Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

University of Texas Rio Grande Valley

Series

2022

Security

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

A Survey On Security Analysis Of Amazon Echo Devices, Surendra Pathak, Sheikh Ariful Islam, Honglu Jiang, Lei Xu, Emmett Tomai Dec 2022

A Survey On Security Analysis Of Amazon Echo Devices, Surendra Pathak, Sheikh Ariful Islam, Honglu Jiang, Lei Xu, Emmett Tomai

Computer Science Faculty Publications and Presentations

Since its launch in 2014, Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and offices. With a market worth millions of dollars, Echo is used for diverse tasks such as accessing online information, making phone calls, purchasing items, and controlling the smart home. Echo offers user-friendly voice interaction to automate everyday tasks making it a massive success. Though many people view Amazon Echo as a helpful assistant at home or office, few know its underlying security and privacy implications. In this paper, we present the findings of our research on Amazon Echo’s security …