Personal Voice Assistant Security and Privacy—A Survey

Peng Cheng,Utz Roedig
DOI: https://doi.org/10.1109/jproc.2022.3153167
IF: 20.6
2022-04-01
Proceedings of the IEEE
Abstract:Personal voice assistants (PVAs) are increasingly used as interfaces to digital environments. Voice commands are used to interact with phones, smart homes, or cars. In the United States alone, the number of smart speakers, such as Amazon's Echo and Google Home, has grown by 78% to 118.5 million, and 21% of the U.S. population own at least one device. Given the increasing dependency of society on PVAs, security and privacy of these have become a major concern of users, manufacturers, and policy makers. Consequently, a steep increase in research efforts addressing security and privacy of PVAs can be observed in recent years. While some security and privacy research applicable to the PVA domain predates their recent increase in popularity, many new research strands have emerged. This article provides a survey of the state of the art in PVA security and privacy. The focus of this work is on the security and privacy challenges arising from the use of the acoustic channel. Work that describes both attacks and countermeasures is discussed. We highlight established areas such as voice authentication (VA) and new areas such as acoustic Denial of Service (DoS) that deserve more attention. This survey describes research areas where the threat is relatively well understood but where countermeasures are lacking, for example, in the area of hidden voice commands. We also discuss work that looks at privacy implications; for example, work on management of recording consent. This survey is intended to provide a comprehensive research map for PVA security and privacy.
engineering, electrical & electronic
What problem does this paper attempt to address?
This paper attempts to address the security and privacy issues of personal voice assistants (PVAs). With the widespread use of PVAs such as Amazon Echo, Siri or Google Home, users are concerned about the security and privacy of these devices. Specifically, the paper focuses on the following types of issues: 1. **Access Control**: - How to prevent unauthorized persons from bypassing authentication through the acoustic channel and triggering unauthorized operations? For example, by injecting hidden voice commands to manipulate the PVA. - The research includes Voice Authentication (VA) and Hidden Voice Commands. 2. **Acoustic Denial of Service (DoS)**: - How to prevent DoS attacks on the acoustic channel? For example, by acoustic interference to temporarily disable the voice interface. 3. **Voice Privacy**: - How to protect users' voice data from being misused? For example, prevent recording and processing without the user's consent. - Users want to know how to control which PVAs can listen to their conversations, and how to track and manage these recordings. 4. **Acoustic Sensing**: - How to prevent the extraction of additional sensitive information through the acoustic channel? For example, by analyzing the sound to identify room features or user behavior. The paper summarizes the current research progress and proposes a taxonomy to structure the existing research work. It pays special attention to the security and privacy challenges brought by the acoustic channel, aiming to provide a comprehensive map for future research and point out areas that require further research.