Of Amazon's Alexa, Apple's Siri, Microsoft's Cortana or Google's language assistant:

The stem of the used wordt steeds meer a sleutel dead toestellen - waree also het risk of stem-hacking . Onderzoekers from the University at Buffalo (UB) has the aroma of an app developed, the specific aanvallen met behulp van opnames van a stem te prevent. This makes another use of the magnetometer, which is used for the compas in modern smartphones.

Stem altijd en overall

“Every aspect of Jullie Leven is available on Jullie Mobile Telefoon”,

aldus Kui Ren, unfortunately from the Ubiquitous Security and Privacy Research Laboratory at the UB. This is a security hub. That's really critical.

“Omdat de stem inmiddels toegang kan geven tot bijna all toestelfuncties, is het a risk factor. This means that I can get even bigger. Want Amazon toont with Echo en Alexa al aan, that also toestellen zonder classic toetsen of touchscreens in opmars zijn. Here is the own stem, the sleutel with all the functions”.

High-quality systems that are still in use, can be used for real purposes - IPV all language recognition and a relevant security feature can be used. In the process of synthesizing the names of a stem from the UB, which is available from the original source, it is possible to use the original version of the original stem.

The app should be presented in Vienna's prototype by the team at the 37th International Conference on Distributed Computing Systems . The smartphones can also be used, including the built-in components.

Clever magnetveld-truc

A smartphone compas has the name of a magnetometer. En die kan also magneetvelden aantonen, die van luidsprekers afkomstig zijn – zoals die, die ananval moet gebruiken om a stemopname af te spelen. There is also an app that moves the keyboard to the moon.

You want to be able to hear the sound of a loudspeaker magnet changer. This really sounds like the loudspeaker is close enough to the kitchen. This means that the app has its own algorithms, but the distance also has a speaker in the shadows.

clip_image002
Stem: Magneetvelden verraden afspeelaanvallen (Photo: buffalo.edu)

The prototype is according to UB-onderzoekers al zeer goed in, stem-hacks through middel van opnames te herkennen. This is now a non-negotiable item that has been brought to light, so that it can be used as a real security feature.

“When this is the case, you can also take care of it. Otherwise you can't really understand it,”

benadrukt Ren. He now works with his colleague, the system can be used in such a way that an app can be made ready for download.

Vertaling: Petra, mimikama.nl

Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )