Security vulnerabilities in speech recognition systems

The aim of this project is to develop a generic methodology for blackbox testing of speech recognition systems by seeking to identify homophones or similar sounding words which may be misrecognised by a system as command words. A series of experiments are performed with two different speech recognit...

Full description

Bibliographic Details
Main Author: Bispham, M
Format: Report
Published: Centre for Doctoral Training in Cyber Security 2016
_version_ 1797086013957341184
author Bispham, M
author_facet Bispham, M
author_sort Bispham, M
collection OXFORD
description The aim of this project is to develop a generic methodology for blackbox testing of speech recognition systems by seeking to identify homophones or similar sounding words which may be misrecognised by a system as command words. A series of experiments are performed with two different speech recognition systems. The data used in the experiments are a set of words from the vocabulary of a controlled natural language, Attempto Controlled English, together with a set of words not permitted in that controlled language. Several instances are identified where a ‘legal’ Attempto word is misrecognised as an ‘illegal’ word. This demonstrates the feasibility of an attack whereby an attacker might seek to find apparently innocuous words which are misrecognised by a speech-controlled system as commands, thus enabling the attacker covertly to prompt the system to perform an unauthorised action. In such a situation, the attacker would identify a set of command or ‘target’ words used to control a system (the equivalent of the ‘illegal’ words in the experiments with Attempto) and would seek to find a set of ‘adversarial’ words which are misrecognised by the system as a target word. In a real-life attack, an attacker might seek to find words which are misrecognised as command words for a digital assistant such as Siri or Cortana, or as command words for a voice-controlled device in the Internet of Things.
first_indexed 2024-03-07T02:15:59Z
format Report
id oxford-uuid:a241398d-1a65-411c-b385-8526e97caff2
institution University of Oxford
last_indexed 2024-03-07T02:15:59Z
publishDate 2016
publisher Centre for Doctoral Training in Cyber Security
record_format dspace
spelling oxford-uuid:a241398d-1a65-411c-b385-8526e97caff22022-03-27T02:18:54ZSecurity vulnerabilities in speech recognition systemsReporthttp://purl.org/coar/resource_type/c_93fcuuid:a241398d-1a65-411c-b385-8526e97caff2Symplectic Elements at OxfordCentre for Doctoral Training in Cyber Security2016Bispham, MThe aim of this project is to develop a generic methodology for blackbox testing of speech recognition systems by seeking to identify homophones or similar sounding words which may be misrecognised by a system as command words. A series of experiments are performed with two different speech recognition systems. The data used in the experiments are a set of words from the vocabulary of a controlled natural language, Attempto Controlled English, together with a set of words not permitted in that controlled language. Several instances are identified where a ‘legal’ Attempto word is misrecognised as an ‘illegal’ word. This demonstrates the feasibility of an attack whereby an attacker might seek to find apparently innocuous words which are misrecognised by a speech-controlled system as commands, thus enabling the attacker covertly to prompt the system to perform an unauthorised action. In such a situation, the attacker would identify a set of command or ‘target’ words used to control a system (the equivalent of the ‘illegal’ words in the experiments with Attempto) and would seek to find a set of ‘adversarial’ words which are misrecognised by the system as a target word. In a real-life attack, an attacker might seek to find words which are misrecognised as command words for a digital assistant such as Siri or Cortana, or as command words for a voice-controlled device in the Internet of Things.
spellingShingle Bispham, M
Security vulnerabilities in speech recognition systems
title Security vulnerabilities in speech recognition systems
title_full Security vulnerabilities in speech recognition systems
title_fullStr Security vulnerabilities in speech recognition systems
title_full_unstemmed Security vulnerabilities in speech recognition systems
title_short Security vulnerabilities in speech recognition systems
title_sort security vulnerabilities in speech recognition systems
work_keys_str_mv AT bisphamm securityvulnerabilitiesinspeechrecognitionsystems