Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

Are you (Google) Home? Detecting Users Presence through Traffic Analysis of Smart Speakers

Conference Paper
Publication Date:
2020
abstract:
Smart speakers and voice-based virtual assistants are core building blocks of modern smart homes. For instance, they are used to retrieve information, interact with other devices, and command a variety of Internet of Things (IoT) nodes. To this aim, smart speakers and voice-based assistants typically take advantage of cloud architectures: vocal commands of the user are sampled, sent through the Internet to be processed and trans- mitted back for local execution, e.g., to perform an automation task or activate an IoT device. Even if privacy and security is enforced by means of encryption, features of the traffic, such as the throughput, the size of protocol data units or the IP addresses, can leak important information about the habits of the users as well as the number and the type of IoT nodes deployed. In this perspective, the paper showcases risks of machine learning techniques to develop black-box models to automatically classify traffic and implement privacy leaking attacks. We prove that such traffic analysis allows to detect the presence of a person in a house equipped with a Google Home device, even if the same person does not interact with the smart device. Experimental results collected in a realistic scenario are presented and possible countermeasures are discussed.
Iris type:
04.01 Contributo in Atti di convegno
Keywords:
traffic analysis; machine learning; privacy; de-anonymization attacks; network security
List of contributors:
Caviglione, Luca; Ranieri, Andrea
Authors of the University:
CAVIGLIONE LUCA
RANIERI ANDREA
Handle:
https://iris.cnr.it/handle/20.500.14243/370968
Book title:
Proceedings of the Fourth Italian Conference on Cyber Security
Published in:
CEUR WORKSHOP PROCEEDINGS
Series
  • Overview

Overview

URL

http://ceur-ws.org/Vol-2597/
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)