2016, <i>"A Survey of Various Methods for Analyzing the Amazon Echo"</i>, Military College of South Carolina, <a href="https://vanderpot.com/Clinton_Cook_Paper.pdf" rel="nofollow">https://vanderpot.com/Clinton_Cook_Paper.pdf</a><p><pre><code> Our research sets out to look at how this system of interconnected smart devices affects our privacy.. and how can we show this with a practical analysis and vulnerability analysis of our own smart devices.
</code></pre>
2019, <i>"Smart Home Personal Assistants: A Security and Privacy Review"</i>, Kings College London, <a href="https://arxiv.org/abs/1903.05593" rel="nofollow">https://arxiv.org/abs/1903.05593</a><p><pre><code> Even though the attack surface of SPA is conspicuously broad and there has been a significant amount of recent research efforts in this area, research has so far focused on a small part of the attack surface.. this is the first.. characterization of the security and privacy issues and countermeasures of SPA.
</code></pre>
2022, <i>"A survey on security analysis of Amazon Echo Devices"</i>, U of Texas, Miami U, Kent State, <a href="https://www.sciencedirect.com/science/article/pii/S2667295222000393" rel="nofollow">https://www.sciencedirect.com/science/article/pii/S266729522...</a><p><pre><code> We conclude that though numerous privacy concerns and security vulnerabilities associated with the device are mitigated, many vulnerabilities still need to be addressed.</code></pre>