Explore a DEF CON conference presentation that delves into the security vulnerabilities of voice verification systems through advanced voice cloning technology. Learn how deep learning enables the creation of highly convincing voice replicas, demonstrated through a practical case study where cloned voices successfully circumvent major institutional security measures. Gain detailed insights into voice cloning tools and techniques, understand the associated cybersecurity risks, and discover strategic countermeasures for red team operations. Master the methodology of leveraging publicly available voice samples for simulating voice-based attacks, while developing a comprehensive understanding of AI-driven threats and their implications for defensive strategy development.
Overview
Syllabus
DEF CON 32 - Exploiting Voice Cloning in Adversarial Simulation - Mark Foudy
Taught by
DEFCONConference