Smart Assistants in IT Security - An Approach to Addressing the Challenge by Leveraging Assistants' Specific Features

Smart assistants, also known as ubiquitous personal assistants, intelligent assistants or digital personal assistants, have already entered the private sphere and are at the brink of real productive application in the business sphere as well. While those developments can make life easier for end users and increase productivity of businesses, they, at the same time, lead to concerns from the perspective of IT security and privacy. This article presents an approach to address these challenges – not through restricting these assistants but through leveraging their specific features.

[1]  Jan Zibuschka,et al.  The ENTOURAGE Privacy and Security Reference Architecture for Internet of Things Ecosystems , 2019, Open Identity Summit.

[2]  Luis A. Guerrero,et al.  Alexa vs. Siri vs. Cortana vs. Google Assistant: A Comparison of Speech-Based Natural User Interfaces , 2017 .

[3]  Gérard Chollet,et al.  Building the next generation of personal digital Assistants , 2014, 2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[4]  Nick Feamster,et al.  A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.

[5]  Scott L. Summers,et al.  The Impact of Shadow IT Systems on Perceived Information Credibility and Managerial Decision Making , 2017 .

[6]  Jeffrey M. Voas,et al.  “Alexa, Can I Trust You?” , 2017, Computer.

[7]  Chunyan Miao,et al.  A cognitive approach for agent-based personalized recommendation , 2007, Knowl. Based Syst..

[8]  Adi Shamir,et al.  IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[9]  Philippe Aghion,et al.  Artificial Intelligence and Economic Growth , 2017, The Economics of Artificial Intelligence.

[10]  Jose M. Such,et al.  Smart Home Personal Assistants , 2019, ACM Comput. Surv..

[11]  Wenyuan Xu,et al.  DolphinAttack: Inaudible Voice Commands , 2017, CCS.

[12]  Alex X. Liu,et al.  The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study , 2017, ArXiv.

[13]  Sarhan M. Musa,et al.  Artificial Intelligence in Cyber Security , 2020 .

[14]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[15]  Alex X. Liu,et al.  The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).