Cybersecurity

This app makes sure you never get voice-hacked

A man speaks on his mobile phone as he walks across London Bridge on the second day of a train strike in London, Britain December 14, 2016. REUTERS/Neil Hall  - RTX2V0ZI

“Hackers are out there, more than you can imagine. There is a whole underground grey market to sell your password and your personal information.” Image: REUTERS/Neil Hall

Grove Potter
Share:
Our Impact
What's the World Economic Forum doing to accelerate action on Cybersecurity?
The Big Picture
Explore and monitor how Cybersecurity is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
Stay up to date:

Cybersecurity

Using only tools already on smartphones, including the compass, engineers have created an app to stop voice hacking.

While convenient, Siri, WeChat, and other voice-based smartphone apps can expose you to this growing security threat.

With just a few minutes of audio samples, attackers can replay your voice convincingly enough to trick people as well as top digital security systems. The consequences, from impersonating you with your friends to dipping into your bank account, are terrifying.

“Every aspect of your life is now on your phone,” says Kui Ren director of the Ubiquitous Security and Privacy Research Laboratory (UbiSeC) at the University at Buffalo, and one of the study’s lead authors. “That is your security hub. It is really critical now.”

Ren, professor of computer science and engineering in the School of Engineering and Applied Sciences, doesn’t mince words when discussing the importance of better cellphone security: “Hackers are out there, more than you can imagine. There is a whole underground grey market to sell your password and your personal information.”

The best way to protect your cellphone, he says, is to use several security methods.

“Technology is advancing so fast; we have to think of different ways. The strategy is using multiple lines of defense. We call that defense in depth,” he says.

Voice recognition could become a more common security tool because more internet-connected devices are being developed that do not have keypads, he says.

“With the internet of things, what is a security interface? It is not like the phone. There is often no touch screen or keypad so voice authentication may be useful,” he says.

Voice recognition attacks can come in various forms. Attacks can synthesize your voice, but these are detectable by existing algorithms. A human can imitate your voice, but again, existing technology can detect this.

A third method is replaying someone’s actual voice, and here is where Ren’s invention comes in. Any replay must be broadcast on a speaker, and speakers have magnetic fields. Ren’s system uses the magnetometer in a phone, which is there for the phone’s compass, to detect a magnetic field.

In addition, the system uses the phone’s trajectory mapping algorithm to measure the distance between the speaker and the phone. It requires a phone user to be close to the phone when speaking to guarantee that anyone using a replay of a voice over a mechanical speaker is close enough that the magnetic field can be detected.

Finally, the system requires that the phone be moving—swung in front of the mouth—when the voice recognition is being used. When a replayed voice is moved, the magnetic field changes and the phone can detect this.

The team plans to refine the system and soon make it downloadable as an app.

“We cannot decide if voice authentication will be pervasive in the future. It might be. We’re already seeing the increasing trend,” Ren says. “And if that is the case, we have to defend against voice replay attacks. Otherwise, voice authentication cannot be secure.”

Partial support for the research came from the National Science Foundation. The team describes their work in a study to be presented this week in Atlanta at the 37th International Conference on Distributed Computing Systems.

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Related topics:
CybersecurityFourth Industrial Revolution
Share:
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

'Pig-butchering’ scams on the rise as technology amplifies financial fraud, INTERPOL warns

Spencer Feingold and Johnny Wood

April 10, 2024

About Us

Events

Media

Partners & Members

  • Join Us

Language Editions

Privacy Policy & Terms of Service

© 2024 World Economic Forum