Guoming Zhang, Xiaoyu Ji (Zhejiang University)

DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). In this paper, we design a lightweight method that can not only detect such attacks but also identify the direction of attackers without requiring any extra hardware or hardware modification. Based on the physical properties that the inaudible voice commands attenuate faster than the audible ones, we design a microphone array with five microphones to capture the attenuation differences mainly caused by obstacles (surface of devices) and use the differences to detect attacks. we conducted experiments to evaluate the effectiveness of our method in terms of various factors, including carrier frequencies, attack distances, angles, background noise, and voice command types, etc. Our experiments show that our method can detect inaudible voice commands with an accuracy of 99% and recognize the direction of the attackers with an accuracy of 97.89%.

Speaker's biographies

Guoming Zhang received his B.S. degree in mechanical engineering from Ludong University, Yantai, China, in 2013. He received his M.S. degree in mechanical and electronic Engineering from Beijing Institute of Technology, in 2016, and is currently working toward the PH.D. degree in electrical engineering at Zhejiang University, Hangzhou, China. His research interests are in the areas of IoT security, acoustic communication, especially for the security of speech recognition system.

Xiaoyu Ji is an associate professor with the department of Electrical Engineering of Zhejiang University. He received his B.S. degree in Electronic Information & Technology and Instrumentation Science from Zhejiang University, Hangzhou, China, in 2010. He received his Ph.D. degree in department of Computer Science from Hong Kong University of Science and Technology in 2015. From 2015 to 2016, he was a researcher at Huawei Future Networking Theory Lab in Hong Kong. His research interests include IoT security, wireless communication protocol design, especially with cross-layer techniques. He won the best paper awards of ACM CCS 2017, ACM ASIACCS 2018 and IEEE Trustcom 2014. He is a member of IEEE. The publications are available at the homepage.

View More Papers

Model-Agnostic Defense for Lane Detection against Adversarial Attack

Henry Xu, An Ju, and David Wagner (UC Berkeley) Baidu Security Auto-Driving Security Award Winner ($1000 cash prize)!

Read More

Practical Blind Membership Inference Attack via Differential Comparisons

Bo Hui (The Johns Hopkins University), Yuchen Yang (The Johns Hopkins University), Haolin Yuan (The Johns Hopkins University), Philippe Burlina (The Johns Hopkins University Applied Physics Laboratory), Neil Zhenqiang Gong (Duke University), Yinzhi Cao (The Johns Hopkins University)

Read More

HERA: Hotpatching of Embedded Real-time Applications

Christian Niesler (University of Duisburg-Essen), Sebastian Surminski (University of Duisburg-Essen), Lucas Davi (University of Duisburg-Essen)

Read More

Demo #10: Security of Deep Learning based Automated Lane...

Takami Sato, Junjie Shen, Ningfei Wang (UC Irvine), Yunhan Jia (ByteDance), Xue Lin (Northeastern University), and Qi Alfred Chen (UC Irvine)

Read More