VoiceAttack: Fingerprinting Voice Commands on VPN-Protected Smart Home Speakers
Association for Computing Machinery (ACM) via YouTube
Power BI Fundamentals - Create visualizations and dashboards from scratch
Save 40% on 3 months of Coursera Plus
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about a groundbreaking security research presentation that explores vulnerabilities in VPN-protected smart home speakers through voice command fingerprinting techniques. Discover how researchers Xiaoguang Guo, Keyang Yu, Qi Li, and Dong Chen demonstrate methods for identifying specific voice commands even when transmitted through encrypted VPN connections, raising important privacy and security concerns for smart home device users. Examine the technical analysis and implications of this attack vector presented at an ACM conference, providing valuable insights for security professionals, IoT developers, and privacy-conscious consumers.
Syllabus
VoiceAttack
Taught by
Association for Computing Machinery (ACM)