What can go wrong when using voice assistants? Add your scenarios

Maarten Lens-FitzGerald
6 min readMay 11, 2021
https://xkcd.com/1807/

We need your help. At the Open Voice Network, the global non-profit working on voice standards, we explore what security risks exist when people and organizations use voice assistants and how we can mitigate them. In this post, you will find what we came up with ourselves, but we want to have more input to work with. What scenarios can you add? What did we miss?

The voice-channel keeps growing in use and applications. 1 in 3 people in the US has a smart speaker. Many organizations are looking into activating the channel or have done so. By 2023, voice commerce is predicted to reach $80 billion.

No opportunity like this happens without security risks. This begs the question: what can go wrong when using assistants?

Please read the scenarios and how they were made. Add in the comments section below your additional scenarios or comments on the existing ones.

We welcome all to add to this body of work and lay the foundation of a secure voice channel. Are you ready?

THE THREAT SCENARIOS

The humor is deliberate to make a less dry exercise.

Scenario 1

Eve records Alice interacting with the home voice assistant where Alice orders mayonnaise for delivery. Eve then replays the interaction later to cause Alice to pay for a large amount of unexpected mayonnaise.

Alice has already configured the home voice assistant to allow ordering, complete with payment and shipping information.

Scenario 2

Alice is in her car with an in-vehicle voice assistant, stopped in a parking lot with the windows down. Oscar is in a car next to Alice and speaks in a way that Alice’s voice assistant can hear. Oscar says, “Next Song,” then Alice’s car begins playing “Piilotan mun kyyneleet” by Haloo Helsinki, interrupting the podcast she was listening to.

Scenario 3

Alice is at home when a television advertisement for a new tea kettle emporium says, “Hey voice assistant, remind me to come to Trudy’s Trusty Tea Emporium tomorrow at 9 am”, and Alice’s home voice assistant honors the command and indeed verbalizes a reminder the next morning.

Scenario 4

Alice’s neighbor, Chuck, keeps a white bellbird named Frank as a pet. Alice tries to ask her home voice assistant for the weather forecast while Frank begins signing. Frank is so loud, and the voice assistant cannot hear or understand Alice.

Scenario 5

Oscar comes to visit Alice. Oscar knows that Alice needs to use her Home voice assistant to enter into a contest for a lifetime supply of pencil grips. To prevent Alice from doing so, Oscar keeps asking the voice assistant for sports jokes.

Obviously, Oscar cannot occupy the voice assistant indefinitely, so the assumption is Alice needs to use the assistant to enter the contest in a specific time frame.

Scenario 6

Alice decides to go for a walk outside when it is -40° outside. She puts on a very warm parka and scarf, placing her smartphone in the parka pocket. While on her walk, she thinks she sees Noomi Rapace. Because of the cold, she does not want to take her mittens off and asks her smartphone voice assistant, “Is Noomi Rapace filming in Tromsø right now?”. However, due to the thick parka and scarf, the voice assistant does not hear Alice.

Scenario 7

Chuck spends hours learning how to mimic Alice’s voice so that he can order a new electric tuba on the home voice assistant.

Alice did not want, nor authorize, the purchase of an electric tuba.

Scenario 8

Officer Grace performs a traffic stop and asks Alice to step outside the vehicle. While Alice is outside the vehicle, Grace asks the in-vehicle voice assistant for the location history of the vehicle.

Grace has not been given explicit permission to interact with the assistant.

Please add feedback and your scenarios in the comments.

Next steps

Please add feedback and your scenarios in the comments.

With the feedback you provide, we update and rework the scenarios. We then start on mitigation. How can you make your voice service, or use it, secure? Eventually, we want the conclusion available to all like the OWASP top 10 and help secure the opportunity of the multi-billion dollar voice channel.

Wanna join the security work? This is important work.

Every Tuesday, we meet for an hour in Zoom. Pick your time zone below and let us know in the comments to invite you, or email jon@openvoicenetwork.org.

Security & Privacy Workgroup, Weekly meeting on Tuesday

16:00 CET, Amsterdam time
10 AM EST, New York
9 AM CT, Minneapolis time
7 AM PST, San Francisco

Voice specific security

There are many security standards, ways of working, and methods available and applied in general IT systems. In this workgroup, we focus on voice-specific security. Mostly security between a smart speaker and a user. The action in and around the person speaking and the speaker. Although.. we may overlook something! Read on…

BTW we are not looking into the security of a system in general as covered by the OWASP Top 10 [https://owasp.org/www-project-top-ten/] and others.

Threat scenarios and our methodology

We use the STRIDE model to do the threat analysis. This model of threats is developed for identifying computer security threats. It provides a mnemonic for security threats in six categories:

Category Definition|
Spoofing — Pretending to be someone you are not
Tampering — Modifying data
Repudiation — I didn’t do it, no one saw me do it, you can’t prove it
Information Disclosure — Leakage of information that should be private
Denial of Service — Stopping something from working or responding
Elevation of Privilege — Upgrading from user to admin

With the scenario’s we understand what types of threats there are, and we can categorize and prioritize them for the next step: how to mitigate the threats.

Systems, definitions, and roles

To write solid scenario’s we need to determine a list of systems, definitions, and roles, so we have a coherent use of these terms and concepts.

Systems

  1. Home voice assistant — An in-home voice assistant, such as Google Home, Alexa, etc.
  2. Smartphone voice assistant — A voice assistant that is a part of a smart phone device, such as Siri, Google Assistant, Bixby, etc.
  3. In-vehicle voice assistant — An in-vehicle voice assistant, such as those found in Ford, Chevy, etc. It may be additionally connected to 3rd party voice assistants.

Definitions

  1. Vulnerability: A flaw or weakness in a system’s design, implementation, or operation
  2. Threat: A possible danger that might exploit a vulnerability

Individuals:

Note: Names are taken from fictional characters commonly used when talking about security and cryptography.

Alice — the standard user of the voice system. In systems where authorization is required, Alice is the authorized primary user.
Bob — a secondary user of the voice system. In systems where authorization is required, Bob is an authorized secondary user.
Chuck — a secondary user of the voice system. In systems where authorization is required, Chuck has limited authorization.
Eve — an unauthorized participant
Grace — A law enforcement officer
Oscar — an outside individual, not intentionally trying to interact with the system.

The Open Voice Network

The Open Voice Network (OVN) is dedicated to making voice assistance worthy of user trust — especially for a future of voice assistance that will be multi-assistant, multi-platform, multi-device, multimodal, and multi-use.

The Open Voice Network achieves its vision through the development, proposal, and implementation of standards for the global voice industry. Standards that make voice assistance worthy of user trust.

It is an independently funded and governed non-profit industry association that operates as a Linux Foundation fund. Read more here.

The Workgroup Privacy & Security

The work in the OVN is done in various workgroups. In the Workgroup Privacy & Security, the voice-specific aspects of privacy and security are researched. And when possible and relevant, standards are developed based on the research. Currently, the workgroup is in the research stage.

University of Bristol — Historical Photographs of China: Hole in Peking city wall

--

--

Maarten Lens-FitzGerald

I instigate movements that shape the future. Voice evangelist and executive consultant. Plus Project Zilver, the Dutch Voice Coalition & Open Voice Network.