Using Open Channels to Trigger the Invited, Unintended Consequences of the Internet of Things
We present techniques for bridging the Internet of Things air gap using device speakers to communicate with voice assistants and propose methods to protect critical applications from such attacks. Approaches include two-factor authentication, contextual monitoring, and source metadata embedding.
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers (IEEE),
2020-11-16T22:29:31Z.
|
Subjects: | |
Online Access: | Get fulltext |