{"id":"https://openalex.org/W4281384987","doi":"https://doi.org/10.1145/3488932.3497766","title":"ALEXA VERSUS ALEXA","display_name":"ALEXA VERSUS ALEXA","publication_year":2022,"publication_date":"2022-05-24","ids":{"openalex":"https://openalex.org/W4281384987","doi":"https://doi.org/10.1145/3488932.3497766"},"language":"en","primary_location":{"id":"doi:10.1145/3488932.3497766","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3488932.3497766","pdf_url":null,"source":{"id":"https://openalex.org/S4363609011","display_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062886919","display_name":"Sergio Esposito","orcid":"https://orcid.org/0000-0001-9904-9821"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Sergio Esposito","raw_affiliation_strings":["Royal Holloway, University of London, Egham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Royal Holloway, University of London, Egham, United Kingdom","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001748768","display_name":"Daniele Sgandurra","orcid":"https://orcid.org/0000-0001-5238-8068"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Daniele Sgandurra","raw_affiliation_strings":["Royal Holloway, University of London, Egham, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Royal Holloway, University of London, Egham, United Kingdom","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051511023","display_name":"Giampaolo Bella","orcid":"https://orcid.org/0000-0002-7615-8643"},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giampaolo Bella","raw_affiliation_strings":["Universit\u00e0 degli Studi di Catania, Catania, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 degli Studi di Catania, Catania, Italy","institution_ids":["https://openalex.org/I39063666"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062886919"],"corresponding_institution_ids":["https://openalex.org/I184558857"],"apc_list":null,"apc_paid":null,"fwci":2.0864,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.89636651,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1064","last_page":"1078"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8161799907684326},{"id":"https://openalex.org/keywords/echo","display_name":"Echo (communications protocol)","score":0.7306244373321533},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6973348259925842},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6467609405517578},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6054970026016235},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.5292344093322754},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4683268368244171},{"id":"https://openalex.org/keywords/voice-command-device","display_name":"Voice command device","score":0.42454129457473755},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3384498655796051},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.27648597955703735},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18452316522598267},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.08406731486320496}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8161799907684326},{"id":"https://openalex.org/C2779426996","wikidata":"https://www.wikidata.org/wiki/Q18389128","display_name":"Echo (communications protocol)","level":2,"score":0.7306244373321533},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6973348259925842},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6467609405517578},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6054970026016235},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.5292344093322754},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4683268368244171},{"id":"https://openalex.org/C178718744","wikidata":"https://www.wikidata.org/wiki/Q2350070","display_name":"Voice command device","level":2,"score":0.42454129457473755},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3384498655796051},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.27648597955703735},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18452316522598267},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.08406731486320496},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3488932.3497766","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3488932.3497766","pdf_url":null,"source":{"id":"https://openalex.org/S4363609011","display_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.75,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2022217943","https://openalex.org/W2148519244","https://openalex.org/W2560674852","https://openalex.org/W2626699878","https://openalex.org/W2753883666","https://openalex.org/W2783089003","https://openalex.org/W2811004397","https://openalex.org/W2898435086","https://openalex.org/W2912083425","https://openalex.org/W2914630606","https://openalex.org/W2921394285","https://openalex.org/W2933426098","https://openalex.org/W2962583216","https://openalex.org/W2963077926","https://openalex.org/W2964301649","https://openalex.org/W2973252307","https://openalex.org/W3003285580","https://openalex.org/W3091896612","https://openalex.org/W3096559598","https://openalex.org/W3110715780","https://openalex.org/W3139099451","https://openalex.org/W4300824008"],"related_works":["https://openalex.org/W3190778120","https://openalex.org/W2831856846","https://openalex.org/W4386336130","https://openalex.org/W2697842147","https://openalex.org/W316278467","https://openalex.org/W2358767682","https://openalex.org/W2079101048","https://openalex.org/W3022219809","https://openalex.org/W4368232262","https://openalex.org/W4382118841"],"abstract_inverted_index":{"We":[0,114,139,237],"present":[1],"ALEXA":[2,4],"VERSUS":[3],"(AvA),":[5],"a":[6,32,69,80,89,183,232,252,263,300,308,312],"novel":[7],"attack":[8,285],"that":[9,41,91,216,283,321],"leverages":[10,38,68],"audio":[11,17,54],"files":[12,55],"containing":[13],"voice":[14,50],"commands":[15,51,215],"and":[16,134,151,224,288,318],"reproduction":[18],"methods":[19],"in":[20,83,279,290,331],"an":[21,45,97],"offensive":[22],"fashion,":[23],"to":[24,104,172,193,201,241,273,294],"gain":[25],"control":[26,122,227],"of":[27,35,78,85,110,221,228,235,262,265,277,297,307,315,323],"Amazon":[28,242],"Echo":[29,46,144],"devices":[30],"for":[31,231],"prolonged":[33,233],"amount":[34,234],"time.":[36,236],"AvA":[37,74,278,298,327],"the":[39,62,76,86,111,126,137,159,181,211,222,229,260,275,284,305,324],"fact":[40],"Alexa":[42],"running":[43],"on":[44,108,136,167,268,299,311],"device":[47,63,230],"correctly":[48,218],"interprets":[49],"originated":[52],"from":[53,190],"even":[56],"when":[57],"they":[58],"are":[59,217,328],"played":[60],"by":[61,164],"itself":[64],"--":[65],"i.e.,":[66],"it":[67,107,166],"command":[70,103,161],"self-issue":[71,100,160,175,214],"vulnerability.":[72],"Hence,":[73],"removes":[75],"necessity":[77],"having":[79],"rogue":[81],"speaker":[82],"proximity":[84],"victim's":[87],"Echo,":[88,105],"constraint":[90],"many":[92],"attacks":[93],"share.":[94],"With":[95],"AvA,":[96,119],"attacker":[98],"can":[99,121,185,213,225],"any":[101],"permissible":[102],"controlling":[106],"behalf":[109],"legitimate":[112],"user.":[113,138],"have":[115],"verified":[116],"that,":[117],"via":[118,243],"attackers":[120,171,200],"smart":[123],"appliances":[124],"within":[125],"household,":[127],"buy":[128],"unwanted":[129],"items,":[130],"tamper":[131],"linked":[132],"calendars":[133],"eavesdrop":[135],"also":[140],"discovered":[141],"two":[142],"additional":[143,174],"vulnerabilities,":[145,210],"which":[146],"we":[147,258,303,319],"call":[148],"Full":[149,156],"Volume":[150,157],"Break":[152,177],"Tag":[153,178],"Chain.":[154],"The":[155],"increases":[158,180],"recognition":[162],"rate,":[163],"doubling":[165],"average,":[168],"hence":[169,198],"allowing":[170],"perform":[173],"commands.":[176],"Chain":[179],"time":[182],"skill":[184],"run":[186],"without":[187],"user":[188],"interaction,":[189],"eight":[191],"seconds":[192],"more":[194],"than":[195],"one":[196],"hour,":[197],"enabling":[199],"setup":[202],"realistic":[203],"social":[204],"engineering":[205],"scenarios.":[206],"By":[207],"exploiting":[208],"these":[209,239],"adversary":[212],"executed":[219],"99%":[220],"times":[223],"keep":[226],"reported":[238],"vulnerabilities":[240],"their":[244],"vulnerability":[245],"research":[246],"program,":[247],"who":[248],"rated":[249],"them":[250],"with":[251],"Medium":[253],"severity":[254],"score.":[255],"In":[256],"addition,":[257],"discuss":[259],"results":[261,306],"set":[264],"tests":[266],"performed":[267,310],"three":[269],"voluntary":[270],"Echo-equipped":[271],"households":[272],"verify":[274],"feasibility":[276],"real":[280],"scenarios,":[281],"finding":[282],"remains":[286],"undetected":[287],"operative":[289],"most":[291,322],"cases.":[292],"Finally,":[293],"assess":[295],"limitations":[296,325],"larger":[301],"scale,":[302],"provide":[304],"survey":[309],"study":[313],"group":[314],"18":[316],"users,":[317],"show":[320],"against":[326],"hardly":[329],"used":[330],"practice.":[332]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-05-25T00:00:00"}
