VoiceAttack: Fingerprinting Voice Commands on VPN-Protected Smart Home Speakers
Association for Computing Machinery (ACM) via YouTube
Free courses from frontend to fullstack and AI
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about a groundbreaking security research presentation that explores vulnerabilities in VPN-protected smart home speakers through voice command fingerprinting techniques. Discover how researchers Xiaoguang Guo, Keyang Yu, Qi Li, and Dong Chen demonstrate methods for identifying specific voice commands even when transmitted through encrypted VPN connections, raising important privacy and security concerns for smart home device users. Examine the technical analysis and implications of this attack vector presented at an ACM conference, providing valuable insights for security professionals, IoT developers, and privacy-conscious consumers.
Syllabus
VoiceAttack
Taught by
Association for Computing Machinery (ACM)