4300824008"],"related_works":["https://openalex.org/W3034529322","https://openalex.org/W2115913271","https://openalex.org/W2113597336","https://openalex.org/W2155505549","https://openalex.org/W2357479218","https://openalex.org/W1819546284","https://openalex.org/W2043253324","https://openalex.org/W2018648706","https://openalex.org/W2114232034","https://openalex.org/W2478692956"],"abstract_inverted_index":{"Voice":[0],"access":[1],"technologies":[2],"are":[3],"widely":[4],"adopted":[5],"in":[6],"mobile":[7],"devices":[8],"and":[9],"voice":[10,31,38,50],"assistant":[11],"systems":[12,35],"as":[13],"a":[14,24,49],"convenient":[15],"way":[16],"of":[17,28],"user":[18],"interaction.":[19],"Recent":[20],"studies":[21],"have":[22],"demonstrated":[23],"potentially":[25],"serious":[26],"vulnerability":[27],"the":[29,54],"existing":[30],"interfaces":[32],"on":[33],"these":[34],"to":[36,52],"\"hidden":[37],"commands\".":[39],"This":[40],"attack":[41],"uses":[42],"synthetically":[43],"rendered":[44],"adversarial":[45],"sounds":[46],"embedded":[47],"within":[48],"command":[51],"trick":[53],"speech":[55],"recognition":[56],"process":[57],"into":[58],"executing":[59],"malicious":[60],"commands,":[61],"without":[62],"being":[63],"noticed":[64],"by":[65],"legitimate":[66],"users.":[67]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
