{"id":5675,"date":"2019-02-07T13:47:55","date_gmt":"2019-02-07T10:47:55","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5675"},"modified":"2019-11-15T14:33:27","modified_gmt":"2019-11-15T11:33:27","slug":"ultrasound-attacks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ultrasound-attacks\/5675\/","title":{"rendered":"Sesli asistanlar bizim duyamad\u0131\u011f\u0131m\u0131z sesleri duyuyor"},"content":{"rendered":"<p>Yak\u0131nda teknolojiyle etkile\u015fimimize, sesli komutlar hakim olabilir. \u0130stedi\u011finiz \u015feyi sesli bir \u015fekilde ifade etmek ve ard\u0131ndan cevab\u0131 dinlemek ger\u00e7ekten \u00e7ocuk oyunca\u011f\u0131: \u00c7ocuklar\u0131n sesli asistanlar\u0131 ne kadar kolay bir \u015fekilde kulland\u0131\u011f\u0131n\u0131 fark etmi\u015fsinizdir.<\/p>\n<p>Ancak her yeni teknoloji beraberinde yeni tehditler de getirir. Ses kontrol\u00fc teknolojisi de bunlardan biri. \u00dcreticilerin potansiyel tehditleri \u00f6nleyebilmesini sa\u011flamak i\u00e7in siber g\u00fcvenlik ara\u015ft\u0131rmac\u0131lar\u0131 cihazlar \u00fczerinde sabah ak\u015fam derinlemesine ara\u015ft\u0131rmalar yap\u0131yorlar. Her ne kadar \u015fu an i\u00e7in pratikte bir faydas\u0131 olmasa da bug\u00fcn\u00fcn g\u00fcvenlik radar\u0131nda mutlaka bulunmas\u0131 gereken baz\u0131 bulgulardan bahsedece\u011fiz.<\/p>\n<h2>Ak\u0131ll\u0131 cihazlar dinliyor ve emirleri yerine getiriyor<\/h2>\n<p><a href=\"https:\/\/voicebot.ai\/2018\/11\/13\/new-report-over-1-billion-devices-provide-voice-assistant-access-today-and-highest-usage-is-on-smartphones\/\" target=\"_blank\" rel=\"noopener nofollow\">Voicebot.ai sitesinin raporuna g\u00f6re<\/a> bug\u00fcn d\u00fcnya \u00e7ap\u0131nda bir milyardan fazla sesle etkinle\u015ftirilen cihaz bulunmaktad\u0131r. Bunlar\u0131n \u00e7o\u011fu ak\u0131ll\u0131 telefonlardan olu\u015fsa da konu\u015fma tan\u0131ma \u00f6zellikli cihazlar da h\u0131zl\u0131 bir \u015fekilde pop\u00fclerlik kazanmaktad\u0131r. Mesela, Amerika\u2019da her be\u015f evden birinde s\u00f6zl\u00fc komutlara cevap veren ak\u0131ll\u0131 bir hoparl\u00f6r bulunmaktad\u0131r.<\/p>\n<p>Sesli komutlar; \u00e7alan \u015fark\u0131lar\u0131 kontrol etmek, internet \u00fczerinden \u00fcr\u00fcn sipari\u015f etmek, araba GPS\u2019ini, haber ve hava durumunu kontrol etmek, alarm kurmak ve \u00e7ok daha fazlas\u0131 i\u00e7in kullan\u0131labilir. \u00dcreticiler de bu ak\u0131mdan faydalan\u0131p cihazlara sesli kontrol deste\u011fi sunmaktad\u0131r. Mesela k\u0131sa s\u00fcre \u00f6nce Amazon, Echo ak\u0131ll\u0131 hoparl\u00f6r\u00fcyle ba\u011flant\u0131 kuran bir mikrodalgay\u0131 <a href=\"https:\/\/www.theverge.com\/2018\/9\/20\/17882140\/amazon-basics-microwave-alexa-2018-smart-features-price-release-date\" target=\"_blank\" rel=\"noopener nofollow\">piyasaya sundu<\/a>. Mikrodalga, \u201cKahveyi \u0131s\u0131t\u201d ifadesini duydu\u011funda gerekli zaman\u0131 hesapl\u0131yor ve \u00e7al\u0131\u015fmaya ba\u015fl\u0131yor. Elbette bu teknolojiyle dahi mutfa\u011fa kadar gidip kupa barda\u011f\u0131n\u0131z\u0131 cihaz\u0131n i\u00e7ine koyman\u0131z laz\u0131m. Bu kadar i\u015fi yapm\u0131\u015fken birka\u00e7 d\u00fc\u011fmeye de basmakta ne var diyebilirsiniz ama \u015fimdilik teknolojik ilerlemelerin k\u00fc\u00e7\u00fck ayr\u0131nt\u0131lar\u0131 \u00fczerinde durmayal\u0131m.<\/p>\n<p>Ak\u0131ll\u0131 ev sistemleri, ses kontroll\u00fc \u0131\u015f\u0131kland\u0131rma ve havaland\u0131rman\u0131n yan\u0131 s\u0131ra d\u0131\u015f kap\u0131 kilitleme se\u00e7ene\u011fi de sunmaktad\u0131r. G\u00f6rd\u00fc\u011f\u00fcn\u00fcz \u00fczere, sesli asistanlar \u015fimdiden \u00e7ok fazla i\u015f g\u00f6rebiliyor. Bu durumda, tan\u0131mad\u0131\u011f\u0131m\u0131z ki\u015filerin bu \u00f6zellikleri, \u00f6zellikle de k\u00f6t\u00fc ama\u00e7lar\u0131 i\u00e7in kullanmas\u0131n\u0131 asla istemeyiz.<\/p>\n<p>2017\u2019de animasyon komedi dizisi South Park, kendi benzersiz tarz\u0131nda son derece orijinal bir toplu sald\u0131r\u0131 ger\u00e7ekle\u015ftirdi. Kurban, Amazon Echo ak\u0131ll\u0131 hoparl\u00f6rlerinin i\u00e7inde ya\u015fayan sesli asistan Alexa\u2019yd\u0131. Dizide Alexa\u2019ya, al\u0131\u015fveri\u015f sepetine olduk\u00e7a acayip e\u015fyalar eklemesi ve alarm\u0131 sabah\u0131n 7\u2019sine kurmas\u0131 i\u00e7in komutlar verilmi\u015fti. Karakterlerin telaffuzlar\u0131 tuhaf olsa da South Park\u2019\u0131n o b\u00f6l\u00fcm\u00fcn\u00fc izleyenlerin Echo hoparl\u00f6rleri, TV ekran\u0131ndan <a href=\"https:\/\/www.theverge.com\/2017\/9\/16\/16318694\/south-park-amazon-alexa-google-home\" target=\"_blank\" rel=\"noopener nofollow\">gelen komutlar\u0131 tamam\u0131yla yerine getirmi\u015ftir<\/a>.<\/p>\n<h2>Ultrason: Makinalar bizim duymad\u0131klar\u0131m\u0131z\u0131 duyabilir<\/h2>\n<p>Sesle aktifle\u015ftirilen cihazlar\u0131n ta\u015f\u0131d\u0131\u011f\u0131 tehlikelerin bir k\u0131sm\u0131na <a href=\"https:\/\/www.kaspersky.com\/blog\/voice-recognition-threats\/14134\/\" target=\"_blank\" rel=\"noopener nofollow\">de\u011finmi\u015ftik<\/a>. Bug\u00fcn ise cihazlar\u0131n\u0131z\u0131, duyamad\u0131\u011f\u0131n\u0131z seslerden gelen komutlar\u0131 yerine getirmeye zorlayan \u201csessiz\u201d sald\u0131r\u0131lara odaklanaca\u011f\u0131z.<\/p>\n<p>Bu tip bir sald\u0131r\u0131, insan kula\u011f\u0131n\u0131n i\u015fitemeyece\u011fi kadar y\u00fcksek frekansl\u0131 olan ultrason dalgalar\u0131 yoluyla ger\u00e7ekle\u015ftirilebilir. 2017\u2019de yay\u0131nlanan bir makalede, Zhejiang \u00dcniversitesi\u2019nden ara\u015ft\u0131rmac\u0131lar <a href=\"https:\/\/arxiv.org\/abs\/1708.09537\" target=\"_blank\" rel=\"noopener nofollow\">sesli asistanlar\u0131 gizli bir \u015fekilde kontrol etmeye yarayan DolphinAttack (Yunus Sald\u0131r\u0131s\u0131) adl\u0131 bir tekni\u011fi sunmu\u015ftur<\/a> (yunus bal\u0131klar\u0131 ultrason dalgalar\u0131 yayd\u0131\u011f\u0131 i\u00e7in bu \u015fekilde adland\u0131r\u0131lm\u0131\u015ft\u0131r). Ara\u015ft\u0131rma ekibi sesli komutlar\u0131, insanlar taraf\u0131ndan duyulamayan ancak modern cihazlardaki mikrofonlar taraf\u0131ndan alg\u0131lanabilen ultrason dalgalar\u0131na d\u00f6n\u00fc\u015ft\u00fcrd\u00fc.<\/p>\n<p>Bu y\u00f6ntem i\u015fe yar\u0131yor, \u00e7\u00fcnk\u00fc ultrason dalgas\u0131, al\u0131c\u0131 cihazda (\u00f6rne\u011fin bir ak\u0131ll\u0131 telefon) elektrik ak\u0131m\u0131 darbesine d\u00f6n\u00fc\u015ft\u00fcr\u00fcld\u00fc\u011f\u00fcnde, sesli komutu saklayan orijinal sinyal yeniden olu\u015fturuluyor. Bu mekanizma bir anlamda, kay\u0131t s\u0131ras\u0131nda ses bozulmas\u0131na benziyor: Cihazda bunun i\u00e7in \u00f6zel bir i\u015flev yok, bu sadece d\u00f6n\u00fc\u015f\u00fcm s\u00fcrecinin bir \u00f6zelli\u011fi.<\/p>\n<p>Sonu\u00e7 olarak, hedef cihaz sesli komutu duyar ve yerine getirir; bu da sald\u0131rganlar i\u00e7in say\u0131s\u0131z f\u0131rsat demektir. Ara\u015ft\u0131rmac\u0131lar bu sald\u0131r\u0131y\u0131, Amazon Alexa, Apple Siri, Google Now, Samsung S Voice ve Microsoft Cortana gibi en pop\u00fcler sesli asistanlarda yeniden ger\u00e7ekle\u015ftirebilmi\u015ftir.<\/p>\n<h2>Hoparl\u00f6r korosu<\/h2>\n<p>Sald\u0131rganlar a\u00e7\u0131s\u0131ndan bak\u0131ld\u0131\u011f\u0131nda, DolphinAttack\u2019\u0131n zay\u0131f noktalar\u0131ndan biri, etki alan\u0131n\u0131n sadece 1 metre olmas\u0131d\u0131r. Ancak <a href=\"https:\/\/synrg.csl.illinois.edu\/papers\/lipread_nsdi18.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Illinois Urbana-Champaign \u00dcniversitesi\u2019nden ara\u015ft\u0131rmac\u0131lar<\/a> bu mesafeyi artt\u0131rmay\u0131 ba\u015fard\u0131. Yapt\u0131klar\u0131 deneyde, d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f bir ultrason komutunu, \u00e7ok say\u0131da frekans band\u0131na ay\u0131rd\u0131lar ve bunlar\u0131 60\u2019dan fazla hoparl\u00f6rde oynatt\u0131lar. Bu \u201choparl\u00f6r korosu\u201d taraf\u0131ndan verilen gizli sesli komutlar, arka plandaki g\u00fcr\u00fclt\u00fclere ra\u011fmen yedi metrelik bir mesafeden alg\u0131lanm\u0131\u015ft\u0131r. Bu \u015fartlarda, DolphinAttack\u2019\u0131n ba\u015far\u0131 olas\u0131l\u0131\u011f\u0131 kayda de\u011fer bir oranda artm\u0131\u015ft\u0131r.<\/p>\n<h2>Derinden gelen bir ses<\/h2>\n<p><a href=\"https:\/\/arxiv.org\/abs\/1801.01944\" target=\"_blank\" rel=\"noopener nofollow\">California Berkeley \u00dcniversitesi\u2019nden uzmanlar<\/a> ise farkl\u0131 bir kaynaktan istifade ettiler. Mozilla\u2019n\u0131n ses tan\u0131ma sistemi Deep Speech\u2019i kand\u0131rmak i\u00e7in, sesli komutlar\u0131 di\u011fer ses kodu par\u00e7ac\u0131klar\u0131n\u0131n i\u00e7ine gizlice yerle\u015ftirdiler. \u0130nsan kula\u011f\u0131na g\u00f6re de\u011fi\u015ftirilmi\u015f kay\u0131t ile orijinali aras\u0131nda neredeyse hi\u00e7 bir fark olmasa da yaz\u0131l\u0131m, kayd\u0131n i\u00e7inde gizli bir komut oldu\u011funu tespit edebilir.<\/p>\n<p>Ara\u015ft\u0131rma ekibinin web sitesinde bulunan kay\u0131tlar\u0131 <a href=\"https:\/\/nicholas.carlini.com\/code\/audio_adversarial_examples\/\" target=\"_blank\" rel=\"noopener nofollow\">dinleyip g\u00f6rebilirsiniz<\/a>. \u0130lk \u00f6rnekte, \u201cVeri seti olmadan makale faydas\u0131z\u201d ifadesi, farkl\u0131 bir web sitesi a\u00e7mak i\u00e7in gizli bir komut i\u00e7ermektedir: \u201cGoogle, evil.com sitesini a\u00e7.\u201d \u0130kinci \u00f6rnekte, ara\u015ft\u0131rmac\u0131lar Bach\u2019\u0131n \u00e7ello s\u00fcitinin bir b\u00f6l\u00fcm\u00fcne, \u201cKonu\u015fma m\u00fczik i\u00e7erisine yerle\u015ftirilebilir\u201d ifadesini eklemi\u015ftir.<\/p>\n<h2>Duyulmayan sald\u0131r\u0131lara kar\u015f\u0131 koruma<\/h2>\n<p>\u00dcreticiler, sesle etkinle\u015ftirilen cihazlar\u0131 korumak i\u00e7in yeni y\u00f6ntemler aramaya \u00e7oktan ba\u015flad\u0131. \u00d6rne\u011fin, al\u0131nan sinyallerdeki frekans de\u011fi\u015fiklikleri tespit edilerek bu ultrason sald\u0131r\u0131lar\u0131 engellenebilir. B\u00fct\u00fcn ak\u0131ll\u0131 cihazlar\u0131 sahiplerinin sesini tan\u0131mas\u0131 i\u00e7in e\u011fitmek iyi bir fikir olsa da; bu fikri kendi sisteminde test etmi\u015f olan Google, bu t\u00fcr bir g\u00fcvenlik y\u00f6nteminin <a href=\"https:\/\/www.techrepublic.com\/article\/vocal-disguises-and-impersonations-may-fool-voice-recognition-authentication\/\" target=\"_blank\" rel=\"noopener nofollow\">ses kayd\u0131 veya ba\u015far\u0131l\u0131 bir taklit yoluyla<\/a> kand\u0131r\u0131labilece\u011fi <a href=\"https:\/\/support.google.com\/assistant\/answer\/7394306?co=GENIE.Platform%2525253DAndroid&amp;hl=tr\" target=\"_blank\" rel=\"noopener nofollow\">uyar\u0131s\u0131nda bulunmu\u015ftur<\/a>.<\/p>\n<p>Ancak, bu konuya y\u00f6nelik farkl\u0131 \u00e7\u00f6z\u00fcmler \u00fcretmek i\u00e7in ara\u015ft\u0131rmac\u0131lar\u0131n ve \u00fcreticilerin h\u00e2l\u00e2 zaman\u0131 var. Daha \u00f6nce de belirtti\u011fimiz gibi, sesli asistanlar\u0131n gizlice kontrol edilmesi \u015fu anda sadece laboratuvar ko\u015fullar\u0131nda ger\u00e7ekle\u015ftirilebilir: Ak\u0131ll\u0131 telefonunuzun yak\u0131n\u0131na, b\u0131rak\u0131n 60 tanesini, bir tane ultrasonik hoparl\u00f6r koymak bile b\u00fcy\u00fck bir i\u015f; ses kay\u0131tlar\u0131na komut yerle\u015ftirmek ise, bu i\u015f i\u00e7in gereken zamana ve \u00e7abaya neredeyse hi\u00e7 de\u011fmez.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yak\u0131nda teknolojiyle etkile\u015fimimize, sesli komutlar hakim olabilir. \u0130stedi\u011finiz \u015feyi sesli bir \u015fekilde ifade etmek ve ard\u0131ndan cevab\u0131 dinlemek ger\u00e7ekten \u00e7ocuk oyunca\u011f\u0131: \u00c7ocuklar\u0131n sesli asistanlar\u0131 ne kadar kolay bir \u015fekilde kulland\u0131\u011f\u0131n\u0131 fark etmi\u015fsinizdir.<\/p>\n","protected":false},"author":2049,"featured_media":5676,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351,995],"tags":[1845,1846,1847,1848,1849,744,1851,1854,882,1850,1852,1853],"class_list":{"0":"post-5675","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-technology","9":"tag-alexa","10":"tag-cortana","11":"tag-dolphin-attack","12":"tag-echo","13":"tag-eko","14":"tag-guvenlik","15":"tag-konusma-tanima","16":"tag-ses-asistani","17":"tag-ses-tanima","18":"tag-siri","19":"tag-teehditler","20":"tag-ultra-ses"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ultrasound-attacks\/5675\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ultrasound-attacks\/15196\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ultrasound-attacks\/12770\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ultrasound-attacks\/17137\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ultrasound-attacks\/15305\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ultrasound-attacks\/14000\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ultrasound-attacks\/17764\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ultrasound-attacks\/16843\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ultrasound-attacks\/22179\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ultrasound-attacks\/25549\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ultrasound-attacks\/11398\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ultrasound-attacks\/11409\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ultrasound-attacks\/10325\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ultrasound-attacks\/18484\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ultrasound-attacks\/22339\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ultrasound-attacks\/23800\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ultrasound-attacks\/17873\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ultrasound-attacks\/22079\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ultrasound-attacks\/22012\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ses-tanima\/","name":"ses tan\u0131ma"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2049"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5675"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5675\/revisions"}],"predecessor-version":[{"id":6843,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5675\/revisions\/6843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5676"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}