surfingattack interactive hidden attack on voice
play

SurfingAttack: Interactive Hidden Attack on Voice Assistants Using - PowerPoint PPT Presentation

SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves Qiben Yan 1 , Kehai Liu 2 , Qin Zhou 2 Hanqing Guo 1 , Ning Zhang 3 1 Michigan State University, 2 University of Nebraska-Lincoln, 3 Washington University


  1. SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves Qiben Yan 1 , Kehai Liu 2 , Qin Zhou 2 Hanqing Guo 1 , Ning Zhang 3 1 Michigan State University, 2 University of Nebraska-Lincoln, 3 Washington University in St. Louis

  2. Voice Assistants Read my message Take a selfie Calling Sam Send a message to Sam Open my garage door 1

  3. They are not safe!

  4. Over-the-air Inaudible Attack Yes, how can I help you? Amp f Input Diaphragm Amplifier Low Pass filter ADC [1] Backdoor: Making microphones hear inaudible sounds. Roy, N. et al., MobiSys 2017. [2] Dolphinattack: Inaudible voice commands. Zhang, G. et al., CCS 2017. [3] Inaudible voice commands: The long-range attack and defense. Roy, N., et al. NDSI 2018.

  5. Over-the-air Inaudible Attack Ideally ! !" Amp " # ! !" " # ! !" + " $ ! $!" + ⋯ ! !" Actually f Input Diaphragm Amplifier Low Pass filter ADC % %& = '()* ' + '()* ( % (%& = + ,-.2* ' + 0 ,-.2* ( + 1 ,-. * ' + * ( + 2 ,-. 3 # − 3 $ How about Inaudible Attack through other media? Audible Inaudible Amplitude (F 1 -F 2 ) F 2 F 1 Microphone filter 10k 20k 30k 40k 50k 60k 70k 80k Frequency 4 Courtesy: modified image from “Inaudible voice commands: The long-range attack and defense”

  6. Inaudible Attack through other media ( a table )

  7. Typical Attack Setup Laptop Cubicle Device Panel Ultrasonic Guided Wave Table PZT transducer Solid Materials as transmission media! 6

  8. SurfingAttack: Surfing Waves in Materials None Line of Sight Attack multiple Long Range & devices Attack simultaneously Omni-directional

  9. SurfingAttack: Hidden Interactive Attack Attack transducer and waveform generator are hidden under the desk 8

  10. 9

  11. How it works?

  12. Ultrasonic Guided Waves: Lamb Waves Guided Wave Probe Sound wave dispersion Wave modes Material-dependent propagation 11

  13. Attack Wave Selection Narrowband input Low Ultrasonic guided Low signals wave dispersion attenuation High attack Circular Easy signal Lower-order Lamb excitability piezoelectric disc reachability wave modes (A 0 ) (PZT) 12

  14. Attack Wave Generation • Goal: Preserve the similarity between the recovered voice signal and the original voice signal: Original ! " = 1 + & ∗ ( " ∗ ) " ∗ cos(2/0 5 ") OK, Google Depth of Central Tukey Baseband modulation O…, oogle Without Frequency Window Signal 0.8~1.0 Window With • Optimize the central frequency, modulation depth, and OK, Google Window cosine fraction of Tukey Window by measuring the nonlinearity responses. 13

  15. Triggering Non-linearity Effect MEMS microphone Smartphone Table PZT transducer Recorded Voice Signal Baseband Voice Signal 2 nd harmonic 1 st harmonic Baseband signal modulated to 25.3 kHz carrier/central frequency. 14

  16. Attack System Design Attack Device Controller Package Voice Response Voice Recording Signal Modulation Tapping Device & Voice Recording Signal Voice TTS Speech Processor Commands Module Synthesis Transducer Interactive Voice Commands 15

  17. Calling Sam OK Google, Turn Volume to 3 OK Google, Turn Volume to 3 Read my messages Call Sam with speakerphone OK, calling Sam with speakerphone Multi-round conversation to steal financial, trade secret, etc. Fraud call using synthetic voice of Alice Sam Hi, Alice. You have one text message. It’s from 347268, do you want to hear it? Hi, Sam, I forgot the new access code of the lab, can you tell me? Sure Sam Sure, it is 2501. It says …, do you want to reply, repeat it and just that for now? OK, thanks. Cancel Sam You are welcome. Cancelled

  18. Feasibility Across Different Smartphones Manufacture Model Assistants Attack Attacks Frequency Recording Activation Recognition Pixel Google Google 27-28 KHz 1, 2, 3 G5 Google 27.0 KHz Moto Z4 Google 28.2 KHz Galaxy S7 Google 25.8 KHz SurfingAttack succeeds on 15 out of 17 smartphones! Galaxy S9 Google 26.5 KHz Samsung Galaxy Google X Note 10+ Xiaomi Mi 5, 8 Google 25-28 KHz Mate 9 Google X Huawei Honor 10 Google 27.7 KHz iPhone 5, Apple Siri 26-27 KHz 5s, 6+, X

  19. Evaluation: Impact Analysis of Factors • Noise and Verbal Conversations • Directionality • Attack Distance • Table Materials • Lock Screen • Table Thicknesses • Interlayers on the Table • Phone Cases 18

  20. Evaluation: Attack Distance 400 Achievable attack distance (cm) Reaching 30 feet (900cm+) 300 Saving attack power by 87% 200 100 0 0 0.2 0.4 0.6 0.8 GWBP-AMP-X75 Power Amplifier Attack power (Watt) • Maximum output power of 1.5W (output voltage of 30V) SurfingAttack attack distance reaches 30ft with 0.8W attack power. In comparison, over-air speaker array reaches 30ft with 6W attack power [1] . [1] Roy, N., Shen, S., Hassanieh, H., & Choudhury, R. R. (2018). Inaudible voice commands: The long-range attack and defense. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18).

  21. Evaluation: Impact of Table Materials Impedance mismatch Aluminum Steel Metal Glass (2.54 MDF (5 Rough Metal Sheet (0.8 mm) mm) polyethylene Sheet (0.3 mm) plastic (5 mm) mm) Xiaomi Mi 5 910+ cm 95+ cm 85+ cm 50cm X Google Pixel 910+ cm 95+ cm 85+ cm 45cm X Samsung 910+ cm 95+ cm 85+ cm 48cm X Galaxy S7 The best energy delivery can be achieved when the table material is the same as the device body material. Porous structure absorbs ultrasound. 20

  22. Evaluation: Lock Screen The attack works on Voice Assistants even if the device is locked, if we enable voice assistants on the lock screen.

  23. How to defend?

  24. Countermeasure I • Keep an eye on your devices. • Reduce the touching surface area of your phones with the table. • Place the device on a soft woven fabric before touching the tabletops. • Use thicker phone cases made of uncommon materials such as wood. • Disable your Voice Assistant on lock screen and lock your device. 23

  25. Countermeasure II • Software-based Defense • Difference between recovered signal and the baseband signal in spectrogram (10 – 20 kHz) Recorded Normal Voice Recorded Attack Signal 24

  26. 25

  27. Can We Attack Standing Voice Assistants? Power Loss Power Loss Further increasing the power of ultrasound signals: the guided waves can be converted into in-air ultrasound signals.

  28. Conclusion 1. Explore the feasibility of launching inaudible ultrasonic attack leveraging ultrasonic guided waves through solid materials 2. Enable conversations between the adversary and the voice controllable device 3. SurfingAttack successfully attacks 15 popular smartphones on different solid materials and achieves 30ft long-range attack through a metal table with a low power profile. Visit https://surfingattack.github.io/ for more information 27

  29. We are recruiting graduate students! 28

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend