Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3427228.3427250acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications

Published: 08 December 2020 Publication History

Abstract

Voice Assistants (VA) such as Amazon Alexa and Google Assistant are quickly and seamlessly integrating into people’s daily lives. The increased reliance on VA services raises privacy concerns such as the leakage of private conversations and sensitive information. Privacy policies play an important role in addressing users’ privacy concerns and informing them about the data collection, storage, and sharing practices. VA platforms (both Amazon Alexa and Google Assistant) allow third-party developers to build new voice-apps and publish them to app stores. Voice-app developers are required to provide privacy policies to disclose their apps’ data practices. However, little is known whether these privacy policies are informative and trustworthy or not on emerging VA platforms. On the other hand, many users invoke voice-apps through voice and thus there exists a usability challenge for users to access these privacy policies.
In this paper, we conduct the first large-scale data analytics to systematically measure the effectiveness of privacy policies provided by voice-app developers on two mainstream VA platforms. We seek to understand the quality and usability issues of privacy policies provided by developers in the current app stores. We analyzed 64,720 Amazon Alexa skills and 16,002 Google Assistant actions. Our work also includes a user study to understand users’ perspectives on privacy policies of voice-apps. Our findings reveal a worrisome reality of privacy policies in two mainstream voice-app stores. For the 17,952 skills and 9,955 actions that have privacy policies, there are many voice-apps with incorrect privacy policy URLs or broken links. We found that 1,755 Alexa skills and 192 Google actions provide a broken privacy policy URL. Amazon Alexa has more than 56% of skills with duplicate privacy policy URLs. While the Google Assistant platform has 9.0% of actions with duplicate privacy policy URLs. There are also skills/actions with inconsistency between the privacy policy and description. 6,047 Google actions do not have a privacy policy although they are required to provide one. Google and Amazon even have official voice-apps violating their own requirements regarding the privacy policy. We have reported our findings to both Amazon Alexa and Google Assistant teams, and received acknowledgments from both vendors.

References

[1]
2020. Alexa Skills Policy Testing. https://developer.amazon.com/fr/docs/custom-skills/policy-testing-for-an-alexa-skill.html. (2020).
[2]
2020. Alexa Skills Security Requirements. https://developer.amazon.com/fr/docs/custom-skills/security-testing-for-an-alexa-skill.html. (2020).
[3]
2020. Amazon Developer Services Agreement. https://developer.amazon.com/support/ legal/da. (2020).
[4]
2020. Amazon Mechanical Turk. https://www.mturk.com/. (2020).
[5]
2020. Configure Permissions for Customer Information in Your Skill. https://developer.amazon.com/en-US/docs/alexa/custom-skills/configure-permissions-for-customer-information-in-your-skill.html. (2020).
[6]
2020. Google fined €50 million for GDPR violation in France. https://www.theverge.com/2019/1/21/18191591/google-gdpr-fine-50-million-euros-data-consent-cnil/. (2020).
[7]
2020. Google Privacy Policy Guidance. https://developers.google.com/assistant/console/ policies/privacy-policy-guide. (2020).
[8]
2020. Industrial-Strength Natural Language Processing. https://spacy.io. (2020).
[9]
2020. Number of digital voice assistants in use worldwide from 2019 to 2023. https://www.statista.com/statistics/973815/worldwide-digital-voice-assistant-in-use/. (2020).
[10]
2020. Policies for Actions on Google. https://developers.google.com/actions/policies/ general-policies. (2020).
[11]
2020. PrivacyCheck for Google Chrome. https://identity.utexas.edu/privacycheck-for-google-chrome. (2020).
[12]
2020. Selenium automates browsers. https://www.selenium.dev. (2020).
[13]
2020. Snapchat Transmitted Users’ Location and Collected Their Address Books Without Notice Or Consent. https://www.orrick.com/Insights/2013/02/FTC-Assesses-800000-Fine-Against-Mobile-App-Operator-and-Issues-Mobile-Privacy-and-Security-Guidance. (2020).
[14]
2020. Snapchat Transmitted Users’ Location and Collected Their Address Books Without Notice Or Consent. https://www.ftc.gov/news-events/press-releases/2014/05/snapchat-settles-ftc-charges-promises-disappearing-messages-were/. (2020).
[15]
Noura Abdi, Kopo M. Ramokapane, and Jose M. Such. 2019. More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants. In Symposium on Usable Privacy and Security (SOUPS).
[16]
Tawfiq Ammari, Jofish Kaye, Janice Y. Tsai, and Frank Bentley. 2019. Music, Search, and IoT: How People (Really) Use Voice Assistants. ACM Trans. Comput.-Hum. Interact. 26, 3 (2019), 17:1–17:28.
[17]
Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. Policylint: Investigating Internal Privacy Policy Contradictions on Google Play. In USENIX Security Symposium (USENIX Security). 585–602.
[18]
Noah Apthorpe, Sarah Varghese, and Nick Feamster. 2019. Evaluating the Contextual Integrity of Privacy Regulation: Parents’ IoT Toy Privacy Norms Versus COPPA. In USENIX Security Symposium (USENIX Security).
[19]
Alexander Benlian, Johannes Klumpe, and Oliver Hinz. 2019. Mitigating the intrusive effects of smart home assistants by using anthropomorphic design features: A multimethod investigation. Information Systems Journal(2019), 1–33. https://doi.org/10.1111/isj.12243
[20]
TravisD. Breaux, Hanan Hibshi, and Ashwini Rao. 2014. Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements. Requirements Engineering(2014), 1–27.
[21]
Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16). 513–530.
[22]
S. Chen, K. Ren, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, and A. Mohaisen. 2017. You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 183–195.
[23]
Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, and Hongxin Hu. 2020. Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms. In ACM SIGSAC Conference on Computer and Communications Security (CCS).
[24]
H. Chung, M. Iorga, J. Voas, and S. Lee. 2017. “Alexa, Can I Trust You?”. IEEE Computer 50, 9 (2017), 100–104.
[25]
Huan Feng, Kassem Fawaz, and Kang G. Shin. 2017. Continuous Authentication for Voice Assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (MobiCom). 343–355.
[26]
Nathaniel Fruchter and Ilaria Liccardi. 2018. Consumer Attitudes Towards Privacy and Security in Home Assistants. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems.
[27]
Christine Geeng and Franziska Roesner. 2019. Who’s In Control?: Interactions In Multi-User Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI’19). 1–13.
[28]
Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale. In 29th USENIX Security Symposium (USENIX Security 20).
[29]
Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. CoRR abs/1802.02561(2018). http://arxiv.org/abs/1802.02561
[30]
Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. 2018. Skill Squatting Attacks on Amazon Alexa. In USENIX Security Symposium (USENIX Security). 33–47.
[31]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proc. ACM Hum.-Comput. Interact. 2, CSCW (2018), 1–31.
[32]
X. Lei, G. Tu, A. X. Liu, C. Li, and T. Xie. 2018. The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures. In 2018 IEEE Conference on Communications and Network Security (CNS). 1–9.
[33]
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy Attitudes of Smart Speaker Users. In 19th Privacy Enhancing Technologies Symposium (PETS).
[34]
Graeme McLean and Kofi Osei-Frimpong. 2019. Hey Alexa: examine the variables influencing the use of artificial intelligent in-home voice assistants. Computers in Human Behavior 99 (2019), 28 – 37.
[35]
Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit Roy Choudhury. 2018. Inaudible Voice Commands: The Long-Range Attack and Defense. In USENIX Symposium on Networked Systems Design and Implementation (NSDI). 547–560.
[36]
Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa. 2019. Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. In Network and Distributed System Security Symposium (NDSS).
[37]
Faysal Shezan, Hang Hu, Jiamin Wang, Gang Wang, and Yuan Tian. 2020. Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems. In Proceedings of The Web Conference (WWW).
[38]
R. Slavin, X. Wang, M. B. Hosseini, J. Hester, R. Krishnan, J. Bhatia, T. D. Breaux, and J. Niu. 2016. Toward a Framework for Detecting Privacy Policy Violations in Android Application Code. In 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE). 25–36.
[39]
Maurice E. Stucke and Ariel Ezrachi. 2017. How Digital Assistants Can Harm our Economy, Privacy, and Democracy. Berkeley Technology Law Journal 32, 3 (2017), 1240–1299.
[40]
Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. 2015. Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition. In 9th USENIX Workshop on Offensive Technologies (WOOT 15).
[41]
X. Wang, X. Qin, M. Bokaei Hosseini, R. Slavin, T. D. Breaux, and J. Niu. 2018. GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications. In 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE). 37–47.
[42]
Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, and Ning Zhang. 2020. SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Wave. In Network and Distributed Systems Security (NDSS) Symposium.
[43]
L. Yu, X. Luo, X. Liu, and T. Zhang. 2016. Can We Trust the Privacy Policies of Android Apps?. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 538–549.
[44]
Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, XiaoFeng Wang, and Carl A. Gunter. 2018. Commandersong: A Systematic Approach for Practical Adversarial Voice Recognition. In USENIX Security Symposium (USENIX Security). 49–64.
[45]
Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In USENIX Conference on Usable Privacy and Security (SOUPS). 65–80.
[46]
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. 2017. DolphinAttack: Inaudible Voice Commands. In ACM SIGSAC Conference on Computer and Communications Security (CCS). 103–117.
[47]
Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, and Feng Qian. 2019. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. In IEEE Symposium on Security and Privacy (SP).
[48]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact.(2018).
[49]
Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel Reidenberg, N. Russell, and Norman Sadeh. 2019. MAPS: Scaling Privacy Compliance Analysis to a Million Apps. Proceedings on Privacy Enhancing Technologies 2019 (07 2019), 66–86.
[50]
Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shormir Wilson, Norman Sadeh, Steven M. Bellovin, and Joel Reidenberg. 2017. Automated Analysis of Privacy Requirements for Mobile Apps. In 24th Network & Distributed System Security Symposium (NDSS 2017).

Cited By

View all
  • (2024)Human Factor on Artificial Intelligence: The Way to Ethical and Responsible Economic GrowthInnovation - Research and Development for Human, Economic and Institutional Growth10.5772/intechopen.111915Online publication date: 13-Mar-2024
  • (2024)Voice app developer experiences with alexa and google assistantProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699182(5035-5052)Online publication date: 14-Aug-2024
  • (2024)Enhancing Alexa Skill Testing Through Improved Utterance DiscoveryACM Transactions on Internet Technology10.1145/369820024:4(1-25)Online publication date: 18-Nov-2024
  • Show More Cited By

Index Terms

  1. Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          ACSAC '20: Proceedings of the 36th Annual Computer Security Applications Conference
          December 2020
          962 pages
          ISBN:9781450388580
          DOI:10.1145/3427228
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 08 December 2020

          Permissions

          Request permissions for this article.

          Check for updates

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Funding Sources

          Conference

          ACSAC '20

          Acceptance Rates

          Overall Acceptance Rate 104 of 497 submissions, 21%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)193
          • Downloads (Last 6 weeks)16
          Reflects downloads up to 12 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Human Factor on Artificial Intelligence: The Way to Ethical and Responsible Economic GrowthInnovation - Research and Development for Human, Economic and Institutional Growth10.5772/intechopen.111915Online publication date: 13-Mar-2024
          • (2024)Voice app developer experiences with alexa and google assistantProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699182(5035-5052)Online publication date: 14-Aug-2024
          • (2024)Enhancing Alexa Skill Testing Through Improved Utterance DiscoveryACM Transactions on Internet Technology10.1145/369820024:4(1-25)Online publication date: 18-Nov-2024
          • (2024)A First Look at Security and Privacy Risks in the RapidAPI EcosystemProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690294(1626-1640)Online publication date: 2-Dec-2024
          • (2024)Alexa, is the skill always safe? Uncover Lenient Skill Vetting Process and Protect User Privacy at Run TimeProceedings of the 46th International Conference on Software Engineering: Software Engineering in Society10.1145/3639475.3640102(34-45)Online publication date: 14-Apr-2024
          • (2024)Healthcare Voice AI Assistants: Factors Influencing Trust and Intention to UseProceedings of the ACM on Human-Computer Interaction10.1145/36373398:CSCW1(1-37)Online publication date: 26-Apr-2024
          • (2024)Command Hijacking on Voice-Controlled IoT in Amazon Alexa PlatformProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657010(654-666)Online publication date: 1-Jul-2024
          • (2024)An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy PerspectivesProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3639082(1-13)Online publication date: 20-May-2024
          • (2024)Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European MarketplacesProceedings of the ACM Web Conference 202410.1145/3589334.3645409(1081-1091)Online publication date: 13-May-2024
          • (2024)SoK: Technical Implementation and Human Impact of Internet Privacy Regulations2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00206(673-696)Online publication date: 19-May-2024
          • Show More Cited By

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media