71,245 research outputs found

    Automated Crowdturfing Attacks and Defenses in Online Review Systems

    Full text link
    Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation online, but are limited by the costs of hiring and managing human workers. In this paper, we identify a new class of attacks that leverage deep learning language models (Recurrent Neural Networks or RNNs) to automate the generation of fake online reviews for products and services. Not only are these attacks cheap and therefore more scalable, but they can control rate of content output to eliminate the signature burstiness that makes crowdsourced campaigns easy to detect. Using Yelp reviews as an example platform, we show how a two phased review generation and customization attack can produce reviews that are indistinguishable by state-of-the-art statistical detectors. We conduct a survey-based user study to show these reviews not only evade human detection, but also score high on "usefulness" metrics by users. Finally, we develop novel automated defenses against these attacks, by leveraging the lossy transformation introduced by the RNN training and generation cycle. We consider countermeasures against our mechanisms, show that they produce unattractive cost-benefit tradeoffs for attackers, and that they can be further curtailed by simple constraints imposed by online service providers

    Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues

    Full text link
    Over the last few years, a rapidly increasing number of Internet-of-Things (IoT) systems that adopt voice as the primary user input have emerged. These systems have been shown to be vulnerable to various types of voice spoofing attacks. Existing defense techniques can usually only protect from a specific type of attack or require an additional authentication step that involves another device. Such defense strategies are either not strong enough or lower the usability of the system. Based on the fact that legitimate voice commands should only come from humans rather than a playback device, we propose a novel defense strategy that is able to detect the sound source of a voice command based on its acoustic features. The proposed defense strategy does not require any information other than the voice command itself and can protect a system from multiple types of spoofing attacks. Our proof-of-concept experiments verify the feasibility and effectiveness of this defense strategy.Comment: Proceedings of the 27th International Conference on Computer Communications and Networks (ICCCN), Hangzhou, China, July-August 2018. arXiv admin note: text overlap with arXiv:1803.0915

    Doublespeak and the War on Terrorism

    Get PDF
    Five years have passed since the catastrophic terrorist attacks of September 11, 2001. Those attacks ushered in the war on terror. Since some high-ranking government officials and pundits are now referring to the war on terror as the "Long War" or "World War III," because its duration is not clear, now is an appropriate time to take a few steps back and examine the disturbing new vocabulary that has emerged from this conflict. One of the central insights of George Orwell's classic novel Nineteen Eighty-Four concerned the manipulative use of language, which he called "newspeak" and "doublethink," and which we now call "doublespeak" and "Orwellian." Orwell was alarmed by government propaganda and the seemingly rampant use of euphemisms and halftruths -- and he conveyed his discomfort with such tactics to generations of readers by using vivid examples in his novel. Despite our general awareness of the tactic, government officials routinely use doublespeak to expand, or at least maintain, their power. The purpose of this paper is not to criticize any particular policy initiative. Reasonable people can honestly disagree about what needs to be done to combat the terrorists who are bent on killing Americans. However, a conscientious discussion of our policy options must begin with a clear understanding of what our government is actually doing and what it is really proposing to do next. The aim here is to enhance the understanding of both policymakers and the interested lay public by exposing doublespeak
    • …
    corecore