hidden voice commands
play

Hidden Voice Commands Nicholas Carlini*, Pratyush Mishra*, Tavish - PowerPoint PPT Presentation

Hidden Voice Commands Nicholas Carlini*, Pratyush Mishra*, Tavish Vaidya**, Yuankai Zhang**, Micah Sherr**, Clay Shields**, David Wagner*, Wenchao Zhou** * University of California, Berkeley ** Georgetown University Voice channel opens up new


  1. Hidden Voice Commands Nicholas Carlini*, Pratyush Mishra*, Tavish Vaidya**, Yuankai Zhang**, Micah Sherr**, Clay Shields**, David Wagner*, Wenchao Zhou** * University of California, Berkeley ** Georgetown University

  2. Voice channel opens up new 
 possibilities for attack

  3. Today: "Okay google, text [premium SMS number]"

  4. In the future? "Okay google, pay John $100"

  5. We make voice commands stealthy.

  6. We produce audio which is noise to humans, but speech to devices.

  7. This is an instance of attacks 
 on Machine Learning

  8. Background

  9. Background Machine Learning Text Algorithm

  10. Background Feature ML Text Extraction Algorithm

  11. Feature Extraction

  12. Feature Extraction

  13. Feature Extraction

  14. Feature Extraction MFCC [x 0 ] MFCC [x 1 ] MFCC [x 2 ]

  15. Feature ML Text Extraction Algorithm

  16. First Attack: White-Box Assume complete system knowledge 
 (model, parameters, etc)

  17. Recognition Feature ML Text Extraction Algorithm

  18. Attack Feature ML Text Extraction Algorithm

  19. Attack Feature ML Text Extraction Algorithm

  20. Attack Feature ML Text Extraction Algorithm

  21. Inverting Feature Extraction MFCC -1 [x 0 ] MFCC -1 [x 1 ] MFCC -1 [x 2 ]

  22. Inverting Feature Extraction MFCC -1 [x 0 ] MFCC -1 [x 1 ] MFCC -1 [x 2 ]

  23. Inverting Feature Extraction MFCC -1 [x 0 ]

  24. Inverting Feature Extraction MFCC -1 [x 0 ] MFCC -1 [x 1 ]

  25. Inverting Feature Extraction MFCC -1 [x 0 ] MFCC -1 [x 1 ]

  26. Inverting Feature Extraction MFCC -1 [x 0 ] MFCC -1 [x 1 ] MFCC -1 [x 2 ]

  27. Inverting Feature Extraction MFCC -1 [x 0 ] MFCC -1 [x 1 ] MFCC -1 [x 2 ]

  28. Actually not that easy

  29. Playing attacks over-the-air 1. Create a model of the physical channel 2. Use model to predict effect of over-the-air 3. Validate model by playing potential obfuscated commands during generation

  30. Demo

  31. Demo

  32. Okay Google, take a picture

  33. Demo

  34. Okay Google, text 12345

  35. Demo

  36. Okay Google, browse to evil.com

  37. Not Over-The-Air Demo

  38. Okay Google, browse to evil.com

  39. Limitations No background noise, in an echo-free room. Assumes complete knowledge of model.

  40. Can we make this attack practical? Can we remove the white-box assumption?

  41. Yes. ... but at the expense of attack quality.

  42. Black-Box Attack Audio Speech Text Obfuscater Recognition

  43. Black-Box Attack MFCC Speech Text MFCC -1 Recognition

  44. Evaluation

  45. Demo

  46. White-Box Black-Box Attack on open system Practical real-world attack Commands heavily obfuscated Somewhat possible to recognize Works when played over-the-air Works when played over-the-air Doesn't tolerate background noise Background noise and echo okay

  47. Defenses? Notify the user that an action was taken. Challenge the user to perform an action. Detect and prevent the malicious commands.

  48. Detect and Prevent Successfully trained simple machine learning classifier: learn the difference between attack commands and actual commands

  49. Conclusion Voice: new paradigm for human-device interaction. This brings many new risks. Our hidden voice commands are practical. The impact of these attacks will increase. Future work is needed to construct defenses. http://hiddenvoicecommands.com/

Recommend


More recommend