Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

被引:8
|
作者
Abdullah, Hadi [1 ]
Garcia, Washington [1 ]
Peeters, Christian [1 ]
Traynor, Patrick [1 ]
Butler, Kevin R. B. [1 ]
Wilson, Joseph [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
基金
美国国家科学基金会;
关键词
ATTENTION;
D O I
10.14722/ndss.2019.23362
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voice Processing Systems (VPSes), now widely deployed, have been made significantly more accurate through the application of recent advances in machine learning. However, adversarial machine learning has similarly advanced and has been used to demonstrate that VPSes are vulnerable to the injection of hidden commands - audio obscured by noise that is correctly recognized by a VPS but not by human beings. Such attacks, though, are often highly dependent on white-box knowledge of a specific machine learning model and limited to specific microphones and speakers, making their use across different acoustic hardware platforms (and thus their practicality) limited. In this paper, we break these dependencies and make hidden command attacks more practical through model-agnostic (black-box) attacks, which exploit knowledge of the signal processing algorithms commonly used by VPSes to generate the data fed into machine learning systems. Specifically, we exploit the fact that multiple source audio samples have similar feature vectors when transformed by acoustic feature extraction algorithms (e.g., FFTs). We develop four classes of perturbations that create unintelligible audio and test them against 12 machine learning models, including 7 proprietary models (e.g., Google Speech API, Bing Speech API, IBM Speech API, Azure Speaker API, etc), and demonstrate successful attacks against all targets. Moreover, we successfully use our maliciously generated audio samples in multiple hardware configurations, demonstrating effectiveness across both models and real systems. In so doing, we demonstrate that domain-specific knowledge of audio signal processing represents a practical means of generating successful hidden voice command attacks.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Practical Adversarial Attacks Against Speaker Recognition Systems
    Li, Zhuohang
    Shi, Cong
    Xie, Yi
    Liu, Jian
    Yuan, Bo
    Chen, Yingying
    PROCEEDINGS OF THE 21ST INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (HOTMOBILE'20), 2020, : 9 - 14
  • [2] Vulnerability of Speaker Verification Systems Against Voice Conversion Spoofing Attacks: the Case of Telephone Speech
    Kinnunen, Tomi
    Wu, Zhi-Zheng
    Lee, Kong Aik
    Sedlak, Filip
    Chng, Eng Siong
    Li, Haizhou
    2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 4401 - 4404
  • [3] Representation Learning to Classify and Detect Adversarial Attacks against Speaker and Speech Recognition Systems
    Villalba, Jesus
    Joshi, Sonal
    Zelasko, Piotr
    Dehak, Najim
    INTERSPEECH 2021, 2021, : 4304 - 4308
  • [4] Your Voice is Not Yours? Black-Box Adversarial Attacks Against Speaker Recognition Systems
    Ye, Jianbin
    Lin, Fuqiang
    Liu, Xiaoyuan
    Liu, Bo
    2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 692 - 699
  • [5] Backdoor Attacks against Voice Recognition Systems: A Survey
    Yan, Baochen
    Lan, Jiahe
    Yan, Zheng
    ACM COMPUTING SURVEYS, 2025, 57 (03)
  • [6] Speaker Independent Sinhala Speech Recognition for Voice Dialling
    Amarasingh, W. G. T. N.
    Gamini, D. D. A.
    INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER2012), 2012, : 3 - 6
  • [7] Fuzzy hidden Markov models for speech and speaker recognition
    Tran, D
    Wagner, M
    18TH INTERNATIONAL CONFERENCE OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY - NAFIPS, 1999, : 426 - 430
  • [8] Fuzzy hidden Markov models for speech and speaker recognition
    Tran, Dat
    Wagner, Michael
    Annual Conference of the North American Fuzzy Information Processing Society - NAFIPS, 1999, : 426 - 430
  • [9] Speaker Authentication System Based on Voice Biometrics and Speech Recognition
    Dovydaitis, Laurynas
    Rasymas, Tomas
    Rudzionis, Vytautas
    BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2016, 2017, 263 : 79 - 84
  • [10] Speaker clustering and transformation for speaker adaptation in speech recognition systems
    Padmanabhan, M
    Bahl, LR
    Nahamoo, D
    Picheny, MA
    IEEE TRANSACTIONS ON SPEECH AND AUDIO PROCESSING, 1998, 6 (01): : 71 - 77