A first look into Alexa’s interaction security
| dc.contributor.author | Castell Uroz, Ismael |
| dc.contributor.author | Marrugat Plaza, Xavier |
| dc.contributor.author | Solé Pareta, Josep |
| dc.contributor.author | Barlet Ros, Pere |
| dc.contributor.group | Universitat Politècnica de Catalunya. CBA - Sistemes de Comunicacions i Arquitectures de Banda Ampla |
| dc.contributor.other | Universitat Politècnica de Catalunya. Doctorat en Arquitectura de Computadors |
| dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors |
| dc.date.accessioned | 2020-07-02T08:17:51Z |
| dc.date.available | 2020-07-02T08:17:51Z |
| dc.date.issued | 2019 |
| dc.description.abstract | With a rapidly increasing market of millions of devices, the intelligent virtual assistants (IVA) have become a new vector available to exploit security breaches. In this work we approach the third revision of the Amazon Echo ecosystem's device Alexa from a security perspective, focusing our efforts on the interaction between the user and the device. We found the client-server communications to be robust using encryption, but studying the voice message recognition system we discovered a method to execute voice commands remotely, a feature not available by default. This method could be used against the user if an attacker manages to perform a session hijacking attack on the web or mobile clients. |
| dc.description.peerreviewed | Peer Reviewed |
| dc.description.sponsorship | This work was supported by the Spanish MINECO under contractTEC2017-90034-C2-1-R (ALLIANCE) |
| dc.description.version | Postprint (author's final draft) |
| dc.format.extent | 3 p. |
| dc.identifier.citation | Castell, I. [et al.]. A first look into Alexa’s interaction security. A: International Conference on Emerging Networking Experiments and Technologies. "CoNEXT’19 Companion: proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies: December 9-12, 2019, Orlando, FL, USA". New York: Association for Computing Machinery (ACM), 2019, p. 4-6. |
| dc.identifier.doi | 10.1145/3360468.3366769 |
| dc.identifier.isbn | 978-1-4503-7006-6 |
| dc.identifier.uri | https://hdl.handle.net/2117/192228 |
| dc.language.iso | eng |
| dc.publisher | Association for Computing Machinery (ACM) |
| dc.relation.projectid | info:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2013-2016/TEC2017-90034-C2-2-R/ES/DISEÑANDO UNA INFRAESTRUCTURA DE RED 5G DEFINIDA MEDIANTE CONOCIMIENTO HACIA LA PROXIMA SOCIEDAD DIGITAL-B/ |
| dc.relation.projectid | info:eu-repo/grantAgreement/EC/FP7/115002/EU/Integrating bioinformatics and chemoinformatics approaches for the development of expert systems allowing the in silico prediction of toxicities/ETOX |
| dc.relation.publisherversion | https://dl.acm.org/doi/10.1145/3360468.3366769 |
| dc.rights.access | Open Access |
| dc.subject | Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Internet |
| dc.subject.lcsh | Cloud computing |
| dc.subject.lemac | Computació en núvol |
| dc.subject.other | Social aspects of security and privacy |
| dc.subject.other | Cloud computing |
| dc.title | A first look into Alexa’s interaction security |
| dc.type | Conference report |
| dspace.entity.type | Publication |
| local.citation.author | Castell, I.; Marrugat, X.; Solé-Pareta, J.; Barlet, P. |
| local.citation.contributor | International Conference on Emerging Networking Experiments and Technologies |
| local.citation.endingPage | 6 |
| local.citation.publicationName | CoNEXT’19 Companion: proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies: December 9-12, 2019, Orlando, FL, USA |
| local.citation.pubplace | New York |
| local.citation.startingPage | 4 |
| local.identifier.drac | 28610104 |
Fitxers
Paquet original
1 - 1 de 1
Carregant...
- Nom:
- A_first_look_into_Alexa_s_interaction_security.pdf
- Mida:
- 424.36 KB
- Format:
- Adobe Portable Document Format



