black hat Our work in perspective (ML for offense)
14
black hat Mitigation: MFA
15
black hat Mitigation: Detect CGA
16
Conclusions
17
black hat Final note
Description:
Explore the vulnerabilities of voice fingerprinting authentication in this 36-minute Black Hat conference talk. Delve into recent machine learning advancements enabling the generation of synthetic, high-quality audio using speech recordings. Learn about text-to-speech systems, open-source models like Tacotron and WaveNet, and techniques such as data augmentation and transfer learning. Understand the implications for financial institutions, home automation products, and hi-tech offices. Discover potential mitigation strategies, including multi-factor authentication and CGI detection. Gain insights into the broader context of machine learning in offensive security.