Overview
Explore the vulnerabilities in Automatic Speech Recognition (ASR) and Speaker Identification Systems in this 15-minute IEEE conference presentation. Gain insights into various attack methods, evaluation metrics, and mediums used to exploit these systems. Delve into the concept of knowledge transferability and examine real-world experiments that demonstrate the potential risks. Learn why a Systematization of Knowledge (SoK) approach is crucial for understanding and addressing these security challenges in voice-based technologies.
Syllabus
Introduction
Attack
Why SoK
Overview
Attacks
Metrics
Mediums
Knowledge
Target Transferability
Experiments
Taught by
IEEE Symposium on Security and Privacy