[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3576915.3616650acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open access

SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase

Published: 21 November 2023 Publication History

Abstract

The Amazon Alexa marketplace is the largest Voice Personal Assistant (VPA) platform with over 100,000 voice applications (i.e., skills) published to the skills store. In an effort to maintain the quality and trustworthiness of voice-apps, Amazon Alexa has implemented a set of policy requirements to be adhered to by third-party skill developers. However, recent works reveal the prevalence of policy-violating skills in the current skills store. To understand the causes of policy violations in skills, we first conduct a user study with 34 third-party skill developers focusing on whether they are aware of the various policy requirements defined by the Amazon Alexa platform. Our user study results show that there is a notable gap between VPA's policy requirements and skill developers' practices. As a result, it is inevitable that policy-violating skills will be published.
To prevent the inflow of new policy-breaking skills to the skills store from the source, it is critical to identify potential policy violations at the development phase. In this work, we design and develop SkillScanner, an efficient static code analysis tool to facilitate third-party developers to detect policy violations early in the skill development lifecycle. To evaluate the performance of SkillScanner, we conducted an empirical study on 2,451 open source skills collected from GitHub. SkillScanner effectively identified 1,328 different policy violations from 786 skills. Our results suggest that 32% of these policy violations are introduced through code duplication (i.e., code copy and paste). In particular, we found that 42 skill code examples from potential Alexa's official accounts (e.g., ''alexa'' and ''alexa-samples'' on GitHub) contain policy violations, which lead to 81 policy violations in other skills due to the copy-pasted code snippets from these Alexa's code examples.

References

[1]
Alexa Certification Tests for VUI and UX. https://developer.amazon.com/fr-FR/docs/alexa/custom-skills/voice-interface-and-user-experience-testing-for-a-custom-skill.html.
[2]
Alexa Permissions. https://developer.amazon.com/en-US/docs/alexa/custom-skills/configure-permissions-for-customer-information-in-your-skill.html.
[3]
Alexa Policy for Child-Directed skill. https://developer.amazon.com/fr-FR/docs/ alexa/custom-skills/policy-testing-for-an-alexa-skill.html#cert-child-directed.
[4]
Alexa Policy for Health skill. https://developer.amazon.com/fr-FR/docs/alexa/ custom-skills/policy-testing-for-an-alexa-skill.html#3-health.
[5]
Alexa Skill Counts Surpass 80K in US. https://voicebot.ai/2021/01/14/alexa-skill-counts-surpass-80k-in-us-spain-adds-the-most-skills-new-skill-introduction-rate-continues-to-fall-across-countries.
[6]
Alexa Skills Policy Testing. https://developer.amazon.com/fr/docs/custom-skills/policy-testing-for-an-alexa-skill.html.
[7]
Alexa Skills Privacy Requirements. https://developer.amazon.com/fr/docs/custom-skills/security-testing-for-an-alexa-skill.html#25-privacy-requirements.
[8]
CodeQL. https://codeql.github.com/.
[9]
copydetect. https://github.com/blingenf/copydetect.
[10]
First Alexa Third-Party Skills Now Available for Amazon Echo. https://developer.amazon.com/es/blogs/alexa/post/TxC2VHKFEIZ9SG/first-alexa-third-party-skills-now-available-for-amazon-echo.
[11]
Perspective. https://www.perspectiveapi.com/home.
[12]
pytesseract 0.3.7. https://pypi.org/project/pytesseract/.
[13]
Qualitrics. https://www.qualtrics.com/.
[14]
Sensitive data types: Personal information. https://docs.aws.amazon.com/macie/ latest/user/managed-data-identifiers.html#managed-data-identifiers-pii.
[15]
Skill Account Linking Schemas. https://developer.amazon.com/en-US/docs/alexa/smapi/account-linking-schemas.html.
[16]
Skill Interaction Model Schemas. https://developer.amazon.com/en-US/docs/alexa/smapi/interaction-model-schema.html.
[17]
Skill Manifest Schema. https://developer.amazon.com/en-US/docs/alexa/smapi/skill-manifest.html.
[18]
Skill Package Format. https://developer.amazon.com/en-US/docs/alexa/hosted-skills/alexa-hosted-skills-git-import.html.
[19]
Skill Slot Type Reference. https://developer.amazon.com/en-US/docs/alexa/custom-skills/slot-type-reference.html.
[20]
Skill Standard Built-in Intents. https://developer.amazon.com/en-US/docs/alexa/custom-skills/standard-built-in-intents.html.
[21]
spaCy. https://spacy.io.
[22]
SpeechRecognition 3.8.1. https://pypi.org/project/SpeechRecognition/.
[23]
VirusTotal. https://www.virustotal.com/gui/home/search.
[24]
Noura Abdi, Kopo M Ramokapane, and Jose M Such. More than smart speakers: Security and privacy perceptions of smart home personal assistants. In SOUPS@ USENIX Security Symposium, 2019.
[25]
Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, and Patrick Traynor. Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems. In 2021 IEEE Symposium on Security and Privacy (SP), pages 730--747, 2021.
[26]
Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, and Kassem Fawaz. Towards more robust keyword spotting for voice assistants. In 31st USENIX Security Symposium (USENIX Security 22), 2022.
[27]
Tawfiq Ammari, Jofish Kaye, Janice Y. Tsai, and Frank Bentley. Music, search, and iot: How people (really) use voice assistants. ACM Transactions on Computer-Human Interaction (TOCHI), 26(3):1--28, 2019.
[28]
Travis D Breaux, Hanan Hibshi, and Ashwini Rao. Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements. Requirements Engineering, 19(3):281--307, 2014.
[29]
Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. Hidden voice commands. In USENIX Security Symposium (USENIX Security), pages 513--530, 2016.
[30]
Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, and Yang Liu. Who is real bob? adversarial attacks on speaker recognition systems. In IEEE Symposium on Security and Privacy (SP), 2021.
[31]
Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, and Wenyuan Xu. Fakewake: Understanding and mitigating fake wake-up words of voice assistants. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pages 1861--1883, 2021.
[32]
Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, and Hongxin Hu. Dangerous skills got certified: Measuring the trustworthiness of skill certification in voice personal assistant platforms. In ACM SIGSAC Con-ference on Computer and Communications Security (CCS), 2020.
[33]
Peng Cheng and Utz Roedig. Personal voice assistant security and privacy-a survey. Proceedings of the IEEE, 110(4):476--507, 2022.
[34]
H. Chung, M. Iorga, J. Voas, and S. Lee. ?alexa, can i trust you?". IEEE Computer, 50(9):100--104, 2017.
[35]
Jide Edu, Xavi Ferrer Aran, Jose Such, and Guillermo Suarez-Tangil. Skillvet: Automated traceability analysis of amazon alexa skills. IEEE Transactions on Dependable and Secure Computing, 2021.
[36]
Jide Edu, Xavier Ferrer-Aran, Jose Such, and Guillermo Suarez-Tangil. Measuring alexa skill privacy practices across three years. In Proceedings of the ACM Web Conference (WWW), page 670--680, 2022.
[37]
Jide S. Edu, Jose M. Such, and Guillermo Suarez-Tangil. Smart home personal assistants: A security and privacy review. ACM Computing Surveys, 53(6), 2020.
[38]
Sergio Esposito, Daniele Sgandurra, and Giampaolo Bella. Alexa versus alexa: Controlling smart speakers by self-issuing voice commands. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pages 1064--1078, 2022.
[39]
Zhixiu Guo, Zijin Lin, Pan Li, and Kai Chen. Skillexplorer: Understanding the behavior of skills in large scale. In 29th {USENIX} Security Symposium ({USENIX} Security 20), pages 2649--2666, 2020.
[40]
Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey. Skill Squatting Attacks on Amazon Alexa. In 27th USENIX Security Symposium (USENIX Security), pages 33--47, 2018.
[41]
Christopher Lentzsch, Sheel Jayesh Shah, Benjamin Andow, Martin Degeling, Anupam Das, and William Enck. Hey Alexa, is this skill safe?: Taking a closer look at the Alexa skill ecosystem. In Proceedings of the 28th ISOC Annual Network and Distributed Systems Symposium (NDSS), 2021.
[42]
Suwan Li, Lei Bu, Guangdong Bai, Zhixiu Guo, Kai Chen, and Hanlin Wei. Vitas: Guided model-based vui testing of vpa apps. In 37th IEEE/ACM International Conference on Automated Software Engineering, pages 1--12, 2022.
[43]
Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, and Huixing Deng. Measuring the effectiveness of privacy policies for voice assistant applications. In Annual Computer Security Applications Conference (ACSAC), page 856--869, 2020.
[44]
Gary Liu and Nathan Malkin. Effects of privacy permissions on user choices in voice assistant app stores. Proceedings on Privacy Enhancing Technologies, 4:421--439, 2022.
[45]
Nathan Malkin, David Wagner, and Serge Egelman. Runtime permissions for privacy in proactive intelligent assistants. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pages 633--651, 2022.
[46]
Erika McCallister. Guide to protecting the confidentiality of personally identifiable information, volume 800. Diane Publishing, 2010.
[47]
Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, and Yuan Tian. Your microphone array retains your identity: A robust voice liveness detection system for smart speaker. In USENIX Security, 2022.
[48]
Lisa Parker, Tanya Karliychuk, Donna Gillies, Barbara Mintzes, Melissa Raven, and Quinn Grundy. A health app developer's guide to law and policy: a multi-sector policy analysis. BMC Medical Informatics and Decision Making, 2017.
[49]
Aafaq Sabir, Evan Lafontaine, and Anupam Das. Hey alexa, who am i talking to?: Analyzing users' perception and awareness regarding third-party alexa skills. In CHI Conference on Human Factors in Computing Systems, pages 1--15, 2022.
[50]
Awanthika Senarath and Nalin A. G. Arachchilage. Why developers cannot embed privacy into software systems? an empirical investigation. In Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018, page 211--216, 2018.
[51]
Vandit Sharma and Mainack Mondal. Understanding and improving usability of data dashboards for simplified privacy control of voice assistant data. In 31st USENIX Security Symposium (USENIX Security 22), pages 3379--3395, 2022.
[52]
Swapneel Sheth, Gail Kaiser, and Walid Maalej. Us and them: A study of privacy requirements across north america, asia, and europe. In Proceedings of the 36th International Conference on Software Engineering (ICSE), page 859--870, 2014.
[53]
Faysal Hossain Shezan, Hang Hu, Gang Wang, and Yuan Tian. Verhealth: Vetting medical voice applications through policy enforcement. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020.
[54]
Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, and Wei Wang. "are you home alone?" yes" disclosing security and privacy vulnerabilities in alexa skills. arXiv preprint arXiv:2010.10788, 2020.
[55]
Dawei Wang, Kai Chen, and Wei Wang. Demystifying the vetting process of voice-controlled skills on markets. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 5(3), 2021.
[56]
Yuanda Wang, Hanqing Guo, and Qiben Yan. Ghosttalk: Interactive attack on smartphone voice system through power line. arXiv preprint arXiv:2202.02585, 2022.
[57]
Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, and Wenyuan Xu. A survey on voice assistant security: Attacks and countermeasures. ACM Computing Surveys, 2022.
[58]
Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, and Ning Zhang. Surfingattack: Interactive hidden attack on voice assistants using ultrasonic guided wave. In Network and Distributed Systems Security (NDSS) Symposium, 2020.
[59]
Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu, and Huixing Deng. SkillDe- tective: Automated policy-violation detection of voice assistant applications in the wild. In USENIX Security Symposium (USENIX Security), 2022.
[60]
Le Yu, Xiapu Luo, Xule Liu, and Tao Zhang. Can we trust the privacy policies of android apps? In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pages 538--549. IEEE, 2016.
[61]
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. Dolphinattack: Inaudible voice commands. In ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 103--117, 2017.
[62]
Nan Zhang, Xianghang Mi, Xuan Feng, Xiao Feng Wang, Yuan Tian, and Feng Qian. Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In 2019 IEEE Symposium on Security and Privacy (SP), pages 1381--1396. IEEE, 2019.
[63]
Yangyong Zhang, Lei Xu, Abner Mendoza, Guangliang Yang, Phakpoom Chin-prutthiwong, and Guofei Gu. Life after speech recognition: Fuzzing semantic misinterpretation for voice assistant applications. In Network and Distributed System Security Symposium (NDSS), 2019.
[64]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. User perceptions of smart home iot privacy. Proc. ACM Hum.-Comput. Interact., 2018

Cited By

View all
  • (2024)A First Look at Security and Privacy Risks in the RapidAPI EcosystemProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690294(1626-1640)Online publication date: 2-Dec-2024
  • (2024)Command Hijacking on Voice-Controlled IoT in Amazon Alexa PlatformProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657010(654-666)Online publication date: 1-Jul-2024
  • (2024)Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European MarketplacesProceedings of the ACM Web Conference 202410.1145/3589334.3645409(1081-1091)Online publication date: 13-May-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
November 2023
3722 pages
ISBN:9798400700507
DOI:10.1145/3576915
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 November 2023

Check for updates

Author Tags

  1. amazon alexa
  2. policy violation detection
  3. static analysis

Qualifiers

  • Research-article

Funding Sources

  • National Science Foundation (NSF) CCF
  • National Science Foundation (NSF) IIS
  • National Science Foundation (NSF)
  • National Science Foundation (NSF) CNS

Conference

CCS '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)468
  • Downloads (Last 6 weeks)43
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A First Look at Security and Privacy Risks in the RapidAPI EcosystemProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690294(1626-1640)Online publication date: 2-Dec-2024
  • (2024)Command Hijacking on Voice-Controlled IoT in Amazon Alexa PlatformProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657010(654-666)Online publication date: 1-Jul-2024
  • (2024)Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European MarketplacesProceedings of the ACM Web Conference 202410.1145/3589334.3645409(1081-1091)Online publication date: 13-May-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media