YoVDO

SoK - The Faults in Our ASRs - An Overview of Attacks Against Automatic Speech Recognition and Speaker Identification Systems

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Vulnerability Assessment Courses

Course Description

Overview

Explore the vulnerabilities in Automatic Speech Recognition (ASR) and Speaker Identification Systems in this 15-minute IEEE conference presentation. Gain insights into various attack methods, evaluation metrics, and mediums used to exploit these systems. Delve into the concept of knowledge transferability and examine real-world experiments that demonstrate the potential risks. Learn why a Systematization of Knowledge (SoK) approach is crucial for understanding and addressing these security challenges in voice-based technologies.

Syllabus

Introduction
Attack
Why SoK
Overview
Attacks
Metrics
Mediums
Knowledge
Target Transferability
Experiments


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Sensor Security
IEEE via YouTube
Tracking Ransomware End-to-end
IEEE via YouTube
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube
Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube
Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube