BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Abstract
Supplementary Material
- Download
- 295.26 MB
References
Index Terms
- BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Recommendations
IUAC: Inaudible Universal Adversarial Attacks Against Smart Speakers
Intelligent voice systems are widely utilized to control smart home applications, which raises significant privacy and security concerns. Recent studies have revealed their vulnerability to adversarial attacks, replay attacks, etc. However, these attacks ...
Defining code-injection attacks
POPL '12: Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languagesThis paper shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) are flawed. The flaws make it possible for attackers to circumvent existing mechanisms, by supplying code-injecting inputs that are not recognized as ...
Defining code-injection attacks
POPL '12This paper shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) are flawed. The flaws make it possible for attackers to circumvent existing mechanisms, by supplying code-injecting inputs that are not recognized as ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Ioana Boureanu,
- Steve Schneider,
- Program Chairs:
- Bradley Reaves,
- Nils Ole Tippenhauer
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 212Total Downloads
- Downloads (Last 12 months)175
- Downloads (Last 6 weeks)19
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in