{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:07:34Z","timestamp":1743012454480},"reference-count":32,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"4","license":[{"start":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T00:00:00Z","timestamp":1597622400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,1]]},"abstract":"Abstract<\/jats:title>\n Internet-connected voice-controlled speakers, also known as smart speakers<\/jats:italic>, are increasingly popular due to their convenience for everyday tasks such as asking about the weather forecast or playing music. However, such convenience comes with privacy risks: smart speakers need to constantly listen in order to activate when the \u201cwake word\u201d is spoken, and are known to transmit audio from their environment and record it on cloud servers. In particular, this paper focuses on the privacy risk from smart speaker misactivations<\/jats:italic>, i.e.<\/jats:italic>, when they activate, transmit, and\/or record audio from their environment when the wake word is not<\/jats:italic> spoken. To enable repeatable, scalable experiments for exposing smart speakers to conversations that do not contain wake words, we turn to playing audio from popular TV shows from diverse genres. After playing two rounds of 134 hours of content from 12 TV shows near popular smart speakers in both the US and in the UK, we observed cases of 0.95 misactivations per hour, or 1.43 times for every 10,000 words spoken, with some devices having 10% of their misactivation durations lasting at least 10 seconds. We characterize the sources of such misactivations and their implications for consumers, and discuss potential mitigations.<\/jats:p>","DOI":"10.2478\/popets-2020-0072","type":"journal-article","created":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T14:43:25Z","timestamp":1598625805000},"page":"255-276","source":"Crossref","is-referenced-by-count":35,"title":["When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers"],"prefix":"10.56553","volume":"2020","author":[{"given":"Daniel J.","family":"Dubois","sequence":"first","affiliation":[{"name":"Northeastern University"}]},{"given":"Roman","family":"Kolcun","sequence":"additional","affiliation":[{"name":"Imperial College London"}]},{"given":"Anna Maria","family":"Mandalari","sequence":"additional","affiliation":[{"name":"Imperial College London"}]},{"given":"Muhammad Talha","family":"Paracha","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"David","family":"Choffnes","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Hamed","family":"Haddadi","sequence":"additional","affiliation":[{"name":"Imperial College London"}]}],"member":"35752","published-online":{"date-parts":[[2020,8,17]]},"reference":[{"key":"2022042709191608019_j_popets-2020-0072_ref_001_w2aab3b7c28b1b6b1ab1ab1Aa","unstructured":"[1] Amazon, Alexa voice assistant. Accessed on 02\/28\/2020, https:\/\/en.wikipedia.org\/wiki\/Amazon_Alexa."},{"key":"2022042709191608019_j_popets-2020-0072_ref_002_w2aab3b7c28b1b6b1ab1ab2Aa","unstructured":"[2] Google, Google Assistant. Accessed on 02\/28\/2020, https:\/\/assistant.google.com."},{"key":"2022042709191608019_j_popets-2020-0072_ref_003_w2aab3b7c28b1b6b1ab1ab3Aa","unstructured":"[3] Apple, Siri voice assistant. Accessed on 02\/28\/2020, https:\/\/www.apple.com\/siri\/."},{"key":"2022042709191608019_j_popets-2020-0072_ref_004_w2aab3b7c28b1b6b1ab1ab4Aa","unstructured":"[4] Cortana, Cortana voice assistant. Accessed on 02\/28\/2020, https:\/\/www.microsoft.com\/windows\/cortana."},{"key":"2022042709191608019_j_popets-2020-0072_ref_005_w2aab3b7c28b1b6b1ab1ab5Aa","unstructured":"[5] Forrester, Smart Home Devices Forecast, 2017 To 2022 (US). Accessed on 02\/28\/2020, https:\/\/www.forrester.com\/report\/Forrester+Data+Smart+Home+Devices+Forecast+2017+To+2022+US\/-\/E-RES140374."},{"key":"2022042709191608019_j_popets-2020-0072_ref_006_w2aab3b7c28b1b6b1ab1ab6Aa","unstructured":"[6] Artem Russakovskii, Google is permanently nerfing all Home Minis because mine spied on everything I said 24\/7. Accessed on 02\/28\/2020, https:\/\/www.androidpolice.com\/2017\/10\/10\/google-nerfing-home-minis-mine-spiedeverything-said-247\/."},{"key":"2022042709191608019_j_popets-2020-0072_ref_007_w2aab3b7c28b1b6b1ab1ab7Aa","unstructured":"[7] VRT NWS, Google employees are eavesdropping, even in your living room. Accessed on 02\/28\/2020, https:\/\/www.vrt.be\/vrtnws\/en\/2019\/07\/10\/google-employeesare-eavesdropping-even-in-flemish-living-rooms\/."},{"key":"2022042709191608019_j_popets-2020-0072_ref_008_w2aab3b7c28b1b6b1ab1ab8Aa","unstructured":"[8] G. Fowler, Alexa has been eavesdropping on you this whole time. Accessed on 02\/28\/2020, https:\/\/www.washingtonpost.com\/technology\/2019\/05\/06\/alexa-hasbeen-eavesdropping-you-this-whole-time\/."},{"key":"2022042709191608019_j_popets-2020-0072_ref_009_w2aab3b7c28b1b6b1ab1ab9Aa","unstructured":"[9] Amazon, Alexa Cloud Documentation. Accessed on 02\/28\/2020, https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=GHXNJNLTRWCTBBGW."},{"key":"2022042709191608019_j_popets-2020-0072_ref_010_w2aab3b7c28b1b6b1ab1ac10Aa","unstructured":"[10] Google, Google Cloud Documentation. Accessed on 02\/28\/2020, https:\/\/support.google.com\/websearch\/answer\/6030020?co=GENIE.Platform%3DDesktop&hl=en."},{"key":"2022042709191608019_j_popets-2020-0072_ref_011_w2aab3b7c28b1b6b1ab1ac11Aa","doi-asserted-by":"crossref","unstructured":"[11] Y. Chen, H. Li, S.-Y. Teng, S. Nagels, Z. Li, P. Lopes, B. Zhao, and H. Zheng, \u201cWearable Microphone Jamming,\u201d in Conference on Human Factors in Computing Systems 2020 (CHI \u201920), 2020.10.1145\/3313831.3376304","DOI":"10.1145\/3313831.3376304"},{"key":"2022042709191608019_j_popets-2020-0072_ref_012_w2aab3b7c28b1b6b1ab1ac12Aa","unstructured":"[12] KITT.AI, Snowboy, a hotword detection engine. Accessed on 02\/28\/2020, http:\/\/www.ilga.gov\/legislation\/ilcs\/ilcs3.asp?ActID=3004&ChapterID=57.10.1055\/a-1088-4912"},{"key":"2022042709191608019_j_popets-2020-0072_ref_013_w2aab3b7c28b1b6b1ab1ac13Aa","unstructured":"[13] EU Parliament, General Data Protection Regulation (GDPR). Accessed on 02\/28\/2020, https:\/\/gdpr-info.eu\/."},{"key":"2022042709191608019_j_popets-2020-0072_ref_014_w2aab3b7c28b1b6b1ab1ac14Aa","unstructured":"[14] Illinois General Assembly, Biometric Information Privacy Act (BIPA). Accessed on 02\/28\/2020, http:\/\/www.ilga.gov\/legislation\/ilcs\/ilcs3.asp?ActID=3004&ChapterID=57."},{"key":"2022042709191608019_j_popets-2020-0072_ref_015_w2aab3b7c28b1b6b1ab1ac15Aa","doi-asserted-by":"crossref","unstructured":"[15] E. Pan, J. Ren, M. Lindorfer, C. Wilson, and D. R. Choffnes, \u201cPanoptispy: Characterizing Audio and Video Exfiltration from Android Applications,\u201d in Privacy Enhancing Technologies Symposium (PETs \u201918), 2018.10.1515\/popets-2018-0030","DOI":"10.1515\/popets-2018-0030"},{"key":"2022042709191608019_j_popets-2020-0072_ref_016_w2aab3b7c28b1b6b1ab1ac16Aa","doi-asserted-by":"crossref","unstructured":"[16] A. Mhaidli, M. Venkatesh, Y. Zou, and F. Schaub, \u201cListen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls,\u201d in Privacy Enhancing Technologies Symposium (PETs \u201920, 2020.10.2478\/popets-2020-0026","DOI":"10.2478\/popets-2020-0026"},{"key":"2022042709191608019_j_popets-2020-0072_ref_017_w2aab3b7c28b1b6b1ab1ac17Aa","unstructured":"[17] B. Karmann, Project Alias. Accessed on 02\/28\/2020, https:\/\/bjoernkarmann.dk\/project_alias."},{"key":"2022042709191608019_j_popets-2020-0072_ref_018_w2aab3b7c28b1b6b1ab1ac18Aa","unstructured":"[18] C. Champion, I. Olade, C. Papangelis, H. Liang, and C. Fleming, \u201cThe smart speaker blocker: An open-source privacy filter for connected home speakers,\u201d arXiv preprint arXiv:1901.04879, 2019."},{"key":"2022042709191608019_j_popets-2020-0072_ref_019_w2aab3b7c28b1b6b1ab1ac19Aa","doi-asserted-by":"crossref","unstructured":"[19] R. Aloufi, H. Haddadi, and D. Boyle, \u201cPrivacy preserving speech analysis using emotion filtering at the edge,\u201d in 17th Conference on Embedded Networked Sensor Systems (Sen- Sys \u201919), 2019, pp. 426\u2013427.10.1145\/3356250.3361947","DOI":"10.1145\/3356250.3361947"},{"key":"2022042709191608019_j_popets-2020-0072_ref_020_w2aab3b7c28b1b6b1ab1ac20Aa","doi-asserted-by":"crossref","unstructured":"[20] J. Ren, D. J. Dubois, D. Choffnes, A. M. Mandalari, R. Kolcun, and H. Haddadi, \u201cInformation Exposure for Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach,\u201d in Proc. of the Internet Measurement Conference (IMC \u201919), 2019.10.1145\/3355369.3355577","DOI":"10.1145\/3355369.3355577"},{"key":"2022042709191608019_j_popets-2020-0072_ref_021_w2aab3b7c28b1b6b1ab1ac21Aa","doi-asserted-by":"crossref","unstructured":"[21] D. Y. Huang, N. Apthorpe, G. Acar, F. Li, and N. Feamster, \u201cIoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale,\u201d arXiv preprint arXiv:1909.09848, 2019.","DOI":"10.1145\/3397333"},{"key":"2022042709191608019_j_popets-2020-0072_ref_022_w2aab3b7c28b1b6b1ab1ac22Aa","doi-asserted-by":"crossref","unstructured":"[22] I. Castell-Uroz, X. Marrugat-Plaza, J. Sol\u00e9-Pareta, and P. Barlet-Ros, \u201cA first look into alexa\u2019s interaction security,\u201d in 15th ACM Intern.l Conf. on Emerging Networking EXperiments and Technologies (CoNEXT \u201919), 2019.10.1145\/3360468.3366769","DOI":"10.1145\/3360468.3366769"},{"key":"2022042709191608019_j_popets-2020-0072_ref_023_w2aab3b7c28b1b6b1ab1ac23Aa","doi-asserted-by":"crossref","unstructured":"[23] J. Lau, B. Zimmerman, and F. Schaub, \u201cAlexa, Are You Listening? Privacy Perceptions, Concerns and Privacy-Seeking Behaviors with Smart Speakers,\u201d Proceedings of the ACM on Human-Computer Interaction (issue CSCW), vol. 2, no. 1, pp. 1\u201331, 2018.10.1145\/3274371","DOI":"10.1145\/3274371"},{"key":"2022042709191608019_j_popets-2020-0072_ref_024_w2aab3b7c28b1b6b1ab1ac24Aa","doi-asserted-by":"crossref","unstructured":"[24] S. Kennedy, H. Li, C. Wang, H. Liu, B. Wang, and W. Sun, \u201cI Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers,\u201d in 2019 IEEE Conference on Communications and Network Security (CNS \u201919), June 2019, pp. 232\u2013240.10.1109\/CNS.2019.8802686","DOI":"10.1109\/CNS.2019.8802686"},{"key":"2022042709191608019_j_popets-2020-0072_ref_025_w2aab3b7c28b1b6b1ab1ac25Aa","unstructured":"[25] N. Apthorpe, D. Reisman, S. Sundaresan, A. Narayanan, and N. Feamster, \u201cSpying on the smart home: Privacy attacks and defenses on encrypted iot traffic,\u201d arXiv preprint arXiv:1708.05044, 2017."},{"key":"2022042709191608019_j_popets-2020-0072_ref_026_w2aab3b7c28b1b6b1ab1ac26Aa","unstructured":"[26] D. Kumar, R. Paccagnella, P. Murley, E. Hennenfent, J. Mason, A. Bates, and M. Bailey, \u201cSkill Squatting Attacks on Amazon Alexa,\u201d in 27th USENIX Security Symposium (USENIX Security \u201918), Aug. 2018, pp. 33\u201347."},{"key":"2022042709191608019_j_popets-2020-0072_ref_027_w2aab3b7c28b1b6b1ab1ac27Aa","unstructured":"[27] A. Alhadlaq, J. Tang, M. Almaymoni, and A. Korolova, \u201cPrivacy in the Amazon Alexa skills ecosystem,\u201d in 10th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs \u201917), 2017."},{"key":"2022042709191608019_j_popets-2020-0072_ref_028_w2aab3b7c28b1b6b1ab1ac28Aa","unstructured":"[28] N. Zhang, X. Mi, X. Feng, X. Wang, Y. Tian, and F. Qian, \u201cUnderstanding and mitigating the security risks of voicecontrolled third-party skills on amazon alexa and google home,\u201d arXiv preprint arXiv:1805.01525, 2018."},{"key":"2022042709191608019_j_popets-2020-0072_ref_029_w2aab3b7c28b1b6b1ab1ac29Aa","doi-asserted-by":"crossref","unstructured":"[29] R. Mitev, M. Miettinen, and A.-R. Sadeghi, \u201cAlexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants,\u201d in 2019 ACM Asia Conf. on Computer and Communications Security (ASIACCS \u201919), 2019, pp. 465\u2013478.10.1145\/3321705.3329842","DOI":"10.1145\/3321705.3329842"},{"key":"2022042709191608019_j_popets-2020-0072_ref_030_w2aab3b7c28b1b6b1ab1ac30Aa","unstructured":"[30] T. Sugawara, B. Cyr, S. Rampazzi, D. Genkin, and K. Fu, Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems. Accessed on 02\/28\/2020, https:\/\/lightcommands.com\/."},{"key":"2022042709191608019_j_popets-2020-0072_ref_031_w2aab3b7c28b1b6b1ab1ac31Aa","doi-asserted-by":"crossref","unstructured":"[31] R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, \u201cAudio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility,\u201d IEEE Transactions on Emerging Topics in Computing, 2019.10.1145\/3243734.3278497","DOI":"10.1145\/3243734.3278497"},{"key":"2022042709191608019_j_popets-2020-0072_ref_032_w2aab3b7c28b1b6b1ab1ac32Aa","unstructured":"[32] N. Carlini, P. Mishra, T. Vaidya, Y. Zhang, M. Sherr, C. Shields, D. Wagner, and W. Zhou, \u201cHidden voice commands,\u201d in 25th USENIX Conference on Security Symposium (USENIX Security \u201916)). USENIX Association, 2016."}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/content.sciendo.com\/view\/journals\/popets\/2020\/4\/article-p255.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2020-0072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T16:31:12Z","timestamp":1658334672000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2020\/popets-2020-0072.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,17]]},"references-count":32,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,8,17]]},"published-print":{"date-parts":[[2020,10,1]]}},"alternative-id":["10.2478\/popets-2020-0072"],"URL":"https:\/\/doi.org\/10.2478\/popets-2020-0072","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,17]]}}}