Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Friday November 08 2019, @03:32AM   Printer-friendly
from the hear-the-lights-dude dept.

Submitted via IRC for soylent_red

Using Light Beams to Control Google, Apple, Amazon Assistants

Academic researchers found that certain microphones convert light to sound, allowing voice commands to be sent to voice-controlled (VC) devices like Google Home, Amazon Echo, Facebook Portal, smartphones, or tablets.

Dubbed Light Commands, the attack works from afar by shining a laser beam at microphones that use micro-electro-mechanical systems (MEMS), which convert the light into an electrical signal.

By modulating the intensity of the light beam, MEMS can be tricked to produce the same electrical signals produced by audio commands. With careful aiming and laser focusing, attacks can be successful from as far as 110 meters.

In their experiments, researchers from the University of Electro-Communications in Japan and the University of Michigan tested the attack on popular VC devices.

The voice recognition system in Google Home, Nest Cam, Amazon Echo, Fire Cube TV, iPhone, Samsung Galaxy S9, Google Pixel, and iPad, was tested from various distances.

A Light Commands attack sends inaudible instructions to a voice-controlled device, making it react in a meaningful way. The researchers demonstrated that it can be used to open a garage door or to unlock the front door of a house.

No large investment is needed to pull this off, either. A low-cost setup used by the researchers consisted of a normal laser pointer, a Wavelength Electronics laser driver ($339), and a Neoteck NTK059 sound amplifier ($27.99). A computer that plays the recorded audio commands is also required. Laser beams provide precise aiming, but the researchers showed that Light Commands attacks also work with a laser flashlight (Acebeam W30). From 10 meters, they were able to inject commands into Google Home.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by DannyB on Friday November 08 2019, @04:50PM

    by DannyB (5839) Subscriber Badge on Friday November 08 2019, @04:50PM (#917934) Journal

    A couple years ago (sorry no link) there was a different attack on voice controlled personal assistants.

    The voice can be higher pitched. Even higher pitched. Even such a high pitched voice it is ultrasonic -- but Alexa / Siri / etc don't mind!

    There was another attack where it was possible to take a recorded voice command and manipulate it to be recognized as a different command.

    What you think you heard: "Alexa, what's the weather?"
    What Alexa heard: "Alexa, surf to evil.com"

    This manipulation was done based on how the neural network worked. There was a paper on it. I don't have it anymore. I think I saw it on news.ycombinator.com.

    Imagine a combination of the attacks.
    1. It's a laser beam pointed at the mic
    2. Sending an ultrasonic voice command
    3. The command sounds to a human like a different command than what Alexa interprets it to be

    --
    To transfer files: right-click on file, pick Copy. Unplug mouse, plug mouse into other computer. Right-click, paste.
    Starting Score:    1  point
    Moderation   +1  
       Informative=1, Total=1
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3