DolphinAttack Exposes Speech Recognition Software Vulnerability

Speech recognition software, including Siri, Alexa and Google Now, can be hacked by giving them inaudible (ultrasonic) voice commands, researchers have found.

The attack, dubbed the DolphinAttack by the researchers at Zhejiang University in China, can hack into smart devices by taking advantage of their microphones, which can pick up ultrasound frequencies and frequencies of up to 20,000Hz.

Taking control of devices

The researchers tested the hack on 16 VCS (Version Control System) models including Apple iPhone, Amazon Echo, Google Nexus and connected cars. They manged to control the navigation of an Audi, play music on Echo and launch Facetime on iPhones.

The attack involves translating audible voice commands into commands in frequencies above 20,000Hz. While devices can still pick up the commands clearly they cannot be heard by humans. The ‘secret’ voice commands can also be used to navigate to malicious websites on a targeted device.

The researchers’ paper detailing the vulnerability read: “The fundamental idea of DolphinAttack is (a) to modulate the low-frequency voice signal (i.e., baseband) on an ultrasonic carrier before transmitting it over the air, and (b) to demodulate the modulated voice signals with the voice capture hardware at the receiver.”

There are some restrictions on the attack, though, with a series of unlikely conditions required for a successful hack.

The DolphinAttack can only be triggered if the target device is in within five to six feet of the attacker’s transmitter. The device mus also be unlocked with voice-assistant activated on it.

Loading ...

On top of this, alarms bells should ring for victims of the attack as voice assistants reply to commands during the hack.

To protect devices from a DolphinAttack, the researchers have urged smart device manufacturers to prevent devices from reacting to commands in ultrasound.

The explained: “We propose hardware and software defence solutions. We validate that it is feasible to detect DolphinAttack by classifying the audios using supported vector machine (SVM), and suggest to re-design voice controllable systems to be resilient to inaudible voice command attacks.”

How much do you know about hackers and viruses? Try our quiz!

Duncan Macrae

Duncan MacRae is former editor and now a contributor to TechWeekEurope. He previously edited Computer Business Review's print/digital magazines and CBR Online, as well as Arabian Computer News in the UAE.

Recent Posts

Northvolt Mulls US Bankruptcy Protection – Report

Troubled battery maker Northvolt reportedly considers Chapter 11 bankruptcy protection in the United States as…

1 day ago

FTC Plans Investigation Into Microsoft Cloud Business – Report

Microsoft's cloud business practices are reportedly facing a potential anti-competitive investigation by the FTC

1 day ago

Programmer Sentenced To Five Years In Prison For Bitcoin Laundering

Ilya Lichtenstein sentenced to five years in prison for hacking into a virtual currency exchange…

1 day ago

Hate Speech Watchdog CCDH To Quit Musk’s X

Target for Elon Musk's lawsuit, hate speech watchdog CCDH, announces its decision to quit X…

2 days ago

Meta Fined €798m Over Alleged Facebook Marketplace Violations

Antitrust penalty. European Commission fines Meta a hefty €798m ($843m) for tying Facebook Marketplace to…

2 days ago

Elon Musk Rebuked By Italian President Over Migration Tweets

Elon Musk continues to provoke the ire of various leaders around the world with his…

2 days ago