498,563 research outputs found

    Security and privacy problems in voice assistant applications: A survey

    Get PDF
    Voice assistant applications have become omniscient nowadays. Two models that provide the two most important functions for real-life applications (i.e., Google Home, Amazon Alexa, Siri, etc.) are Automatic Speech Recognition (ASR) models and Speaker Identification (SI) models. According to recent studies, security and privacy threats have also emerged with the rapid development of the Internet of Things (IoT). The security issues researched include attack techniques toward machine learning models and other hardware components widely used in voice assistant applications. The privacy issues include technical-wise information stealing and policy-wise privacy breaches. The voice assistant application takes a steadily growing market share every year, but their privacy and security issues never stopped causing huge economic losses and endangering users' personal sensitive information. Thus, it is important to have a comprehensive survey to outline the categorization of the current research regarding the security and privacy problems of voice assistant applications. This paper concludes and assesses five kinds of security attacks and three types of privacy threats in the papers published in the top-tier conferences of cyber security and voice domain

    Security and Privacy Problems in Voice Assistant Applications: A Survey

    Full text link
    Voice assistant applications have become omniscient nowadays. Two models that provide the two most important functions for real-life applications (i.e., Google Home, Amazon Alexa, Siri, etc.) are Automatic Speech Recognition (ASR) models and Speaker Identification (SI) models. According to recent studies, security and privacy threats have also emerged with the rapid development of the Internet of Things (IoT). The security issues researched include attack techniques toward machine learning models and other hardware components widely used in voice assistant applications. The privacy issues include technical-wise information stealing and policy-wise privacy breaches. The voice assistant application takes a steadily growing market share every year, but their privacy and security issues never stopped causing huge economic losses and endangering users' personal sensitive information. Thus, it is important to have a comprehensive survey to outline the categorization of the current research regarding the security and privacy problems of voice assistant applications. This paper concludes and assesses five kinds of security attacks and three types of privacy threats in the papers published in the top-tier conferences of cyber security and voice domain.Comment: 5 figure

    User-centric secured smart virtual assistants framework for disables

    Get PDF
    Research on intelligent secured virtual assistant (ISVA) systems for disabled people is essential in order to meet the special requirements and overcome the difficulties they confront. The delicate nature of user interactions makes security and privacy considerations paramount in virtual assistant platforms. The gaps and weaknesses in existing systems can be identified by researching the context of current practice concerning their features, usability, limits in security procedures, and privacy restrictions. Therefore, we present a framework that combines blockchain-based security with federated learning (FL) to address the current shortcomings of virtual assistant technology. The examination focuses on two primary facets of cutting-edge virtual assistants. Firstly, it evaluates existing IoT-based virtual personal assistant systems designed for persons with disabilities, examining their features, usability, and limitations. The aim is to identify the specific needs and requirements of individuals with disabilities, considering their unique challenges and preferences in utilizing virtual assistant technologies. Second, considering the sensitivity of the information sent between users and virtual assistants, it explores the issues of security and privacy that arise while using such systems. The investigation covers authentication, data encryption, access control, and data privacy rules to provide a snapshot of the prevailing state protecting virtual assistants. Besides this, the framework strengthens the privacy and security of virtual assistants using blockchain technology. Through several empirical trials, it is found that the framework maintains better performance and usability, along with the provision of robust security mechanisms to safeguard user data and guarantee privacy

    Bring Your Own Device (BYOD): Risks to Adopters and Users

    Get PDF
    Bring your own device (BYOD) policy refers to a set of regulation broadly adopted by organizations that allows employee-owned mobile devices – like as laptops, smartphones, personal digital assistant and tablets – to the office for use and connection to the organizations IT infrastructure. BYOD offers numerous benefits ranging from plummeting organizational logistic cost, access to information at any time and boosting employee’s productivity. On the contrary, this concept presents various safety issues and challenges because of its characteristic security requirements. This study explored diverse literature databases to identify and classify BYOD policy adoption issues, possible control measures and guidelines that could hypothetically inform organizations and users that adopt and implement BYOD policy. The literature domain search yielded 110 articles, 26 of them were deemed to have met the inclusion standards. In this paper, a list of possible threats/vulnerabilities of BYOD adoption were identified. This investigation also identified and classified the impact of the threats/vulnerabilities on BYOD layered components according to security standards of “FIPS Publication 199” for classification. Finally, a checklist of measures that could be applied by organizations & users to mitigate BYOD vulnerabilities using a set layered approach of data, device, applications, and people were recommended

    An Analysis of the Programs of Fourteen FSA Farms at Prairie View, Texas

    Get PDF
    This study is an analysis of the programs of the fourteen farms under the Federal Security Administration which are located at Prairie View, Texas. Its purpose is to determine through such analysis if the programs of these farmers from the time they were begun to the present have proved successful, thereby determining if the farmers to whom the farm ownership loans have been made are good risks. A history of the Federal Security Administration is first given in the introduction; then follow case studies of the fourteen farms based upon information obtained from the inquiry forms that the writer took to each farm and filled out and from interviews with the Senior Administrative Assistant of the Farm Home Administration, the present agency having control of these farms, and upon the observations of the writer upon visiting each of the farms. Each of the case studies gives personal data on the farmer, a description of the farm lay-out, a detailed analysis of each enterprise Included in the farm program, with the income from each enterprise being given, and a summary of the condition of the farm as observed by the writer. The summary gives a statement of the trends of the fourteen farms

    IDENTIFICATION SYSTEM FOR SECURITY DEPARTMENT

    Get PDF
    Delivering real-time surveillance services to handheld devices over the Internet is an interesting application in the mobile environment. Developing such system needs tackle considerable design challenges including device downsides, platform heterogeneity and bandwidth limitation. In University Technology Petronas (UTP), the wireless technology is currently not very popular. Therefore, the purpose of this project is to introduce the wireless technology to the security department of UTP by strengthening the security summon, sticker, key booking and matrices card manual procedure and system from any violation and modification of information that can be detected easily and corrective action can be taken faster. As UTP become evolve and grow, security department rule are become huge. Therefore they need to prepare them with efficient computerized solution to perform data update and to access data from diverse location. The objective of this paper is to research on wireless technology that is suitable for security department system and suitable for UTP environment. To elaborate this, we can see that this system is integrated with Personal Digital Assistant (PDA) that equip with Bluetooth technology. With the capabilities of 10 meters radius sphere, this system can be accessed via the PDA in that range and data transfer rates are comparatively slow at 1-2 megabits per second. But there is another that can be used which is WIFI with the range of 30 meters and data transfer rated at 2-11 megabits per second. For the purpose of this project Bluetooth technology have been chosen to show the system functionality and performance. The methodology use for the project is Rapid Application Development that has four phases; requirement planning, user design, construction and cutover. The suggested solution will lead to build a prototype of new computerized system that can be accessed using the PDA for Security Department of University Technology Petronas.
    • …
    corecore