信息网络安全 ›› 2022, Vol. 22 ›› Issue (10): 108-113.doi: 10.3969/j.issn.1671-1122.2022.10.015

• 入选论文 • 上一篇    下一篇

智能音箱安全与取证研究

梁广俊1,2, 辛建芳3(), 倪雪莉1,4, 马卓1,4   

  1. 1.江苏警官学院计算机信息与网络安全系,南京 210031
    2.南京邮电大学射频集成与微组装技术国家地方联合工程实验室,南京 210003
    3.南京铁道职业技术学院智能工程学院,南京 210031
    4.江苏省电子数据取证分析工程研究中心,南京 210031
  • 收稿日期:2022-07-20 出版日期:2022-10-10 发布日期:2022-11-15
  • 通讯作者: 辛建芳 E-mail:xinjfang@163.com
  • 作者简介:梁广俊(1982—),男,安徽,讲师,博士,主要研究方向为电子数据取证、网络空间安全|辛建芳(1981—),女,山西,讲师,博士,主要研究方向为无线通信、物联网安全|倪雪莉(1990—),女,江苏,讲师,硕士,主要研究方向为电子数据取证、网络空间安全|马卓(1993—),女,山西,讲师,博士,主要研究方向为隐私保护、网络空间安全
  • 基金资助:
    国家自然科学基金(62202209);江苏省高等学校自然科学研究重大项目(20KJA520004);江苏省公安厅科技研究项目(2021LX009);江苏省公安厅科技研究项目(2021KX011);江苏警官学院高层次引进人才科研启动项目(JSPI19GKZL407);南京邮电大学射频集成与微组装技术国家地方联合工程实验室开放课题(KFJJ20200201)

Research on Smart Speaker Security and Forensics

LIANG Guangjun1,2, XIN Jianfang3(), NI Xueli1,4, MA Zhuo1,4   

  1. 1. Department of Computer Information and Cyber Security, Jiangsu Police Institute, Nanjing 210031, China
    2. National and Local Joint Engineering Laboratory of Radio Frequency Integration and Micro Assembly Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    3. School of Intelligent Engineering, Nanjing Railway Vocational and Technical College, Nanjing 210031, China
    4. Jiangsu Electronic Data Forensics and Analysis Engineering Research Center, Nanjing 210031, China
  • Received:2022-07-20 Online:2022-10-10 Published:2022-11-15
  • Contact: XIN Jianfang E-mail:xinjfang@163.com

摘要:

文章首先分析了智能音箱的组成与原理和智能音箱的隐私与安全问题,并针对智能音箱的3种攻击形式及其防御方法进行研究;然后设计一个基于云—网—端的智能音箱生态系统取证框架,并给出了智能音箱取证流程,包括设备端取证、网络取证和云取证;最后采用手机端和云端两种取证方式进行验证。实验结果表明,该模型安全有效,可以准确获得智能音箱中的用户数据。

关键词: 智能音箱, 取证, 隐私保护, 智能音箱安全

Abstract:

This article first analyzed the composition and principle of smart speakers. On this basis, the privacy and security issues of smart speakers were discussed, focusing on three types of attacks and their defense methods on smart speakers. Then, a smart speaker ecosystem evidence collection framework based on the cloud-net-end was proposed, and a smart speaker evidence collection analysis model was further proposed. This model includes device-side forensics, network forensics and cloud forensics. Finally, the mobile phone and the cloud were used for verification. The analysis results show that the built model is safe and effective, which can accurately obtain the user data in the smart speaker.

Key words: smart speaker, forensics, privacy protection, smart speaker security

中图分类号: