Hacking Voice-Controllable Devices (2025. xii, 177 S. XII, 177 p. 34 illus., 21 illus. in color. 235 mm)

個数:

Hacking Voice-Controllable Devices (2025. xii, 177 S. XII, 177 p. 34 illus., 21 illus. in color. 235 mm)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版
  • 商品コード 9783031881442

Full Description

Voice-controllable devices allow hands-free interactions, offering a modern user experience and helping impaired users. However, the voice channel that enables this interaction is also one of their main weaknesses.

Higher usability often comes with higher security and privacy risks. As Voice-Controllable Devices are no exception to this, a plethora of new attacks have been carried out against them in recent years. In this book, several attacks are analysed against the voice channel available in the literature; it then devises a bespoke kill chain to facilitate the classification of attack steps and future research. Additionally, the work analyses the design of the notorious Alexa vs Alexa attack, which turned Echo Dot devices against themselves in 2022. Finally, the present volume explores measures against all these attacks and raise important questions about their suitability for user needs.

Topics and features:

Discusses timely security and privacy challenges in IoT devices, with an emphasis on voice-controllable devices
Provides a framework for assessing and studying attacks against the voice channel
Addresses practical attacks successfully carried out against real devices, showing that an impactful attack need not be complex
Explores advanced safeguards from a new perspective, questioning whether research is proceeding in the right direction

This powerful volume—containing tips, tricks, and techniques used by ethical hackers to breach the voice channel—serves as the perfect guide for researchers conducting security and privacy research on IoT. It also provides food for thought for graduate students and enthusiasts of these subjects who do not shy away from the mathematics behind the world of machine learning.

Contents

1. Introduction.- 2. Background.- 3. The VOCODES Framework for Attacking VCDS.- 4. The Alexa versus Alexa Attack.- 5. An Assessment of AVA in the Real World.- 6. A Taxonomy of Measures Against Voice-Spoofing Attacks.- 7. An Intelligent Measure Against Self-Activation.- 8. Conclusion.

最近チェックした商品