Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities and security challenges of voice-based authentication systems in this 55-minute talk from Hack in Paris. Delve into the growing importance of voice interfaces in information systems, particularly for IoT devices and smartphones. Examine recent exploits that allow unauthorized remote control of electronic devices through voice commands. Learn about speaker authentication as a common countermeasure and its associated technical challenges. Discover a black box approach for testing the boundaries of speaker authentication systems using signal processing algorithms to modify original voice signals. Assess widely deployed implementations to determine which voice signal characteristics are considered by authentication engines and how they can be circumvented. Discuss the capabilities required to synthesize legitimate voice signals that can bypass authentication engines and gain unauthorized access to targeted devices.