论文标题
Alexa与Alexa:通过自我发行的语音命令控制智能扬声器
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands
论文作者
论文摘要
我们提出了Alexa与Alexa(AVA),这是一种新颖的攻击,以进攻方式利用包含语音命令和音频复制方法的音频文件,以长时间的时间来控制对亚马逊回声设备的控制。 AVA利用了Alexa在Echo设备上运行的Alexa正确解释了语音命令,即使是由设备本身播放的音频文件,也是由音频文件播放的 - 即,它利用了命令自我发音漏洞。因此,AVA消除了在受害者的回声附近的流氓演讲者的必要性,这是许多攻击所共有的约束。借助AVA,攻击者可以自我发音任何允许的命令回声,代表合法用户控制它。我们已经证实,通过AVA,攻击者可以控制家庭中的智能设备,购买不必要的物品,篡改链接日历和用户窃听。我们还发现了另外两个回声漏洞,我们称之为全卷和断路链。完整的体积通过平均加倍来提高自我发音的命令识别率,从而使攻击者能够执行其他自我发音命令。 Break Tag链会增加技能可以在没有用户交互的情况下运行的时间,从八秒钟到超过一小时,从而使攻击者能够设置现实的社会工程场景。通过利用这些漏洞,对手可以自我发达的命令正确执行99%的时间,并且可以延长对设备的控制。我们通过其脆弱性研究计划向亚马逊报告了这些漏洞,后者将其评分为中等程度。最后,为了评估大规模的AVA局限性,我们提供了对18个用户的研究组进行的调查的结果,我们表明,针对AVA的大多数局限性在实践中很难使用。
We present Alexa versus Alexa (AvA), a novel attack that leverages audio files containing voice commands and audio reproduction methods in an offensive fashion, to gain control of Amazon Echo devices for a prolonged amount of time. AvA leverages the fact that Alexa running on an Echo device correctly interprets voice commands originated from audio files even when they are played by the device itself -- i.e., it leverages a command self-issue vulnerability. Hence, AvA removes the necessity of having a rogue speaker in proximity of the victim's Echo, a constraint that many attacks share. With AvA, an attacker can self-issue any permissible command to Echo, controlling it on behalf of the legitimate user. We have verified that, via AvA, attackers can control smart appliances within the household, buy unwanted items, tamper linked calendars and eavesdrop on the user. We also discovered two additional Echo vulnerabilities, which we call Full Volume and Break Tag Chain. The Full Volume increases the self-issue command recognition rate, by doubling it on average, hence allowing attackers to perform additional self-issue commands. Break Tag Chain increases the time a skill can run without user interaction, from eight seconds to more than one hour, hence enabling attackers to setup realistic social engineering scenarios. By exploiting these vulnerabilities, the adversary can self-issue commands that are correctly executed 99% of the times and can keep control of the device for a prolonged amount of time. We reported these vulnerabilities to Amazon via their vulnerability research program, who rated them with a Medium severity score. Finally, to assess limitations of AvA on a larger scale, we provide the results of a survey performed on a study group of 18 users, and we show that most of the limitations against AvA are hardly used in practice.