A first look into Alexa’s interaction security

dc.contributor.authorCastell Uroz, Ismael
dc.contributor.authorMarrugat Plaza, Xavier
dc.contributor.authorSolé Pareta, Josep
dc.contributor.authorBarlet Ros, Pere
dc.contributor.groupUniversitat Politècnica de Catalunya. CBA - Sistemes de Comunicacions i Arquitectures de Banda Ampla
dc.contributor.otherUniversitat Politècnica de Catalunya. Doctorat en Arquitectura de Computadors
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
dc.date.accessioned2020-07-02T08:17:51Z
dc.date.available2020-07-02T08:17:51Z
dc.date.issued2019
dc.description.abstractWith a rapidly increasing market of millions of devices, the intelligent virtual assistants (IVA) have become a new vector available to exploit security breaches. In this work we approach the third revision of the Amazon Echo ecosystem's device Alexa from a security perspective, focusing our efforts on the interaction between the user and the device. We found the client-server communications to be robust using encryption, but studying the voice message recognition system we discovered a method to execute voice commands remotely, a feature not available by default. This method could be used against the user if an attacker manages to perform a session hijacking attack on the web or mobile clients.
dc.description.peerreviewedPeer Reviewed
dc.description.sponsorshipThis work was supported by the Spanish MINECO under contractTEC2017-90034-C2-1-R (ALLIANCE)
dc.description.versionPostprint (author's final draft)
dc.format.extent3 p.
dc.identifier.citationCastell, I. [et al.]. A first look into Alexa’s interaction security. A: International Conference on Emerging Networking Experiments and Technologies. "CoNEXT’19 Companion: proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies: December 9-12, 2019, Orlando, FL, USA". New York: Association for Computing Machinery (ACM), 2019, p. 4-6.
dc.identifier.doi10.1145/3360468.3366769
dc.identifier.isbn978-1-4503-7006-6
dc.identifier.urihttps://hdl.handle.net/2117/192228
dc.language.isoeng
dc.publisherAssociation for Computing Machinery (ACM)
dc.relation.projectidinfo:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2013-2016/TEC2017-90034-C2-2-R/ES/DISEÑANDO UNA INFRAESTRUCTURA DE RED 5G DEFINIDA MEDIANTE CONOCIMIENTO HACIA LA PROXIMA SOCIEDAD DIGITAL-B/
dc.relation.projectidinfo:eu-repo/grantAgreement/EC/FP7/115002/EU/Integrating bioinformatics and chemoinformatics approaches for the development of expert systems allowing the in silico prediction of toxicities/ETOX
dc.relation.publisherversionhttps://dl.acm.org/doi/10.1145/3360468.3366769
dc.rights.accessOpen Access
dc.subjectÀrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Internet
dc.subject.lcshCloud computing
dc.subject.lemacComputació en núvol
dc.subject.otherSocial aspects of security and privacy
dc.subject.otherCloud computing
dc.titleA first look into Alexa’s interaction security
dc.typeConference report
dspace.entity.typePublication
local.citation.authorCastell, I.; Marrugat, X.; Solé-Pareta, J.; Barlet, P.
local.citation.contributorInternational Conference on Emerging Networking Experiments and Technologies
local.citation.endingPage6
local.citation.publicationNameCoNEXT’19 Companion: proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies: December 9-12, 2019, Orlando, FL, USA
local.citation.pubplaceNew York
local.citation.startingPage4
local.identifier.drac28610104

Fitxers

Paquet original

Mostrant 1 - 1 de 1
Carregant...
Miniatura
Nom:
A_first_look_into_Alexa_s_interaction_security.pdf
Mida:
424.36 KB
Format:
Adobe Portable Document Format