Goto

Collaborating Authors

 exploiting transducer


Exploiting Transducers To Break Into AI Systems: Security Issues For Autonomous Cars - AI Trends

#artificialintelligence

They wanted to try so-called walk-by attacks, whereby if you could get close enough to the voice recognition system, you could try to feed it the inaudible commands. Types of commands they used for the experiment included: "Call 1234567890," "FaceTime 1234567890," "Open dolphinattack.com," These are commands that would produce untoward actions that the person owning the voice recognition system would likely not want to happen. The devices attacked included iPhones, iPads, MacBooks, Windows PC's, Amazon Echo, etc.