Главная
Study mode:
on
1
Intro
2
blackhat Obligatory Sneakers Reference
3
black hat Overview of Text to Speech (TTS)
4
black hat Proof of concept
5
black hat Open Source Text to Speech Models
6
black hat Model overview
7
black hat Tacotron v1/v2 and WaveNet
8
black hat Collecting Data
9
black hat Data Augmentation: Shifting Pitch
10
black hat Adding Transfer Learning
11
black hat Transfer Learning Demo
12
black hat Putting it all together
13
black hat Our work in perspective (ML for offense)
14
black hat Mitigation: MFA
15
black hat Mitigation: Detect CGA
16
Conclusions
17
black hat Final note
Description:
Explore the vulnerabilities of voice fingerprinting authentication in this 36-minute Black Hat conference talk. Delve into recent machine learning advancements enabling the generation of synthetic, high-quality audio using speech recordings. Learn about text-to-speech systems, open-source models like Tacotron and WaveNet, and techniques such as data augmentation and transfer learning. Understand the implications for financial institutions, home automation products, and hi-tech offices. Discover potential mitigation strategies, including multi-factor authentication and CGI detection. Gain insights into the broader context of machine learning in offensive security.

Your Voice is My Passport

Black Hat
Add to list