{"id":"https://openalex.org/W4403886363","doi":"https://doi.org/10.1145/3671127.3698171","title":"VoiceAttack: Fingerprinting Voice Command on VPN-protected Smart Home Speakers","display_name":"VoiceAttack: Fingerprinting Voice Command on VPN-protected Smart Home Speakers","publication_year":2024,"publication_date":"2024-10-29","ids":{"openalex":"https://openalex.org/W4403886363","doi":"https://doi.org/10.1145/3671127.3698171"},"language":"en","primary_location":{"id":"doi:10.1145/3671127.3698171","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3671127.3698171","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3671127.3698171","source":null,"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3671127.3698171","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066115795","display_name":"Xiaoguang Guo","orcid":"https://orcid.org/0009-0009-9973-8163"},"institutions":[{"id":"https://openalex.org/I167576493","display_name":"Colorado School of Mines","ror":"https://ror.org/04raf6v53","country_code":"US","type":"education","lineage":["https://openalex.org/I167576493"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiaoguang Guo","raw_affiliation_strings":["Department of Computer Science, Colorado School of Mines, Golden, Colorado, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Colorado School of Mines, Golden, Colorado, USA","institution_ids":["https://openalex.org/I167576493"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103084216","display_name":"Keyang Yu","orcid":"https://orcid.org/0000-0001-5224-1410"},"institutions":[{"id":"https://openalex.org/I167576493","display_name":"Colorado School of Mines","ror":"https://ror.org/04raf6v53","country_code":"US","type":"education","lineage":["https://openalex.org/I167576493"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Keyang Yu","raw_affiliation_strings":["Department of Computer Science, Colorado School of Mines, Golden, Colorado, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Colorado School of Mines, Golden, Colorado, USA","institution_ids":["https://openalex.org/I167576493"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026871016","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-6418-7474"},"institutions":[{"id":"https://openalex.org/I167576493","display_name":"Colorado School of Mines","ror":"https://ror.org/04raf6v53","country_code":"US","type":"education","lineage":["https://openalex.org/I167576493"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Department of Computer Science, Colorado School of Mines, Golden, Colorado, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Colorado School of Mines, Golden, Colorado, USA","institution_ids":["https://openalex.org/I167576493"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101813785","display_name":"Dong Chen","orcid":"https://orcid.org/0000-0002-1052-5658"},"institutions":[{"id":"https://openalex.org/I167576493","display_name":"Colorado School of Mines","ror":"https://ror.org/04raf6v53","country_code":"US","type":"education","lineage":["https://openalex.org/I167576493"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dong Chen","raw_affiliation_strings":["Department of Computer Science, Colorado School of Mines, Golden, Colorado, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Colorado School of Mines, Golden, Colorado, USA","institution_ids":["https://openalex.org/I167576493"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066115795"],"corresponding_institution_ids":["https://openalex.org/I167576493"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16768457,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"55","last_page":"65"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6732974052429199},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4954122304916382},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.4217411279678345},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37005066871643066},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3294562101364136}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6732974052429199},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4954122304916382},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4217411279678345},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37005066871643066},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3294562101364136}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3671127.3698171","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3671127.3698171","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3671127.3698171","source":null,"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation","raw_type":"proceedings-article"},{"id":"pmh:oai:epublications.marquette.edu:comp_fac-1101","is_oa":false,"landing_page_url":"https://epublications.marquette.edu/comp_fac/101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401682","display_name":"e-Publications@Marquette (Marquette University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I102461120","host_organization_name":"Marquette University","host_organization_lineage":["https://openalex.org/I102461120"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Faculty Research and Publications","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3671127.3698171","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3671127.3698171","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3671127.3698171","source":null,"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G192667145","display_name":null,"funder_award_id":"2238701","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4403886363.pdf"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W1479651931","https://openalex.org/W1521422460","https://openalex.org/W1567366855","https://openalex.org/W1584308190","https://openalex.org/W1968714482","https://openalex.org/W2012210084","https://openalex.org/W2021949962","https://openalex.org/W2034203008","https://openalex.org/W2058143565","https://openalex.org/W2060312080","https://openalex.org/W2074577672","https://openalex.org/W2087691765","https://openalex.org/W2097481773","https://openalex.org/W2115033874","https://openalex.org/W2138803135","https://openalex.org/W2172280596","https://openalex.org/W2485000773","https://openalex.org/W2566212894","https://openalex.org/W2752929869","https://openalex.org/W2752949934","https://openalex.org/W2763967737","https://openalex.org/W2805240935","https://openalex.org/W2861817451","https://openalex.org/W2884879516","https://openalex.org/W2905203220","https://openalex.org/W2912944782","https://openalex.org/W2913716726","https://openalex.org/W2956281981","https://openalex.org/W2964344666","https://openalex.org/W2969862110","https://openalex.org/W2999498625","https://openalex.org/W3023258177","https://openalex.org/W3027451243","https://openalex.org/W3044082017","https://openalex.org/W3095097363","https://openalex.org/W3095534223","https://openalex.org/W3099873379","https://openalex.org/W3107308218","https://openalex.org/W3155269739","https://openalex.org/W4206801712","https://openalex.org/W4239869557","https://openalex.org/W4248063951","https://openalex.org/W4281388447","https://openalex.org/W4283210219","https://openalex.org/W4286370726","https://openalex.org/W4309375081","https://openalex.org/W4386361599"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Recently,":[0],"there":[1],"are":[2,51,198,206],"growing":[3],"security":[4],"and":[5,16,73,103,129,157,170,203,226],"privacy":[6,156],"concerns":[7],"regarding":[8],"smart":[9,48,61],"voice":[10,33,84,88,114,131,173,186,195],"speakers,":[11],"such":[12],"as":[13,159],"Amazon":[14,31,101,224],"Alexa":[15,32,102],"Google":[17,104,227],"Home.":[18,105],"Extensive":[19],"prior":[20],"research":[21],"has":[22],"shown":[23],"that":[24,79,109,162,193],"it":[25,160],"is":[26],"surprisingly":[27],"easy":[28],"to":[29,58,154,189,201],"infer":[30,113,130],"commands":[34,85,174,188,197,205],"over":[35],"their":[36,60],"network":[37,90,146],"traffic":[38,43,147],"data.":[39],"To":[40],"prevent":[41],"these":[42],"analytics":[44],"(TA)-based":[45],"inference":[46],"attacks,":[47],"home":[49],"owners":[50],"considering":[52],"deploying":[53],"virtual":[54],"private":[55],"networks":[56],"(VPNs)":[57],"safeguard":[59],"speakers.":[62],"In":[63],"this":[64],"work,":[65],"we":[66],"design":[67],"a":[68,118,126,151,212],"new":[69],"machine":[70],"learning":[71,75],"(ML)":[72],"deep":[74],"(DL)-powered":[76],"attack":[77,221],"framework---VoiceAttack":[78],"could":[80,111,166,217],"still":[81,167],"accurately":[82],"fingerprint":[83],"on":[86,223],"VPN-encrypted":[87,145],"speaker":[89,187,196],"traffic.":[91],"We":[92,179,191,209],"evaluate":[93],"VoiceAttack":[94,110,202],"under":[95],"5":[96],"different":[97],"real-world":[98],"settings":[99],"using":[100],"Our":[106],"results":[107],"show":[108],"correctly":[112],"command":[115,132],"sentences":[116],"with":[117,134],"Matthews":[119],"Correlation":[120],"Coefficient":[121],"(MCC)":[122],"of":[123,137,185],"0.68":[124],"in":[125,139],"closed-world":[127],"setting":[128,142],"categories":[133],"an":[135,140],"MCC":[136],"0.84":[138],"open-world":[141],"by":[143,229],"eavesdropping":[144],"rates.":[148],"This":[149],"presents":[150],"significant":[152],"risk":[153],"user":[155],"security,":[158],"suggests":[161],"external":[163],"on-path":[164],"attackers":[165],"potentially":[168],"intercept":[169],"decipher":[171],"users'":[172],"despite":[175],"the":[176,183],"VPN":[177],"encryption.":[178],"then":[180],"further":[181],"examine":[182],"sensitivity":[184],"VoiceAttack.":[190],"find":[192],"134":[194],"highly":[199],"vulnerable":[200],"3":[204],"less":[207],"sensitive.":[208],"also":[210],"present":[211],"proof-of-concept":[213],"defense":[214],"approach---VoiceDefense,":[215],"which":[216],"effectively":[218],"mitigate":[219],"TA":[220],"accuracy":[222],"Echo":[225],"Home":[228],"~50%.":[230]},"counts_by_year":[],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
