MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes (2404.01106v2)
Abstract: Voice authentication has been widely used on smartphones. However, it remains vulnerable to spoofing attacks, where the attacker replays recorded voice samples from authentic humans using loudspeakers to bypass the voice authentication system. In this paper, we present MagLive, a robust voice liveness detection scheme designed for smartphones to mitigate such spoofing attacks. MagLive leverages the differences in magnetic pattern changes generated by different speakers (i.e., humans or loudspeakers) when speaking for liveness detection, which are captured by the built-in magnetometer on smartphones. To extract effective and robust magnetic features, MagLive utilizes a TF-CNN-SAF model as the feature extractor, which includes a time-frequency convolutional neural network (TF-CNN) combined with a self-attention-based fusion (SAF) model. Supervised contrastive learning is then employed to achieve user-irrelevance, device-irrelevance, and content-irrelevance. MagLive imposes no additional burden on users and does not rely on active sensing or specialized hardware. We conducted comprehensive experiments with various settings to evaluate the security and robustness of MagLive. Our results demonstrate that MagLive effectively distinguishes between humans and attackers (i.e., loudspeakers), achieving an average balanced accuracy (BAC) of 99.01% and an equal error rate (EER) of 0.77%.
- “Voiceprint: The New WeChat Password,” https://blog.wechat.com/2015/05/21/voiceprint-the-new-wechat-password/.
- “Citi Uses Voice Prints To Authenticate Customers Quickly And Effortlessly,” https://www.forbes.com/sites/tomgroenfeldt/2016/06/27/citi-uses-voice-prints-to-authenticate-customers-quickly-and-effortlessly/.
- Z. Li, C. Shi, T. Zhang, Y. Xie, J. Liu, B. Yuan, and Y. Chen, “Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array,” in Conference on Computer and Communications Security (CCS), 2021.
- Y. Meng, J. Li, M. Pillari, A. Deopujari, L. Brennan, H. Shamsie, H. Zhu, and Y. Tian, “Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers,” in USENIX Security Symposium, 2022.
- Q. Yang, K. Cui, and Y. Zheng, “VoShield: Voice Liveness Detection with Sound Field Dynamics,” in IEEE Conference on Computer Communications (INFOCOM), 2023.
- Y. Lee, Y. Zhao, J. Zeng, K. Lee, N. Zhang, F. H. Shezan, Y. Tian, K. Chen, and X. Wang, “Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers,” Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2020.
- Y. Meng, Z. Wang, W. Zhang, P. Wu, H. Zhu, X. Liang, and Y. Liu, “WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment,” in ACM Interational Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2018.
- C. Zhao, Z. Li, H. Ding, W. Xi, G. Wang, and J. Zhao, “Anti-Spoofing Voice Commands: A Generic Wireless Assisted Design,” Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2021.
- S. Pradhan, W. Sun, G. Baig, and L. Qiu, “Combating Replay Attacks Against Voice Assistants,” Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2019.
- H. Li, C. Xu, A. S. Rathore, Z. Li, H. Zhang, C. Song, K. Wang, L. Su, F. Lin, K. Ren et al., “VocalPrint: exploring a resilient and secure voice authentication via mmWave biometric interrogation,” in ACM International Conference on Embedded Networked Sensor Systems (SenSys), 2020.
- C. Shi, Y. Wang, Y. Chen, N. Saxena, and C. Wang, “WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training,” in Annual Computer Security Applications Conference (ACSAC), 2020.
- H. Feng, K. Fawaz, and K. G. Shin, “Continuous Authentication for Voice Assistants,” in ACM Conference on Mobile Computing and Networking (MobiCom), 2017.
- L. Blue, H. Abdullah, L. Vargas, and P. Traynor, “2MA: Verifying Voice Commands via Two Microphone Authentication,” in ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2018.
- C. Yan, Y. Long, X. Ji, and W. Xu, “The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification,” in Conference on Computer and Communications Security (CCS), 2019.
- L. Zhang, S. Tan, and J. Yang, “Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication,” in Conference on Computer and Communications Security (CCS), 2017.
- L. Lu, J. Yu, Y. Chen, H. Liu, Y. Zhu, Y. Liu, and M. Li, “LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals,” in IEEE Conference on Computer Communications (INFOCOM), 2018.
- L. Wu, J. Yang, M. Zhou, Y. Chen, and Q. Wang, “LVID: A Multimodal Biometrics Authentication System on Smartphones,” IEEE Transactions on Information Forensics and Security (TIFS), 2019.
- Y. Chen, M. Xue, J. Zhang, Q. Guan, Z. Wang, Q. Zhang, and W. Wang, “ChestLive: Fortifying Voice-based Authentication with Chest Motion Biometric on Smart Devices,” Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2021.
- Y. Wang, W. Cai, T. Gu, W. Shao, Y. Li, and Y. Yu, “Secure Your Voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants,” Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2019.
- L. Zhang, S. Tan, J. Yang, and Y. Chen, “VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones,” in Conference on Computer and Communications Security (CCS), 2016.
- L. Blue, L. Vargas, and P. Traynor, “Hello, Is It Me You’re Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security,” in Wireless Network Security (WISEC), 2018.
- M. E. Ahmed, I.-Y. Kwak, J. H. Huh, I. Kim, T. Oh, and H. Kim, “Void: A fast and light voice liveness detection system,” in USENIX Security Symposium, 2020.
- S. Chen, K. Ren, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, and A. Mohaisen, “You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones,” in IEEE International Conference on Distributed Computing Systems (ICDCS), 2017.
- S. Wang, J. Cao, X. He, K. Sun, and Q. Li, “When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition,” in Conference on Computer and Communications Security (CCS), 2020.
- L. Blue, K. Warren, H. Abdullah, C. Gibson, L. Vargas, J. O’Dell, K. Butler, and P. Traynor, “Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction,” in USENIX Security Symposium, 2022.
- T. Liu, F. Lin, Z. Wang, C. Wang, Z. Ba, L. Lu, W. Xu, and K. Ren, “MagBackdoor: Beware of Your Loudspeaker as a Backdoor for Magnetic Injection Attacks,” in IEEE Symposium on Security and Privacy (SP), 2023.
- Z. Wu, N. Evans, T. Kinnunen, J. Yamagishi, F. Alegre, and H. Li, “Spoofing and countermeasures for speaker verification: A survey,” Speech Communication, 2015.
- J. Yamagishi, X. Wang, M. Todisco, M. Sahidullah, J. Patino, A. Nautsch, X. Liu, K. A. Lee, T. Kinnunen, N. Evans et al., “ASVspoof 2021: accelerating progress in spoofed and deepfake speech detection,” in ASVspoof Workshop, 2021.
- C. Yan, X. Ji, K. Wang, Q. Jiang, Z. Jin, and W. Xu, “A Survey on Voice Assistant Security: Attacks and Countermeasures,” ACM Computing Surveys, 2022.
- E. Wenger, M. Bronckers, C. Cianfarani, J. Cryan, A. Sha, H. Zheng, and B. Y. Zhao, “”Hello, It’s Me”: Deep Learning-based Speech Synthesis Attacks in the Real World,” in Annual ACM Conference on Computer and Communications Security (CCS), 2021.
- J. Deng, Y. Chen, Y. Zhong, Q. Miao, X. Gong, and W. Xu, “Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion,” in USENIX Security Symposium, 2023.
- A. Kassis and U. Hengartner, “Breaking Security-Critical Voice Authentication,” in IEEE Symposium on Security and Privacy (SP), 2023.
- Z. Yu, Y. Chang, N. Zhang, and C. Xiao, “SMACK: Semantically Meaningful Adversarial Audio Attack,” in USENIX Security Symposium, 2023.
- Q. Liao, Y. Huang, Y. Huang, Y. Zhong, H. Jin, and K. Wu, “MagEar: eavesdropping via audio recovery using magnetic side channel,” in ACM SIGMOBILE International Conference on Mobile Systems, Applications, and Services (MobiSys), 2022.
- C. Wu, J. Chen, K. He, Z. Zhao, R. Du, and C. Zhang, “EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices,” in Conference on Computer and Communications Security (CCS), 2022.
- Q. Yang and Y. Zheng, “DeepEar: Sound Localization with Binaural Microphones,” IEEE Conference on Computer Communications (INFOCOM), 2022.
- C. Cai, H. Pu, L. Ye, H. Jiang, and J. Luo, “Active Acoustic Sensing for “Hearing” Temperature Under Acoustic Interference,” IEEE Transactions on Mobile Computing (TMC), 2021.
- T. Tao, H. Zheng, J. Yang, Z. Guo, Y. Zhang, J. Ao, Y. Chen, W. Lin, and X. Tan, “Sound Localization and Speech Enhancement Algorithm Based on Dual-Microphone,” Sensors, 2022.
- L. Wang, M. Chen, L. Lu, Z. Ba, F. Lin, and K. Ren, “VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices,” Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2023.
- H. Pan, F. Tan, W. Li, Y.-C. Chen, L. Yang, G. Xue, and X. Ji, “MagDefender: Detecting Eavesdropping on Mobile Devices using the Built-in Magnetometer,” in Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 2022.
- M. Wang, Q. Luo, Y. Iravantchi, X. Chen, A. Sample, K. G. Shin, X. Tian, X. Wang, and D. Chen, “Automatic calibration of magnetic tracking,” in International Conference on Mobile Computing and Networking (MobiCom), 2022.
- Y. Cao, F. Li, H. Chen, X. Liu, C. Duan, and Y. Wang, “I Can Hear You Without a Microphone: Live Speech Eavesdropping From Earphone Motion Sensors,” in IEEE Conference on Computer Communications (INFOCOM), 2023.
- C. Wu, K. He, J. Chen, Z. Zhao, and R. Du, “Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks,” in USENIX Security Symposium, 2020.
- J. Hu, L. Shen, and G. Sun, “Squeeze-and-Excitation Networks,” in Computer Vision and Pattern Recognition (CVPR), 2018.
- P. Khosla, P. Teterwak, C. Wang, A. Sarna, Y. Tian, P. Isola, A. Maschinot, C. Liu, and D. Krishnan, “Supervised Contrastive Learning,” Conference on Neural Information Processing Systems (NeurIPS), 2020.
- H. Cao, D. Liu, H. Jiang, C. Cai, T. Zheng, J. C. Lui, and J. Luo, “HandKey: Knocking-Triggered Robust Vibration Signature for Keyless Unlocking,” IEEE Transactions on Mobile Computing (TMC), 2024.
- “Sensor Logger,” https://www.tszheichoi.com/sensorlogger.
- C. Wu, K. He, J. Chen, Z. Zhao, and R. Du, “Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-touch Behaviors,” IEEE Transactions on Dependable and Secure Computing (TDSC), 2021.
- Y. Chen, J. Yu, L. Kong, H. Kong, Y. Zhu, and Y.-C. Chen, “RF-Mic: Live Voice Eavesdropping via Capturing Subtle Facial Speech Dynamics Leveraging RFID,” Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2023.
- H. Cao, H. Jiang, D. Liu, R. Wang, G. Min, J. Liu, S. Dustdar, and J. C. Lui, “LiveProbe: Exploring Continuous Voice Liveness Detection via Phonemic Energy Response Patterns,” IEEE Internet of Things Journal, 2022.
- Q. Wang, X. Lin, M. Zhou, Y. Chen, C. Wang, Q. Li, and X. Luo, “VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones,” in IEEE Conference on Computer Communications (INFOCOM), 2019.
- Z. Liu, F. Lin, C. Wang, Y. Shen, Z. Ba, L. Lu, W. Xu, and K. Ren, “CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations,” Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2023.
- Xiping Sun (4 papers)
- Jing Chen (215 papers)
- Cong Wu (33 papers)
- Kun He (177 papers)
- Haozhe Xu (3 papers)
- Yebo Feng (26 papers)
- Ruiying Du (13 papers)
- Xianhao Chen (50 papers)