Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Voice Cloning in Adversarial Simulation - Security Testing and Defense Strategies

DEFCONConference via YouTube

Overview

Explore a DEF CON conference presentation that delves into the security vulnerabilities of voice verification systems through advanced voice cloning technology. Learn how deep learning enables the creation of highly convincing voice replicas, demonstrated through a practical case study where cloned voices successfully circumvent major institutional security measures. Gain detailed insights into voice cloning tools and techniques, understand the associated cybersecurity risks, and discover strategic countermeasures for red team operations. Master the methodology of leveraging publicly available voice samples for simulating voice-based attacks, while developing a comprehensive understanding of AI-driven threats and their implications for defensive strategy development.

Syllabus

DEF CON 32 - Exploiting Voice Cloning in Adversarial Simulation - Mark Foudy

Taught by

DEFCONConference

Reviews

Start your review of Exploiting Voice Cloning in Adversarial Simulation - Security Testing and Defense Strategies

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.