Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
FIT to WORK: IMPROVING the SECURITY of MONITORED EMPLOYEES' HEALTH DATA Elizabeth A. Brown INTRODUCTION Imagine Coming to Work
FIT TO WORK: IMPROVING THE SECURITY OF MONITORED EMPLOYEES' HEALTH DATA Elizabeth A. Brown1 INTRODUCTION Imagine coming to work one day and finding that your employer has given everyone in the company a wearable FitBit health monitor, free of charge. You pop the FitBit on, grateful for another bit of help in managing the health concerns that nag at you persistently but which never quite rise to the top of your priority list. At your next performance review, your supervisor expresses concern about your anxiety levels. Although your work output is slightly off, she notes, there has been a correlation in your lack of sleep and exercise, and she suspects you are depressed. You wonder how your employer might know these things, whether or not they are true, and then you remember the FitBit. Your supervisor then tells you that the promotion you had wanted is going to a colleague who is “better equipped to handle the demands of the job.” You interview for another job, and are asked to provide the password to the HealthDrive account that centralizes the fitness data all the apps on your iPhone collect about you during the day. Similar scenarios are playing out now in workplaces across the country, and will do so more frequently as the personal health sensor market and employee monitoring trends continue to grow. Employers are making key decisions based on employees’ biometric data, collected from specialized devices like a FitBit or the health-related apps installed on mobile phones. BP, for example, adjusts its employees’ health care premiums depending on how much physical activity their wearable FitBit devices monitor – devices that BP provides to thousands of employees, their spouses, and retirees for free. -
Your Voice Assistant Is Mine: How to Abuse Speakers to Steal Information and Control Your Phone ∗ †
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone ∗ y Wenrui Diao, Xiangyu Liu, Zhe Zhou, and Kehuan Zhang Department of Information Engineering The Chinese University of Hong Kong {dw013, lx012, zz113, khzhang}@ie.cuhk.edu.hk ABSTRACT General Terms Previous research about sensor based attacks on Android platform Security focused mainly on accessing or controlling over sensitive compo- nents, such as camera, microphone and GPS. These approaches Keywords obtain data from sensors directly and need corresponding sensor invoking permissions. Android Security; Speaker; Voice Assistant; Permission Bypass- This paper presents a novel approach (GVS-Attack) to launch ing; Zero Permission Attack permission bypassing attacks from a zero-permission Android application (VoicEmployer) through the phone speaker. The idea of 1. INTRODUCTION GVS-Attack is to utilize an Android system built-in voice assistant In recent years, smartphones are becoming more and more popu- module – Google Voice Search. With Android Intent mechanism, lar, among which Android OS pushed past 80% market share [32]. VoicEmployer can bring Google Voice Search to foreground, and One attraction of smartphones is that users can install applications then plays prepared audio files (like “call number 1234 5678”) in (apps for short) as their wishes conveniently. But this convenience the background. Google Voice Search can recognize this voice also brings serious problems of malicious application, which have command and perform corresponding operations. With ingenious been noticed by both academic and industry fields. According to design, our GVS-Attack can forge SMS/Email, access privacy Kaspersky’s annual security report [34], Android platform attracted information, transmit sensitive data and achieve remote control a whopping 98.05% of known malware in 2013. -
Smart Speakers & Their Impact on Music Consumption
Everybody’s Talkin’ Smart Speakers & their impact on music consumption A special report by Music Ally for the BPI and the Entertainment Retailers Association Contents 02"Forewords 04"Executive Summary 07"Devices Guide 18"Market Data 22"The Impact on Music 34"What Comes Next? Forewords Geoff Taylor, chief executive of the BPI, and Kim Bayley, chief executive of ERA, on the potential of smart speakers for artists 1 and the music industry Forewords Kim Bayley, CEO! Geoff Taylor, CEO! Entertainment Retailers Association BPI and BRIT Awards Music began with the human voice. It is the instrument which virtually Smart speakers are poised to kickstart the next stage of the music all are born with. So how appropriate that the voice is fast emerging as streaming revolution. With fans consuming more than 100 billion the future of entertainment technology. streams of music in 2017 (audio and video), streaming has overtaken CD to become the dominant format in the music mix. The iTunes Store decoupled music buying from the disc; Spotify decoupled music access from ownership: now voice control frees music Smart speakers will undoubtedly give streaming a further boost, from the keyboard. In the process it promises music fans a more fluid attracting more casual listeners into subscription music services, as and personal relationship with the music they love. It also offers a real music is the killer app for these devices. solution to optimising streaming for the automobile. Playlists curated by streaming services are already an essential Naturally there are challenges too. The music industry has struggled to marketing channel for music, and their influence will only increase as deliver the metadata required in a digital music environment. -
Reuters Institute: the Future of Voice and the Implications for News
DIGITAL NEWS PROJECT NOVEMBER 2018 The Future of Voice and the Implications for News Nic Newman Contents About the Author 4 Acknowledgements 4 Executive Summary 5 1. Methodology and Approach 8 2. What is Voice? 10 3. How Voice is Being Used Today 14 4. News Usage in Detail 23 5. Publisher Strategies and Monetisation 32 6. Future Developments and Conclusions 40 References 43 Appendix: List of Interviewees 44 THE REUTERS INSTITUTE FOR THE STUDY OF JOURNALISM About the Author Nic Newman is Senior Research Associate at the Reuters Institute and lead author of the Digital News Report, as well as an annual study looking at trends in technology and journalism. He is also a consultant on digital media, working actively with news companies on product, audience, and business strategies for digital transition. Acknowledgements The author is particularly grateful to media companies and experts for giving their time to share insights for this report in such an enthusiastic and open way. Particular thanks, also, to Peter Stewart for his early encouragement and for his extremely informative daily Alexa ‘flash briefings’ on the ever changing voice scene. The author is also grateful to Differentology andY ouGov for the professionalism with which they carried out the qualitative and quantitative research respectively and for the flexibility in accommodating our complex and often changing requirements. The research team at the Reuters Institute provided valuable advice on methodology and content and the author is grateful to Lucas Graves and Rasmus Kleis Nielsen for their constructive and thoughtful comments on the manuscript. Also thanks to Alex Reid at the Reuters Institute for keeping the publication on track at all times. -
View Annual Report
As filed with the Securities and Exchange Commission on March 29, 2019 UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 20-F (Mark One) ‘ REGISTRATION STATEMENT PURSUANT TO SECTION 12(b) OR (g) OF THE SECURITIES EXCHANGE ACT OF 1934 OR È ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2018 OR ‘ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 OR ‘ SHELL COMPANY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of event requiring this shell company report For the transition period from to Commission file number 001-37821 LINE Kabushiki Kaisha (Exact name of Registrant as specified in its charter) LINE Corporation Japan (Translation of Registrant’s name into English) (Jurisdiction of incorporation or organization) JR Shinjuku Miraina Tower, 23rd Floor 4-1-6 Shinjuku Shinjuku-ku, Tokyo, 160-0022, Japan (Address of principal executive offices) Satoshi Yano Telephone: +81-3-4316-2050; E-mail: [email protected]; Facsimile: +81-3-4316-2131 (Name, telephone, e-mail and/or facsimile number and address of company contact person) Securities registered or to be registered pursuant to Section 12(b) of the Act. Title of Each Class Name of Each Exchange on Which Registered American Depositary Shares, each representing New York Stock Exchange, Inc. one share of common stock Common Stock * New York Stock Exchange, Inc. * Securities registered or to be registered pursuant to Section 12(g) of the Act. -
Remote Connect 2016
The Convenience of Remote Connect 2016 TOYOTA APP SMARTWATCH GOOGLE AMAZON Remote Connect As a Companion of the Smartphone ASSISTANT ALEXA Toyota Action Toyota Skill Toyota offers an incredible array of convenience and connectivity features. These features now includeGoogle Assistant and Amazon Alexa3 capability – as well as smartwatch integration – for 2018 and later models equipped with Remote Connect². KEY FOB WITH REMOTE FUNCTIONALITY Vehicles equipped with Remote Connect² have key fob13 compatibility for Remote Start1. Connected Services registration will be required to use the complete suite of Remote Connect services, which include Smartphone, Smartwatch, and smart home devices. Audio Plus vehicle key fob functionality is available for up to 3 years. Beyond 3 years requires a subscription. Applicable for select Model Year 2018 through 2020 Remote Connect capable vehicles. Select Model Year 2020 Remote Connect capable vehicles will have functionality for up to 10 years. Premium Audio vehicle key fob functionality is available for up to 10 years. Beyond 10 years requires a subscription. Applicable for select Model Year 2018 through 2020 Remote Connect capable vehicles. Using the key fob to remote start my Toyota: 1. Press the LOCK button on the remote. 2. Press the LOCK button a second time within 1 second. 3. Press the LOCK button again, this time holding it for 3 seconds. The engine will start. Note: Key Fob Remote Start will not function if Connected Services are waived. REMOTE CONNECT EQUIPPED VEHICLES BUILT BEFORE 11/12/18 Remote Connect equipped vehicles built before 11/12/18 were required to have an active Remote Connect trial or paid subscription for the key fob to perform remote start functionality. -
No Recharging Or Power Stealing. It's the Smart Thermostat Pros Trust
No recharging or power stealing. It’s the smart thermostat Pros trust. 5-YEAR PRO INSTALL WARRANTY Get our 3-year standard warranty plus 2 years for pro purchase and install. Here’s why pros love us. Here’s why consumers love us. RELIABLY POWERED CONTROL FROM ANYWHERE, ANYTIME No common wire? No problem. Your ecobee comes with a Customers can easily control temperature and settings Power Extender Kit so it doesn’t rely on other equipment from anywhere with an Apple Watch, Android, or to charge itself. iOS device. COMPATIBLE WITH MOST AVERAGE 23% SAVINGS* ecobee3 lite works with most HVAC systems including When customers bring home the ecobee3 lite, they radiant heating systems, multistage, and dual fuel save an average of 23% annually on heating and heat pumps. ecobee.com/compatibility cooling costs. *Learn more at ecobee.com/savings EASY INSTALLATION UPDATES YOU AS NEEDED Installation takes 30 minutes or less in most cases. We also ecobee3 lite monitors heating and cooling systems, and offer easy access to HVAC tech support, wiring diagrams, alerts customers if it senses something is wrong. and manuals if you ever need assistance. SUPPORT HOURS Available 8am–10pm (Mon–Fri) and 9am–9pm (Sat-Sun). 1.866.518.6740 | [email protected] Apple, iPhone, iPad, and iPod touch are trademarks of Apple Inc., registered in the U.S. and other countries. HomeKit is a trademark of Apple Inc. Use of the HomeKit logo means that an electronic accessory has been designed to connect specifically to iPod, iPhone, or iPad, respectively, and has been certified by the developer to meet Apple performance standards. -
Digital Forensic Analysis of Smart Watches
TALLINN UNIVERSITY OF TECHNOLOGY School of Information Technologies Kehinde Omotola Adebayo (174449IVSB) DIGITAL FORENSIC ANALYSIS OF SMART WATCHES Bachelor’s Thesis Supervisor: Hayretdin Bahsi Research Professor Tallinn 2020 TALLINNA TEHNIKAÜLIKOOL Infotehnoloogia teaduskond Kehinde Omotola Adebayo (174449IVSB) NUTIKELLADE DIGITAALKRIMINALISTIKA Bachelor’s Thesis Juhendaja: Hayretdin Bahsi Research Professor Tallinn 2020 Author’s declaration of originality I hereby certify that I am the sole author of this thesis. All the used materials, references to the literature and the work of others have been referred to. This thesis has not been presented for examination anywhere else. Author: Kehinde Omotola Adebayo 30.04.2020 3 Abstract As wearable technology is becoming increasingly popular amongst consumers and projected to continue to increase in popularity they become probable significant source of digital evidence. One category of wearable technology is smart watches and they provide capabilities to receive instant messaging, SMS, email notifications, answering of calls, internet browsing, fitness tracking etc. which can be a great source of digital artefacts. The aim of this thesis is to analyze Samsung Gear S3 Frontier and Fitbit Versa Smartwatches, after which we present findings alongside the limitations encountered. Our result shows that we can recover significant artefacts from the Samsung Gear S3 Frontier, also more data can be recovered from Samsung Gear S3 Frontier than the accompanying mobile phone. We recovered significant data that can serve as digital evidence, we also provided a mapping that would enable investigators and forensic examiners work faster as they are shown where to look for information in the course of an investigation. We also presented the result of investigating Fitbit Versa significant artefacts like Heart rate, sleep, exercise and personal data like age, weight and height of the user of the device, this shows this device contains artefacts that might prove useful for forensic investigators and examiners. -
Adattester: Secure Online Mobile Advertisement Attestation Using Trustzone
AdAttester: Secure Online Mobile Advertisement Attestation Using TrustZone Wenhao Li, Haibo Li, Haibo Chen, Yubin Xia Institute of Parallel and Distributed Systems Shanghai Jiao Tong University ABSTRACT 1billiondollarsin2013duetothesefraudsandaroundonethird Mobile advertisement (ad for short) is a major financial pillar for of mobile ad clicks may constitute click-spam [18]. The most re- developers to provide free mobile apps. However, it is frequently cent research study [33] shows that, one of the largest click fraud thwarted by ad fraud, where rogue code tricks ad providers by forg- botnets, called ZeroAccess, induces advertising losses on the or- ing ad display or user clicks, or both. With the mobile ad market der of $100,000 per day. Ad frauds can typically be characterized growing drastically (e.g., from $8.76 billion in 2012 to $17.96 bil- into two types [26]: (1) Bot-driven frauds employ bot networks to lion in 2013), it is vitally important to provide a verifiable mobile initiate forged ad impressions and clicks; (2) Interaction frauds ma- ad framework to detect and prevent ad frauds. Unfortunately,this nipulate visual layouts of ads to trigger ad impressions and unaware is notoriously hard as mobile ads usually run in an execution envi- clicks from the end users. ronment with a huge TCB. Because of the urgent need to detecting mobile ad frauds, prior This paper proposes a verifiable mobile ad framework called approaches have made important first steps by using an offline- AdAttester, based on ARM’s TrustZone technology. AdAttester based approach [16, 26]. Specifically, they trigger the execution provides two novel security primitives, namely unforgeable clicks of mobile apps in a controlled environment to observe deviated and verifiable display.Thetwoprimitivesattestthatad-relatedop- behavior to detect ad frauds. -
AT&T Samsung Galaxy S II
Review: AT&T Samsung Galaxy S II 27 October 2011, By Matthew Fortner This also makes it pleasantly light. Despite having a larger screen and larger dimensions than my iPhone 4S, the Galaxy S II is lighter. Smartphone ergonomics can be subjective, but I felt more confident handling the Samsung. This surprised me since I thought the iPhone's smaller size would give it a handling edge. Users among those who actually make calls will appreciate the good and distortion-free call quality. Those moving from 3G will notice data transfer speeds over AT&T's HSPA+ network to be consistently faster, but not as fast as LTE. There has been a lot of talk about smartphone cameras lately. This new Galaxy S has an 8-megapixel back- illuminated sensor camera aided by a single-LED flash. It can record 1080p video at 30 frames per second. There is also a fixed focus front-facing Android is on fire, and Samsung is stoking the 2-megapixel camera that can also record VGA flames with the Galaxy S II. It's the fastest selling video at 640x480. Android device with 10 million units sold worldwide. Is the Galaxy S II the best current Android phone? There a have been a number of image Maybe. AT&T Wireless sent us theirs to try out. comparisons online. Some give the edge to Samsung, and some to Apple. I found both to be Android fans may have the forthcoming Motorola capable with distinctly different characteristics that Droid RAZR and Samsung Galaxy Nexus in their will appeal to different users. -
Internet AI Roadmap: Smart Speakers in B2C and Cloud Services in B2B
Internet AI roadmap: Smart speakers in B2C and cloud services in B2B Internet firms’ AI businesses taking shape Overweight (Maintain) The artificial intelligence (AI) businesses of global and domestic internet companies are increasingly taking shape and entering the execution phase. The most notable Industry Report development in the B2C space is the launch of AI-based voice-controlled speakers. In the B2B space, cloud services supported by AI are gaining increasing attention. June 19, 2017 B2C: Launch of voice-activated speakers and everyday services Mirae Asset Daewoo Co., Ltd. An increasing number of everyday services integrated with voice-controlled speakers and AI platforms are coming onto the scene. Amazon (NASDAQ: AMZN, [Internet/Game/Advertising] CP: US$995.17) is the current leader of this market, with its Echo smart speaker and Jee-hyun Moon Alexa virtual assistant. Last week, the company launched an Alexa-enabled smart +822-3774-1640 shopping device called Dash Wand the same day it announced its US$13.7bn [email protected] acquisition of the Whole Foods grocery chain. Also last week, NAVER’s Japanese subsidiary, LINE, unveiled smart speakers, named Wave and Champ, to which LINE will tie services like shopping and delivery. Domestically, both NAVER (035420 KS, BUY, TP: W1,160,000, CP: W878,000) and Kakao (035720 KQ, BUY, TP: W125,000, CP: W103,800) plan to release their own voice-controlled speakers this summer. B2B: Rapid growth of cloud services among firms strong in AI IT companies with strong AI capabilities are seeing rapid growth in their cloud revenue. Amazon , IBM (NYSE: IBM, CP: US$154.84), and Microsoft (NASDAQ: MSFT, CP: US$70.87) - with the Alexa, Watson, and Cortana, respectively - are enjoying double-digit growth in cloud revenue, which now makes up a meaningful percentage of overall revenue at all three companies. -
How to Set up the Echo Spot R S PRODUCT REVIEWS 2018 HOLIDAY GIFT GUIDE DEALS HOW to FORUM
11/29/2018 How to Set Up the Echo Spot r s PRODUCT REVIEWS 2018 HOLIDAY GIFT GUIDE DEALS HOW TO FORUM Tom's Guide / Tom's Hardware / Laptop Mag / TopTenReviews / AnandTech CYBER MONDAY DEALS Airpods Amazon Deals Apple Deals Xbox External Hard Drives 4K Smart TVs iPads Robot Vacuums All Tech Deals SMART HOME REVIEW How to Set Up the Echo Spot by MONICA CHIN Jun 8, 2018, 8:38 AM Like other Alexa-enabled smart speakers, you can use the Echo Spot to control your smart-home devices, read your texts, organize your shopping list, stream music and audiobooks, and call other Echo devices and phone lines. However, with its screen and built-in camera, the Spot can also be used to watch videos, to video chat with friends, and even to “drop in” on family members. Before you start listening, calling, and connecting your smart home, however, you’ll need to get the device up and running. Here’s our step-by-step guide. × myTo… GE Z-… Jasco… Jasco… Hone… myTo… GE Z-… 1. Turn on your Echo Spot. $14.99 $39.99 $79.99 $109.99 $39.99 $24.99 $44.99 https://www.tomsguide.com/us/hot-to-set-up-echo-spot,review-5478.html 1/6 11/29/2018 How to Set Up the Echo Spot Plug your Echo Spot into a power outlet via the included adapter. Once it’s plugged in, the Spot’s display will light up with the AmazonPRODU logoCT R andEVIE AlexaWS (the20 1artificially8 HOLIDA Yintelligent GIFT GUI DvoiceE assistantDEALS thatHOW TO FORUM powers Amazon’s smart speakers) will greet you.