Derleme
BibTex RIS Kaynak Göster

Types of cyber-attacks with using voice

Yıl 2025, Sayı: 061, 137 - 165, 30.06.2025

Öz

Recently, attacks targeting individuals, organizations and even critical voice-activated systems have become widespread one after another. Basically, these are unauthorized access or control of a device using manipulated or synthesized voice commands to attack an identified vulnerability in voice technologies, usually supporting smart assistants and smart speakers. While such attacks are diversifying simultaneously with the regular implementation of voice technologies in daily life, the potential consequences of such attacks also increase their impact in cases where most users and organizations are not sufficiently aware. In this study, various voice-based cyber-attacks, such as voice phishing (vishing), voice command manipulation, attacks using ultrasonic sound waves, hard disk attacks via voice commands and acoustic eavesdropping attacks, their methods (e.g., synthesizing deceptive voice commands, using ultrasonic frequencies to bypass security systems, manipulating devices through inaudible commands, exploiting voice interfaces to access sensitive data on hard drives, capturing private conversations using sound waves) and possible effects are investigated and some legal situations related to these threats are also touched upon in the context of the current cyber security environment in Türkiye. This study aims to increase awareness by providing a comprehensive analysis of voice-based cyber-attacks and to better inform users and cybersecurity professionals about effective prevention and mitigation strategies. It serves as a comprehensive review of existing research in this field.

Kaynakça

  • [1] T. D. Rossing, F. R. Moore, and P. A. Wheeler, The Science of Sound, 3rd ed. SF, USA: Addison Wesley, 2002.
  • [2] B. Mulgrew, P. Grant, and J. Thompson, Digital Signal Processing: Concepts and Applications. London, 1st ed. U.K.: Palgrave HE UK, 1999.
  • [3] B. Naqvi, K. Perova, A. Farooq, I. Makhdoom, S. Oyedeji and J. Porras, “Mitigation strategies against phishing attacks: A systematic literature review,” Comput. & Security, vol. 132, p. 103387, 2023, doi: 10.1016/j.cose.2023.103387.
  • [4] W. Stallings, Network Security Essentials: Applications and Standards, 6th ed. Upper Saddle River, NJ, USA: Pearson, 2016.
  • [5] A. Saxena. “What is cybersecurity and why is it important?” Sprinto.com. https://sprinto.com/blog/importance-of-cyber-security/ (accessed Nov. 11, 2024).
  • [6] R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. Hoboken, NJ, USA: Wiley, 2021.
  • [7] M. E. Whitman and H. J. Mattord, Management of Information Security, 6th ed. Boston, MA, USA: Cengage Learning, 2018.
  • [8] V Malik, A. Khanna, N. Sharma, and S. Nalluri, (2024). Trends in Ransomware Attacks: Analysis and Future Predictions. International Journal of Global Innovations and Solutions (IJGIS). doi:10.21428/e90189c8.f2996624.
  • [9] J. Mirkovic and P. Reiher, (2004). “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no.2, pp. 39-53. doi:10.1145/997150.997156.
  • [10] P. Cheng and U. Roedig, “Personal voice assistant security and privacy-A survey,” IEEE J. Emerg. Sel. Top. Circuits Syst., vol. 10, no. 4, pp. 476–507, Apr. 2022, doi: 10.1109/JPROC.2022.3153167. https://doi.org/10.1109/JPROC.2022.3153167.
  • [11] D. Bilika, N. Michopoulou, E. Alepis, and C. Patsakis, “Hello me, meet the real me: Voice synthesis attacks on voice assistants,” Computers & Security, vol. 137, p. 103617, 2024, doi: 10.1016/j.cose.2023.103617.
  • [12] A. G. Desetty, V. D. Jangampet, and S. R. Pulyala, "Phishing attacks: Evolving techniques, emerging trends, and countermeasure strategies," International Journal for Innovative Engineering and Management Research, vol. 9, no. 12, pp. 985–991, 2020. [Online]. Available: https://www.researchgate.net/profile/Vinay-Dutt/publication/376645699_Phishing_Attacks_Evolving_Techniques_Emerging_Trends_and_Countermeasure_Strategies/links/673eb65d440ad82b18a086fb/Phishing-Attacks-Evolving-Techniques-Emerging-Trends-and-Countermeasure-Strategies.pdf
  • [13] A. Ansari and M. Nazir. “Risk assessment of security vulnerabilities in smart home using CAPEC and defensive goals.” Advances in Data and Information Science, vol 318, p. 705–722, 2022, doi:10.1007/978-981-16-5689-7_63.
  • [14] F. McKee and D. Noever, “Acoustic cybersecurity: Exploiting voice-activated systems,” Cryptography and Security, vol. 2023, p. 2312.00039, 2023, doi:10.48550/arXiv.2312.00039.
  • [15] S. Hussain, P. Neekhara, S. Dubnov, J. McAuley and F. Koushanfar, “WaveGuard: Understanding and mitigating audio adversarial examples,” in Usenix Security 2021, 2021, pp. 1–10, doi:10.48550/arXiv.2103.03344.
  • [16] D. Buil-Gil, S. Kemp, S. Kuenzel, L. Coventry, S. Zakhary, D. Tilley and J. Nicholson, “The digital harms of smart home devices: A systematic literature review,” Comput. in Hum. Behav., vol. 145, p. 107770, 2023, doi: 10.1016/j.chb.2023.107770.
  • [17] F. Toapanta, B. Rivadeneira, C. Tipantuña, and D. Guamán, “AI-Driven vishing attacks: A practical approach,” Engineering Proceedings, vol. 77, no. 1, p. 15, 2024, doi: 10.3390/engproc2024077015.
  • [18] C. Dinu. “What is vishing? Unmasking voice phishing scams and techniques.” TextMagic.com. https://www.textmagic.com/blog/what-is-vishing/ (accessed Nov. 11, 2024).
  • [19] N. Bhatnagar and M. Pry, “Student attitudes, awareness, and perceptions of personal privacy and cybersecurity in the use of social media: An initial study,” Information Systems Education Journal, vol. 18, no. 1, pp. 48–58, 2020. [Online]. Available: https://files.eric.ed.gov/fulltext/EJ1246231.pdf
  • [20] C. S. Kayser, S. Back, and M. M. Toro-Alvarez, "Identity theft: The importance of prosecuting on behalf of victims," Laws, vol. 13, no. 6, pp. 68, 2024, doi: 10.3390/laws13060068.
  • [21] K. Marchini. “2018 Identity fraud: Fraud enters a new era of complexity.” JavelinStrategy.com. https://www.javelinstrategy.com/research/2018-identity-fraud-fraud-enters-new-era-complexity (accessed Nov. 11, 2024).
  • [22] M.A. Siddiqi, W. Pak and M.A. Siddiqi, “A study on the psychology of social engineering-based cyberattacks and existing countermeasures,” Appl. Sci., vol. 12, p. 6042, 2022, doi: 10.3390/app12126042.
  • [23] G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang and W. Xu, “DolphinAttack: Inaudible voice commands,” in ACM SIGSAC Conf. on Computer and Communications Security (CCS ’17), 2017, pp. 103–117, doi: 10.1145/3133956.3134052.
  • [24] H. Shah, M.Z. Rashid, M.F. Abdollah, M.N. Kamarudin, C.K. Lin and Z. Kamis, “Biometric voice recognition in security system,” Indian J. Sci. Technol., vol. 7, no. 1, pp. 104–112, Jan. 2014, doi: 10.17485/ijst/2014/v7i1.9.
  • [25] A. Hamed and N. Abdelbaki, “Acoustic attacks in iot era: Risks and mitigations,” in Proc. of the 2020 5th Int. Conf. on Cloud Computing and Internet of Things (CCIOT '20), Okinawa, Japan, 2020, pp. 13–19, doi: 10.1145/3429523.3429530.
  • [26] European Parliamentary Research Service, “Data subjects, digital surveillance, AI and the future of work,” in Panel for the Future of Science and Technology, Dec. 2020. [Online]. Available: https://www.europarl.europa.eu/RegData/etudes/STUD/2020/656305/EPRS_STU(2020)656305_EN.pdf
  • [27] A. Dixit, N. Kaur, and S. Kingra, “Review of audio deepfake detection techniques: Issues and prospects,” Expert Systems, vol. 40, e13322, 2023, doi: 10.1111/exsy.13322.
  • [28] N. Robins-Early. “CEO of WPP Targeted by Deepfake Scam.” TheGuardian.com. https://www.theguardian.com/technology/article/2024/may/10/ceo-wpp-deepfake-scam (accessed Jan. 9, 2025).
  • [29] M. U. Tanveer, K. Munir, M. Amjad, A. U. Rehman and A. Bermak, “Unmasking the fake: Machine learning approach for deepfake voice detection,” in IEEE Access, vol. 12, pp. 197442-197453, Apr. 2024, doi: 10.1109/ACCESS.2024.3521026.
  • [30] Z. Cai, A. Dhall, S. Ghosh, M. Hayat, D. Kollias, K. Stefanov and U. Tariq, “1M-Deepfakes detection challenge,” in Proc. 32nd ACM Int. Conf. Multimedia (MM ’24), 2024, pp. 11355–11359, doi: 10.1145/3664647.3689145.
  • [31] J. R. Reeder and T. Hall, “Cybersecurity’s Pearl Harbor moment: Lessons learned from the colonial pipeline ransomware attack,” The Cyber Defense Review, vol. 6, no. 3, pp. 15–40, 2021. [Online]. Available: https://www.jstor.org/stable/48631153.
  • [32] S. S. Wang, “Integrated framework for information security investment and cyber insurance,” Pacific-Basin Finance Journal, vol. 57, pp. 101173, 2019, doi: 10.1016/j.pacfin.2019.101173.
  • [33] Q. Xia, Q. Chen and S. Xu, “Near-ultrasound inaudible trojan (nuit): Exploiting your speaker to attack your microphone,” in Proc. 32nd USENIX Security Symp. (USENIX Security 23), Anaheim, CA, 2023, pp. 4589–4606. [Online]. Available: https://www.usenix.org/conference/usenixsecurity23/presentation/xia.
  • [34] C. Yan, X. Ji, K. Wang, Q. Jiang, Z. Jin and W. Xu, “A survey on voice assistant security: Attacks and countermeasures,” ACM Comput. Surv., vol. 55, no. 4, Art. no. 84, Apr. 2023, pp. 1–36, doi: 10.1145/3527153.
  • [35] J. S. Lloyd, C. G. Ludwikowski, C. Malik and C. Shen, "Mitigating inaudible ultrasound attacks on voice assistants with acoustic metamaterials," IEEE Access, vol. 11, pp. 36464-36470, 2023, doi: 10.1109/ACCESS.2023.3266722.
  • [36] F. Hall, L. Maglaras, T. Aivaliotis, L. Xagoraris and I. Kantzavelou, “Smart homes: Security challenges and privacy concerns,” in Proc. 2020 arXiv Preprint, Oct. 2020. [Online]. Available: https://arxiv.org/abs/2010.15394.
  • [37] Q. Yan, K. Liu, Q. Zhou, H. Guo and N. Zhang, “SurfingAttack: Interactive hidden attack on voice assistants using ultrasonic guided waves,” in Proc. Network and Distributed System Security Symposium (NDSS), 2020. doi: 10.14722/ndss.2020.24068.
  • [38] C. Bolton, S. Rampazzi, C. Li, A. Kwong, W. Xu and K. Fu, "Blue note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems," in 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2018, pp. 1048-1062, doi: 10.1109/SP.2018.00050.
  • [39] A. Kwong, W. Xu and K. Fu, "Hard drive of hearing: Disks that eavesdrop with a synthesized microphone," in 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2019, pp. 905-919, doi: 10.1109/SP.2019.00008.
  • [40] S. Panda, Y. Liu, G. P. Hancke and U. M. Qureshi, “Behavioral acoustic emanations: Attack and verification of PIN entry using keypress sounds,” Sensors, vol. 20, no. 11, pp. 3015, Nov. 2020, doi: 10.3390/s20113015.
  • [41] X. Xu, Y. Liang, X. Zhang, Y. Wang, Y. Lin, B. Adebisi, H. Gacanin and G. Gui, “Self-evolving malware detection for cyber security using network traffic and incremental learning,” in Conference: 2022 9th International Conference on Dependable Systems and Their Applications (DSA), 2022, pp. 454–463, doi: 10.1109/DSA56465.2022.00066.
  • [42] H. Ahmetoglu and R. Das, “A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges and future research directions,” Internet of Things, vol. 20, p. 100615, 2022, doi: 10.1016/j.iot.2022.100615.
  • [43] B. Akbulut, “The principle of legality in the law of misdemeanors and violation the measures taken due to Covid-19,” Journal of Penal Law and Criminology, vol. 9, no. 1, pp. 197–253, 2021. doi: 10.26650/JPLC2020-837085.
  • [44] R. Erbaş, “Organized crime-related legislation in the Turkish criminal law,” Ceza Hukuku ve Kriminoloji Dergisi, vol. 3, no. 1, pp. 275–311, Jun. 2015. [Online]. Available: https://dergipark.org.tr/tr/download/article-file/14682.
  • [45] Council of Europe. “Convention on Cybercrime.” rm.coe.int. https://rm.coe.int/prems-105223-gbr-2023-convention-cybercrimininalite-a5-web-4-/1680ae7118 (accessed October 10, 2024).
  • [46] IWM Cybersec. “Information Security Audit.” IWMCybersec.com. https://iwmcybersec.com/information-security-audit/ (accessed October 10, 2024).
  • [47] Z. Wang, L. Sun and H. Zhu, “Defining social engineering in cybersecurity,” IEEE Access, vol. 8, pp. 85094–85115, Aug. 2020, doi: 10.1109/ACCESS.2020.2992807.
Yıl 2025, Sayı: 061, 137 - 165, 30.06.2025

Öz

Kaynakça

  • [1] T. D. Rossing, F. R. Moore, and P. A. Wheeler, The Science of Sound, 3rd ed. SF, USA: Addison Wesley, 2002.
  • [2] B. Mulgrew, P. Grant, and J. Thompson, Digital Signal Processing: Concepts and Applications. London, 1st ed. U.K.: Palgrave HE UK, 1999.
  • [3] B. Naqvi, K. Perova, A. Farooq, I. Makhdoom, S. Oyedeji and J. Porras, “Mitigation strategies against phishing attacks: A systematic literature review,” Comput. & Security, vol. 132, p. 103387, 2023, doi: 10.1016/j.cose.2023.103387.
  • [4] W. Stallings, Network Security Essentials: Applications and Standards, 6th ed. Upper Saddle River, NJ, USA: Pearson, 2016.
  • [5] A. Saxena. “What is cybersecurity and why is it important?” Sprinto.com. https://sprinto.com/blog/importance-of-cyber-security/ (accessed Nov. 11, 2024).
  • [6] R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. Hoboken, NJ, USA: Wiley, 2021.
  • [7] M. E. Whitman and H. J. Mattord, Management of Information Security, 6th ed. Boston, MA, USA: Cengage Learning, 2018.
  • [8] V Malik, A. Khanna, N. Sharma, and S. Nalluri, (2024). Trends in Ransomware Attacks: Analysis and Future Predictions. International Journal of Global Innovations and Solutions (IJGIS). doi:10.21428/e90189c8.f2996624.
  • [9] J. Mirkovic and P. Reiher, (2004). “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no.2, pp. 39-53. doi:10.1145/997150.997156.
  • [10] P. Cheng and U. Roedig, “Personal voice assistant security and privacy-A survey,” IEEE J. Emerg. Sel. Top. Circuits Syst., vol. 10, no. 4, pp. 476–507, Apr. 2022, doi: 10.1109/JPROC.2022.3153167. https://doi.org/10.1109/JPROC.2022.3153167.
  • [11] D. Bilika, N. Michopoulou, E. Alepis, and C. Patsakis, “Hello me, meet the real me: Voice synthesis attacks on voice assistants,” Computers & Security, vol. 137, p. 103617, 2024, doi: 10.1016/j.cose.2023.103617.
  • [12] A. G. Desetty, V. D. Jangampet, and S. R. Pulyala, "Phishing attacks: Evolving techniques, emerging trends, and countermeasure strategies," International Journal for Innovative Engineering and Management Research, vol. 9, no. 12, pp. 985–991, 2020. [Online]. Available: https://www.researchgate.net/profile/Vinay-Dutt/publication/376645699_Phishing_Attacks_Evolving_Techniques_Emerging_Trends_and_Countermeasure_Strategies/links/673eb65d440ad82b18a086fb/Phishing-Attacks-Evolving-Techniques-Emerging-Trends-and-Countermeasure-Strategies.pdf
  • [13] A. Ansari and M. Nazir. “Risk assessment of security vulnerabilities in smart home using CAPEC and defensive goals.” Advances in Data and Information Science, vol 318, p. 705–722, 2022, doi:10.1007/978-981-16-5689-7_63.
  • [14] F. McKee and D. Noever, “Acoustic cybersecurity: Exploiting voice-activated systems,” Cryptography and Security, vol. 2023, p. 2312.00039, 2023, doi:10.48550/arXiv.2312.00039.
  • [15] S. Hussain, P. Neekhara, S. Dubnov, J. McAuley and F. Koushanfar, “WaveGuard: Understanding and mitigating audio adversarial examples,” in Usenix Security 2021, 2021, pp. 1–10, doi:10.48550/arXiv.2103.03344.
  • [16] D. Buil-Gil, S. Kemp, S. Kuenzel, L. Coventry, S. Zakhary, D. Tilley and J. Nicholson, “The digital harms of smart home devices: A systematic literature review,” Comput. in Hum. Behav., vol. 145, p. 107770, 2023, doi: 10.1016/j.chb.2023.107770.
  • [17] F. Toapanta, B. Rivadeneira, C. Tipantuña, and D. Guamán, “AI-Driven vishing attacks: A practical approach,” Engineering Proceedings, vol. 77, no. 1, p. 15, 2024, doi: 10.3390/engproc2024077015.
  • [18] C. Dinu. “What is vishing? Unmasking voice phishing scams and techniques.” TextMagic.com. https://www.textmagic.com/blog/what-is-vishing/ (accessed Nov. 11, 2024).
  • [19] N. Bhatnagar and M. Pry, “Student attitudes, awareness, and perceptions of personal privacy and cybersecurity in the use of social media: An initial study,” Information Systems Education Journal, vol. 18, no. 1, pp. 48–58, 2020. [Online]. Available: https://files.eric.ed.gov/fulltext/EJ1246231.pdf
  • [20] C. S. Kayser, S. Back, and M. M. Toro-Alvarez, "Identity theft: The importance of prosecuting on behalf of victims," Laws, vol. 13, no. 6, pp. 68, 2024, doi: 10.3390/laws13060068.
  • [21] K. Marchini. “2018 Identity fraud: Fraud enters a new era of complexity.” JavelinStrategy.com. https://www.javelinstrategy.com/research/2018-identity-fraud-fraud-enters-new-era-complexity (accessed Nov. 11, 2024).
  • [22] M.A. Siddiqi, W. Pak and M.A. Siddiqi, “A study on the psychology of social engineering-based cyberattacks and existing countermeasures,” Appl. Sci., vol. 12, p. 6042, 2022, doi: 10.3390/app12126042.
  • [23] G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang and W. Xu, “DolphinAttack: Inaudible voice commands,” in ACM SIGSAC Conf. on Computer and Communications Security (CCS ’17), 2017, pp. 103–117, doi: 10.1145/3133956.3134052.
  • [24] H. Shah, M.Z. Rashid, M.F. Abdollah, M.N. Kamarudin, C.K. Lin and Z. Kamis, “Biometric voice recognition in security system,” Indian J. Sci. Technol., vol. 7, no. 1, pp. 104–112, Jan. 2014, doi: 10.17485/ijst/2014/v7i1.9.
  • [25] A. Hamed and N. Abdelbaki, “Acoustic attacks in iot era: Risks and mitigations,” in Proc. of the 2020 5th Int. Conf. on Cloud Computing and Internet of Things (CCIOT '20), Okinawa, Japan, 2020, pp. 13–19, doi: 10.1145/3429523.3429530.
  • [26] European Parliamentary Research Service, “Data subjects, digital surveillance, AI and the future of work,” in Panel for the Future of Science and Technology, Dec. 2020. [Online]. Available: https://www.europarl.europa.eu/RegData/etudes/STUD/2020/656305/EPRS_STU(2020)656305_EN.pdf
  • [27] A. Dixit, N. Kaur, and S. Kingra, “Review of audio deepfake detection techniques: Issues and prospects,” Expert Systems, vol. 40, e13322, 2023, doi: 10.1111/exsy.13322.
  • [28] N. Robins-Early. “CEO of WPP Targeted by Deepfake Scam.” TheGuardian.com. https://www.theguardian.com/technology/article/2024/may/10/ceo-wpp-deepfake-scam (accessed Jan. 9, 2025).
  • [29] M. U. Tanveer, K. Munir, M. Amjad, A. U. Rehman and A. Bermak, “Unmasking the fake: Machine learning approach for deepfake voice detection,” in IEEE Access, vol. 12, pp. 197442-197453, Apr. 2024, doi: 10.1109/ACCESS.2024.3521026.
  • [30] Z. Cai, A. Dhall, S. Ghosh, M. Hayat, D. Kollias, K. Stefanov and U. Tariq, “1M-Deepfakes detection challenge,” in Proc. 32nd ACM Int. Conf. Multimedia (MM ’24), 2024, pp. 11355–11359, doi: 10.1145/3664647.3689145.
  • [31] J. R. Reeder and T. Hall, “Cybersecurity’s Pearl Harbor moment: Lessons learned from the colonial pipeline ransomware attack,” The Cyber Defense Review, vol. 6, no. 3, pp. 15–40, 2021. [Online]. Available: https://www.jstor.org/stable/48631153.
  • [32] S. S. Wang, “Integrated framework for information security investment and cyber insurance,” Pacific-Basin Finance Journal, vol. 57, pp. 101173, 2019, doi: 10.1016/j.pacfin.2019.101173.
  • [33] Q. Xia, Q. Chen and S. Xu, “Near-ultrasound inaudible trojan (nuit): Exploiting your speaker to attack your microphone,” in Proc. 32nd USENIX Security Symp. (USENIX Security 23), Anaheim, CA, 2023, pp. 4589–4606. [Online]. Available: https://www.usenix.org/conference/usenixsecurity23/presentation/xia.
  • [34] C. Yan, X. Ji, K. Wang, Q. Jiang, Z. Jin and W. Xu, “A survey on voice assistant security: Attacks and countermeasures,” ACM Comput. Surv., vol. 55, no. 4, Art. no. 84, Apr. 2023, pp. 1–36, doi: 10.1145/3527153.
  • [35] J. S. Lloyd, C. G. Ludwikowski, C. Malik and C. Shen, "Mitigating inaudible ultrasound attacks on voice assistants with acoustic metamaterials," IEEE Access, vol. 11, pp. 36464-36470, 2023, doi: 10.1109/ACCESS.2023.3266722.
  • [36] F. Hall, L. Maglaras, T. Aivaliotis, L. Xagoraris and I. Kantzavelou, “Smart homes: Security challenges and privacy concerns,” in Proc. 2020 arXiv Preprint, Oct. 2020. [Online]. Available: https://arxiv.org/abs/2010.15394.
  • [37] Q. Yan, K. Liu, Q. Zhou, H. Guo and N. Zhang, “SurfingAttack: Interactive hidden attack on voice assistants using ultrasonic guided waves,” in Proc. Network and Distributed System Security Symposium (NDSS), 2020. doi: 10.14722/ndss.2020.24068.
  • [38] C. Bolton, S. Rampazzi, C. Li, A. Kwong, W. Xu and K. Fu, "Blue note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems," in 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2018, pp. 1048-1062, doi: 10.1109/SP.2018.00050.
  • [39] A. Kwong, W. Xu and K. Fu, "Hard drive of hearing: Disks that eavesdrop with a synthesized microphone," in 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2019, pp. 905-919, doi: 10.1109/SP.2019.00008.
  • [40] S. Panda, Y. Liu, G. P. Hancke and U. M. Qureshi, “Behavioral acoustic emanations: Attack and verification of PIN entry using keypress sounds,” Sensors, vol. 20, no. 11, pp. 3015, Nov. 2020, doi: 10.3390/s20113015.
  • [41] X. Xu, Y. Liang, X. Zhang, Y. Wang, Y. Lin, B. Adebisi, H. Gacanin and G. Gui, “Self-evolving malware detection for cyber security using network traffic and incremental learning,” in Conference: 2022 9th International Conference on Dependable Systems and Their Applications (DSA), 2022, pp. 454–463, doi: 10.1109/DSA56465.2022.00066.
  • [42] H. Ahmetoglu and R. Das, “A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges and future research directions,” Internet of Things, vol. 20, p. 100615, 2022, doi: 10.1016/j.iot.2022.100615.
  • [43] B. Akbulut, “The principle of legality in the law of misdemeanors and violation the measures taken due to Covid-19,” Journal of Penal Law and Criminology, vol. 9, no. 1, pp. 197–253, 2021. doi: 10.26650/JPLC2020-837085.
  • [44] R. Erbaş, “Organized crime-related legislation in the Turkish criminal law,” Ceza Hukuku ve Kriminoloji Dergisi, vol. 3, no. 1, pp. 275–311, Jun. 2015. [Online]. Available: https://dergipark.org.tr/tr/download/article-file/14682.
  • [45] Council of Europe. “Convention on Cybercrime.” rm.coe.int. https://rm.coe.int/prems-105223-gbr-2023-convention-cybercrimininalite-a5-web-4-/1680ae7118 (accessed October 10, 2024).
  • [46] IWM Cybersec. “Information Security Audit.” IWMCybersec.com. https://iwmcybersec.com/information-security-audit/ (accessed October 10, 2024).
  • [47] Z. Wang, L. Sun and H. Zhu, “Defining social engineering in cybersecurity,” IEEE Access, vol. 8, pp. 85094–85115, Aug. 2020, doi: 10.1109/ACCESS.2020.2992807.
Toplam 47 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Dijital Adli Tıp, Veri Güvenliği ve Korunması
Bölüm Review
Yazarlar

Nursel Yalçın 0000-0002-0393-6408

Bilge Lale 0009-0005-1919-0929

Yayımlanma Tarihi 30 Haziran 2025
Gönderilme Tarihi 13 Aralık 2024
Kabul Tarihi 27 Mayıs 2025
Yayımlandığı Sayı Yıl 2025 Sayı: 061

Kaynak Göster

IEEE N. Yalçın ve B. Lale, “Types of cyber-attacks with using voice”, JSR-A, sy. 061, ss. 137–165, Haziran 2025.