• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Monday, July 28, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

Hey, Alexa, who else is listening right now?

Bioengineer by Bioengineer
April 28, 2020
in Science News
Reading Time: 3 mins read
0
ADVERTISEMENT
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

UC to use NSF grant to explore smart speaker security

IMAGE

Credit: UC

Voice-activated speakers like Amazon’s Alexa, Apple’s Siri and Google Home are becoming ubiquitous in homes, cars and offices.

These digital assistants make it easy to get travel directions, find a restaurant’s phone number or do a myriad of other daily hands-free tasks. These devices can adjust a home’s heating or air conditioning, open locked doors remotely or link to security cameras or baby monitors.

But computer scientists at the University of Cincinnati are investigating potential security weaknesses that hackers could exploit.

“We have millions of smart speakers in our homes these days,” said Boyang Wang, assistant professor in UC’s College of Engineering and Applied Science.

“People use them every day. It’s convenient. On the other hand, we don’t have a good understanding of the vulnerabilities they have.”

Wang was awarded a two-year National Science Foundation grant for $175,000 to investigate one particular gap that malicious actors could exploit in smart speakers.

“This technology is relatively new. Everyone has the devices, but there hasn’t been a lot of research to understand the privacy issues,” Wang said.

Wang is an expert in applied cryptography and teaches network security, data security and privacy. He holds several patents on encrypted data and has published extensively on the topic.

In UC’s Department of Electrical Engineering and Computer Science, Wang and his students are investigating ways hackers could exploit the devices and potentially steal financial or personal information stored online.

They presented some of their findings last year at the Institute of Electrical and Electronics Engineers’ annual conference on communications and network security.

The UC researchers examined a new passive attack on home speakers, called “voice command fingerprinting,” in which hackers can eavesdrop on data transferred between the smart speaker and the cloud server to learn what questions or commands the user gives the device.

Using machine-learning algorithms, they calculated that with this information alone hackers could correctly infer about one-third of voice commands by eavesdropping on the encrypted network packets the device sends to and receives from the cloud.

How do they do it?

UC graduate Sean Kennedy and his co-authors built 1,000 traces on an Amazon Echo for 100 common voice commands. The information sent to the cloud each time you ask Alexa for the weather are encrypted. But this data, called a network packet, from each voice command includes predictable traffic patterns like a digital fingerprint, Kennedy said.

“If someone is asking for the weather, that doesn’t reveal a lot,” Kennedy said. “But if you were able to string together other things someone asks a smart speaker, you could use that to do something else like open a garage door.”

Knowing what questions or commands people give can establish a pattern that someone could exploit, Kennedy said.

“You could imagine a scenario where you would know when someone was leaving their house,” Kennedy said.

Kennedy graduated with a master’s degree last year. Now he conducts research for Fortune 500 company Leidos at the Air Force Research Lab at Wright-Patterson Air Force Base.

UC researchers found that knowing the size of the encrypted packets alone could help them correctly infer what the user is asking 33% of the time. Wang said their latest study this year using deep  learning can improve this predictive accuracy by 81 percent. Pretty sneaky.

Wang said one solution is to disguise these packets by artificially padding all of them with extra harmless but useless data. It’s a solution that works well to fool the eavesdroppers, except it creates considerable lag in response time. And nobody wants that, he said.

With the increasing reliance on the internet to manage everything from what’s in your refrigerator to what time your alarm clock goes off, security is paramount, Wang said.

Perhaps tellingly, while Wang keeps six or seven smart speakers to study in his UC lab, he doesn’t take any home.

“The intentions are good: to provide more services to users to make our lives easier and more convenient,” he said. “But from a security and privacy perspective, since we have more devices that are connected, it introduces more challenges and more vulnerabilities.”

###

Media Contact
Michael Miller
[email protected]

Original Source

https://www.uc.edu/news/articles/2020/04/n20909948.html

Tags: Computer ScienceHardwareInternetResearch/DevelopmentSoftware EngineeringSystem Security/HackersTechnology/Engineering/Computer Science
Share12Tweet8Share2ShareShareShare2

Related Posts

Decoding FLS2 Unveils Broad Pathogen Detection Principles

Decoding FLS2 Unveils Broad Pathogen Detection Principles

July 28, 2025
blank

Advanced Pressure-Velocity Patch Enhances Flight Detection

July 27, 2025

Durable, Flexible Electrochemical Transistors via Electropolymerized PEDOT

July 26, 2025

Challenges and Opportunities in High-Filled Polymer Manufacturing

July 26, 2025
Please login to join discussion

POPULAR NEWS

  • Blind to the Burn

    Overlooked Dangers: Debunking Common Myths About Skin Cancer Risk in the U.S.

    53 shares
    Share 21 Tweet 13
  • USF Research Unveils AI Technology for Detecting Early PTSD Indicators in Youth Through Facial Analysis

    42 shares
    Share 17 Tweet 11
  • Dr. Miriam Merad Honored with French Knighthood for Groundbreaking Contributions to Science and Medicine

    45 shares
    Share 18 Tweet 11
  • Engineered Cellular Communication Enhances CAR-T Therapy Effectiveness Against Glioblastoma

    35 shares
    Share 14 Tweet 9

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Decoding FLS2 Unveils Broad Pathogen Detection Principles

Advanced Pressure-Velocity Patch Enhances Flight Detection

Durable, Flexible Electrochemical Transistors via Electropolymerized PEDOT

  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.