A Portable and Stealthy Inaudible Voice Attack Based on Acoustic Metamaterials

📅 2025-01-25
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the security vulnerability of voice assistants (e.g., Siri, Alexa, Google Assistant, Xiaoai Tongxue, and Xiao Yi) by proposing a portable, long-range, inaudible voice attack. Unlike prior approaches relying on bulky speaker arrays, we introduce acoustic metamaterials—first applied to inaudible voice attacks—to design METAATTACK: a lightweight system integrating narrowband ultrasonic modulation, speech command reverse engineering, and waveform-stealth encoding, implemented using off-the-shelf speakers and signal processing hardware. Experiments demonstrate that METAATTACK achieves an average word accuracy of 76% across five major voice assistants at a distance of 8.85 meters. The system exhibits high acoustic stealth, compact portability, and practical deployability, significantly extending both the physical reach and real-world threat scope of ultrasonic voice attacks.

Technology Category

Application Category

📝 Abstract
We present METAATTACK, the first approach to leverage acoustic metamaterials for inaudible attacks for voice control systems. Compared to the state-of-the-art inaudible attacks requiring complex and large speaker setups, METAATTACK achieves a longer attacking range and higher accuracy using a compact, portable device small enough to be put into a carry bag. These improvements in portability and stealth have led to the practical applicability of inaudible attacks and their adaptation to a wider range of scenarios. We demonstrate how the recent advancement in metamaterials can be utilized to design a voice attack system with carefully selected implementation parameters and commercial off-the-shelf components. We showcase that METAATTACK can be used to launch inaudible attacks for representative voice-controlled personal assistants, including Siri, Alexa, Google Assistant, XiaoAI, and Xiaoyi. The average word accuracy of all assistants is 76%, with a range of 8.85 m.
Problem

Research questions and friction points this paper is trying to address.

Inaudible Commands
Voice Recognition Systems
Stealth Attack
Innovation

Methods, ideas, or system contributions that make the work stand out.

METAATTACK
silent attack
voice assistant vulnerability
🔎 Similar Papers
No similar papers found.
Zhiyuan Ning
Zhiyuan Ning
Westlake University
Graph Machine LearningKnowledge GraphsLarge Language Models
J
Juan He
School of Information Science and Technology, Northwest University, Xi’an 710127, China
Zhanyong Tang
Zhanyong Tang
Northwest University, Xi'an, China
System SecurityMobile ComputingProgramming Languages
W
Weihang Hu
School of Information Science and Technology, Northwest University, Xi’an 710127, China
Xiaojiang Chen
Xiaojiang Chen
School of Information Science and Technology, Northwest University, Xi’an 710127, China