{"id":"https://openalex.org/W4399116355","doi":"https://doi.org/10.48550/arxiv.2405.17100","title":"Sok: Comprehensive Security Overview, Challenges, and Future Directions\n of Voice-Controlled Systems","display_name":"Sok: Comprehensive Security Overview, Challenges, and Future Directions\n of Voice-Controlled Systems","publication_year":2024,"publication_date":"2024-05-27","ids":{"openalex":"https://openalex.org/W4399116355","doi":"https://doi.org/10.48550/arxiv.2405.17100"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2405.17100","pdf_url":"https://arxiv.org/pdf/2405.17100","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2405.17100","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111214536","display_name":"Haozhe Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xu, Haozhe","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055640838","display_name":"Cong Wu","orcid":"https://orcid.org/0000-0003-3530-6512"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wu, Cong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108568305","display_name":"Yangyang Gu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gu, Yangyang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098921609","display_name":"Xingcan Shang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shang, Xingcan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Jing","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101876553","display_name":"Kun He","orcid":"https://orcid.org/0000-0001-6064-3444"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"He, Kun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Du, Ruiying","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":84},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9182,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9182,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.40365225}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2405.17100","pdf_url":"https://arxiv.org/pdf/2405.17100","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2405.17100","pdf_url":"https://arxiv.org/pdf/2405.17100","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4396701345","https://openalex.org/W4396696052","https://openalex.org/W4395014643","https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2382290278","https://openalex.org/W2376932109","https://openalex.org/W2358668433","https://openalex.org/W2001405890"],"abstract_inverted_index":{"The":[0],"integration":[1],"of":[2,20,45,57],"Voice":[3],"Control":[4],"Systems":[5],"(VCS)":[6],"into":[7],"smart":[8],"devices":[9],"and":[10,37,42,48,69,95,111,122,127,162,166],"their":[11,21,108,118],"growing":[12],"presence":[13],"in":[14,29,66,99,133,154,159,173],"daily":[15],"life":[16],"accentuate":[17],"the":[18,49,71,129,151],"importance":[19],"security.":[22,38,142],"Current":[23],"research":[24],"has":[25],"uncovered":[26],"numerous":[27],"vulnerabilities":[28,47],"VCS,":[30,88],"presenting":[31],"significant":[32,147],"risks":[33],"to":[34],"user":[35],"privacy":[36],"However,":[39],"a":[40,61,83,90,100,146,168],"cohesive":[41],"systematic":[43,101],"examination":[44],"these":[46,75],"corresponding":[50],"solutions":[51],"is":[52],"still":[53],"absent.":[54],"This":[55],"lack":[56],"comprehensive":[58],"analysis":[59],"presents":[60],"challenge":[62],"for":[63,87,93,139,170],"VCS":[64,141,155,174],"designers":[65,158],"fully":[67],"understanding":[68],"mitigating":[70],"security":[72,175],"issues":[73],"within":[74],"systems.":[76],"Addressing":[77],"this":[78],"gap,":[79],"our":[80],"study":[81],"introduces":[82],"hierarchical":[84],"model":[85],"structure":[86],"providing":[89],"novel":[91],"lens":[92],"categorizing":[94],"analyzing":[96],"existing":[97],"literature":[98],"manner.":[102],"We":[103],"classify":[104],"attacks":[105],"based":[106],"on":[107],"technical":[109],"principles":[110],"thoroughly":[112],"evaluate":[113],"various":[114],"attributes,":[115],"such":[116],"as":[117],"methods,":[119],"targets,":[120],"vectors,":[121],"behaviors.":[123],"Furthermore,":[124],"we":[125],"consolidate":[126],"assess":[128],"defense":[130],"mechanisms":[131],"proposed":[132],"current":[134],"research,":[135],"offering":[136],"actionable":[137],"recommendations":[138],"enhancing":[140],"Our":[143],"work":[144],"makes":[145],"contribution":[148],"by":[149],"simplifying":[150],"complexity":[152],"inherent":[153],"security,":[156],"aiding":[157],"effectively":[160],"identifying":[161],"countering":[163],"potential":[164],"threats,":[165],"setting":[167],"foundation":[169],"future":[171],"advancements":[172],"research.":[176]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4399116355","counts_by_year":[],"updated_date":"2024-12-09T21:45:01.267844","created_date":"2024-05-29"}