Visible to the public 2MA: Verifying Voice Commands via Two Microphone Authentication

Title2MA: Verifying Voice Commands via Two Microphone Authentication
Publication TypeConference Paper
Year of Publication2018
AuthorsBlue, Logan, Abdullah, Hadi, Vargas, Luis, Traynor, Patrick
Conference NameProceedings of the 2018 on Asia Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5576-6
Keywordsauthentication, command injection attacks, composability, Internet of Things, Metrics, pubcrawl, Resiliency
AbstractVoice controlled interfaces have vastly improved the usability of many devices (e.g., headless IoT systems). Unfortunately, the lack of authentication for these interfaces has also introduced command injection vulnerabilities - whether via compromised IoT devices, television ads or simply malicious nearby neighbors, causing such devices to perform unauthenticated sensitive commands is relatively easy. We address these weaknesses with Two Microphone Authentication (2MA), which takes advantage of the presence of multiple ambient and personal devices operating in the same area. We develop an embodiment of 2MA that combines approximate localization through Direction of Arrival (DOA) techniques with Robust Audio Hashes (RSHs). Our results show that our 2MA system can localize a source to within a narrow physical cone (\$\textbackslashtextless30^\textbackslashtextbackslashcirc \$) with zero false positives, eliminate replay attacks and prevent the injection of inaudible/hidden commands. As such, we dramatically increase the difficulty for an adversary to carry out such attacks and demonstrate that 2MA is an effective means of authenticating and localizing voice commands.
URLhttp://doi.acm.org/10.1145/3196494.3196545
DOI10.1145/3196494.3196545
Citation Keyblue_2ma:_2018