Learn about a groundbreaking security research presentation that explores vulnerabilities in VPN-protected smart home speakers through voice command fingerprinting techniques. Discover how researchers Xiaoguang Guo, Keyang Yu, Qi Li, and Dong Chen demonstrate methods for identifying specific voice commands even when transmitted through encrypted VPN connections, raising important privacy and security concerns for smart home device users. Examine the technical analysis and implications of this attack vector presented at an ACM conference, providing valuable insights for security professionals, IoT developers, and privacy-conscious consumers.
VoiceAttack: Fingerprinting Voice Commands on VPN-Protected Smart Home Speakers
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
VoiceAttack
Taught by
Association for Computing Machinery (ACM)