2022
DOI: 10.48550/arxiv.2202.02751
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Pipe Overflow: Smashing Voice Authentication for Fun and Profit

Abstract: Recent years have seen a surge of popularity of acoustics-enabled personal devices powered by machine learning. Yet, machine learning has proven to be vulnerable to adversarial examples. Large number of modern systems protect themselves against such attacks by targeting the artificiality, i.e., they deploy mechanisms to detect the lack of human involvement in generating the adversarial examples. However, these defenses implicitly assume that humans are incapable of producing meaningful and targeted adversarial… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 35 publications
0
0
0
Order By: Relevance
“…It also pushes us to look beyond neural attacks to extend the threat models under investigation to include non-neural modifications and before-the-mic scenarios. Initial efforts in these directions, and the closest work to our own, is [3], who tested a simple non-neural pitch shifting gender protection approach, and [12], who investigate before-the-mic speech protection created by having speakers speak through a tube. In contrast, in our work we propose, for the first time, "vocal adversaries", speakers speaking with adaptations created using their own voices.…”
Section: Introductionmentioning
confidence: 99%
“…It also pushes us to look beyond neural attacks to extend the threat models under investigation to include non-neural modifications and before-the-mic scenarios. Initial efforts in these directions, and the closest work to our own, is [3], who tested a simple non-neural pitch shifting gender protection approach, and [12], who investigate before-the-mic speech protection created by having speakers speak through a tube. In contrast, in our work we propose, for the first time, "vocal adversaries", speakers speaking with adaptations created using their own voices.…”
Section: Introductionmentioning
confidence: 99%