SlideShare a Scribd company logo
1 of 37
Download to read offline




Goodfellow, I. J., Shlens, J., & Szegedy, C.: Explaining and harnessing adversarial examples. In Proc. of ICLR. (2015)










Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)










Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)








f :Rn
→ {1,…,k}
x ∈!n
!x ∈"n
s.t. f (x) ≠ f (!x) ∧ D(x, !x) ≤ δ
!x s.t. f (!x) = l ∧ D(x, !x) ≤ δ
l ∈{1,…,k}
panda
f
gibbon
x
!x
f (x)
f (!x)




!x = x + !v where !v = argmin
v
Loss
f
(x + v,l)+ ε " v "
ε D(x, !x) ≤ δ
panda




!x = x + !v where !v = argmin
v
Loss
f
(x + v,l)+ ε " v "
ε D(x, !x) ≤ δ
gibbon
Athalye, A., et. al.: Synthesizing robust adversarial examples. In Proc. of ICML. (2018)


f (!x) = l






argmin
v
Et~Τ Loss
f
(t(x + v),l)+ ε D(t(x),t(x + v))⎡
⎣⎢
⎤
⎦⎥
argmin
v
Loss
f
(x + v,l)+ ε ! v !
Athalye, A., et. al.: Synthesizing robust adversarial examples. In Proc. of ICML. (2018)
Yuan, X., et. al.: CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of USENIX Security. (2018)

Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)


Yuan, X., et. al.: CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of USENIX Security. (2018)

Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)


Yuan, X., et. al.: CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of USENIX Security. (2018)

Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)






argmin
v
Loss
f
(MFCC(x + v), l)+ ε ! v !
x ∈!T
l ∈∑N
argmin
v
Loss
f
(x + v,l)+ ε ! v !
Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)






Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)
Loss vt




Athalye, A., et. al.: Synthesizing robust adversarial examples. In Proc. of ICML. (2018)






argmin
v
Loss
f
(MFCC(x + BPF
1000~4000Hz
(v)), l)+ ε ! v !



h(t) u(t)
′u (t) = u(x)h(t − x)dx
−∞
∞
∫






H


argmin
v
Eh~H Loss(MFCC(Conv
h
(x + BPF
1000~4000Hz
(v))), l)+ ε v⎡
⎣
⎤
⎦
Conv
h
(⋅)





Ν(0, σ
2
)
argmin
v
Eh~H ,w~N (0,σ 2
)
Loss(MFCC(Conv
h
(x + BPF
1000~4000Hz
(v))+ w), l)+ ε v⎡
⎣
⎤
⎦


x 

Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)

Hannun, A. Y., et. al.: Deep Speech: Scaling up end- to-end speech recognition. arXiv preprint arXiv:1412.05567. (2014)




σ








Px =
1
T
xt
2
t=1
T
∑
Pv =
1
T
vt
2
t=1
T
∑ 10log10
Px
Pv



















 
 








 
 








 
 







Povey, D., et. al.: The Kaldi Speech Recognition Toolkit. In Proc. of ASRU. (2011)




Povey, D., et. al.: The Kaldi Speech Recognition Toolkit. In Proc. of ASRU. (2011)






Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)

Yang, Z., et. al.: Characterizing Audio Adversarial Examples Using Temporal Dependency. arXiv preprint arXiv:1809.10875. (2018)






Yang, Z., et. al.: Characterizing Audio Adversarial Examples Using Temporal Dependency. arXiv preprint arXiv:1809.10875. (2018)






Yang, Z., et. al.: Characterizing Audio Adversarial Examples Using Temporal Dependency. arXiv preprint arXiv:1809.10875. (2018)
















Schönherr, L., et. al.: Adversarial Attacks Against ASR Systems via Psychoacoustic Hiding. In Proc. of NDSS. (2019)
Yuan, X., et. al.: CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of USENIX Security. (2018)






Taori, R., et. al.: Targeted Adversarial Examples for Black Box Audio Systems. arXiv preprint arXiv:1805.07820. (2018)

More Related Content

More from Hiromu Yakura

CTFはとんでもないものを 盗んでいきました。私の時間です…
CTFはとんでもないものを 盗んでいきました。私の時間です…CTFはとんでもないものを 盗んでいきました。私の時間です…
CTFはとんでもないものを 盗んでいきました。私の時間です…
Hiromu Yakura
 
Androidにおける強制アクセス制御
Androidにおける強制アクセス制御Androidにおける強制アクセス制御
Androidにおける強制アクセス制御
Hiromu Yakura
 

More from Hiromu Yakura (20)

セキュリティ・キャンプのススメ
セキュリティ・キャンプのススメセキュリティ・キャンプのススメ
セキュリティ・キャンプのススメ
 
新しいライブ映像再生システムを研究してみた
新しいライブ映像再生システムを研究してみた新しいライブ映像再生システムを研究してみた
新しいライブ映像再生システムを研究してみた
 
GAME ON 特別イベント 「ゲームってなんでプログラミング?」
GAME ON 特別イベント 「ゲームってなんでプログラミング?」GAME ON 特別イベント 「ゲームってなんでプログラミング?」
GAME ON 特別イベント 「ゲームってなんでプログラミング?」
 
Arduinoでプログラミングに触れてみよう 続編
Arduinoでプログラミングに触れてみよう 続編Arduinoでプログラミングに触れてみよう 続編
Arduinoでプログラミングに触れてみよう 続編
 
Arduinoでプログラミングに触れてみよう
Arduinoでプログラミングに触れてみようArduinoでプログラミングに触れてみよう
Arduinoでプログラミングに触れてみよう
 
機械学習コン講評
機械学習コン講評機械学習コン講評
機械学習コン講評
 
NPCA夏合宿 2014 講義資料
NPCA夏合宿 2014 講義資料NPCA夏合宿 2014 講義資料
NPCA夏合宿 2014 講義資料
 
イタリアでパスタを食べた話
イタリアでパスタを食べた話イタリアでパスタを食べた話
イタリアでパスタを食べた話
 
Why don't you learn programming?
Why don't you learn programming?Why don't you learn programming?
Why don't you learn programming?
 
CTF, What's in it for me?
CTF, What's in it for me?CTF, What's in it for me?
CTF, What's in it for me?
 
Arrow Judge
Arrow JudgeArrow Judge
Arrow Judge
 
CTFとは
CTFとはCTFとは
CTFとは
 
CTFはとんでもないものを 盗んでいきました。私の時間です…
CTFはとんでもないものを 盗んでいきました。私の時間です…CTFはとんでもないものを 盗んでいきました。私の時間です…
CTFはとんでもないものを 盗んでいきました。私の時間です…
 
ぃぬ速@LKML
ぃぬ速@LKMLぃぬ速@LKML
ぃぬ速@LKML
 
プラトン
プラトンプラトン
プラトン
 
How to lick Miku
How to lick MikuHow to lick Miku
How to lick Miku
 
ICTのちから
ICTのちからICTのちから
ICTのちから
 
ナウいAndroidセキュリティ
ナウいAndroidセキュリティナウいAndroidセキュリティ
ナウいAndroidセキュリティ
 
Trendmicro Security Award 2012 Final Presentation
Trendmicro Security Award 2012 Final PresentationTrendmicro Security Award 2012 Final Presentation
Trendmicro Security Award 2012 Final Presentation
 
Androidにおける強制アクセス制御
Androidにおける強制アクセス制御Androidにおける強制アクセス制御
Androidにおける強制アクセス制御
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
PirithiRaju
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
NazaninKarimi6
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 

Recently uploaded (20)

PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx300003-World Science Day For Peace And Development.pptx
300003-World Science Day For Peace And Development.pptx
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its Functions
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
chemical bonding Essentials of Physical Chemistry2.pdf
chemical bonding Essentials of Physical Chemistry2.pdfchemical bonding Essentials of Physical Chemistry2.pdf
chemical bonding Essentials of Physical Chemistry2.pdf
 

Robust Audio Adversarial Example for a Physical Attack

  • 1.
  • 2. 
 
 Goodfellow, I. J., Shlens, J., & Szegedy, C.: Explaining and harnessing adversarial examples. In Proc. of ICLR. (2015) 

  • 3. 
 
 
 
 Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018) 

  • 4. 
 
 
 
 Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018) 
 

  • 5. 
 
 f :Rn → {1,…,k} x ∈!n !x ∈"n s.t. f (x) ≠ f (!x) ∧ D(x, !x) ≤ δ !x s.t. f (!x) = l ∧ D(x, !x) ≤ δ l ∈{1,…,k} panda f gibbon x !x f (x) f (!x)
  • 6. 
 
 !x = x + !v where !v = argmin v Loss f (x + v,l)+ ε " v " ε D(x, !x) ≤ δ panda
  • 7. 
 
 !x = x + !v where !v = argmin v Loss f (x + v,l)+ ε " v " ε D(x, !x) ≤ δ gibbon
  • 8. Athalye, A., et. al.: Synthesizing robust adversarial examples. In Proc. of ICML. (2018) 
 f (!x) = l
  • 9. 
 
 
 argmin v Et~Τ Loss f (t(x + v),l)+ ε D(t(x),t(x + v))⎡ ⎣⎢ ⎤ ⎦⎥ argmin v Loss f (x + v,l)+ ε ! v ! Athalye, A., et. al.: Synthesizing robust adversarial examples. In Proc. of ICML. (2018)
  • 10. Yuan, X., et. al.: CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of USENIX Security. (2018)
 Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)
  • 11. 
 Yuan, X., et. al.: CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of USENIX Security. (2018)
 Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)
  • 12. 
 Yuan, X., et. al.: CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of USENIX Security. (2018)
 Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)
  • 13. 
 
 
 argmin v Loss f (MFCC(x + v), l)+ ε ! v ! x ∈!T l ∈∑N argmin v Loss f (x + v,l)+ ε ! v ! Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)
  • 14. 
 
 
 Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018) Loss vt
  • 15. 
 
 Athalye, A., et. al.: Synthesizing robust adversarial examples. In Proc. of ICML. (2018)
  • 17. 
 
h(t) u(t) ′u (t) = u(x)h(t − x)dx −∞ ∞ ∫ 

  • 18. 
 
 H 
 argmin v Eh~H Loss(MFCC(Conv h (x + BPF 1000~4000Hz (v))), l)+ ε v⎡ ⎣ ⎤ ⎦ Conv h (⋅)
  • 19. 
 
 
Ν(0, σ 2 ) argmin v Eh~H ,w~N (0,σ 2 ) Loss(MFCC(Conv h (x + BPF 1000~4000Hz (v))+ w), l)+ ε v⎡ ⎣ ⎤ ⎦
  • 20. 
 x 
 Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)
 Hannun, A. Y., et. al.: Deep Speech: Scaling up end- to-end speech recognition. arXiv preprint arXiv:1412.05567. (2014)
  • 23.
  • 24.
  • 30. 
 
 Povey, D., et. al.: The Kaldi Speech Recognition Toolkit. In Proc. of ASRU. (2011)
  • 31. 
 
 Povey, D., et. al.: The Kaldi Speech Recognition Toolkit. In Proc. of ASRU. (2011)
  • 32. 
 
 
 Carlini, N., & Wagner, D.: Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. In Proc. of Deep Learning and Security Workshop. (2018)
 Yang, Z., et. al.: Characterizing Audio Adversarial Examples Using Temporal Dependency. arXiv preprint arXiv:1809.10875. (2018)
  • 33. 
 
 
 Yang, Z., et. al.: Characterizing Audio Adversarial Examples Using Temporal Dependency. arXiv preprint arXiv:1809.10875. (2018)
  • 34. 
 
 
 Yang, Z., et. al.: Characterizing Audio Adversarial Examples Using Temporal Dependency. arXiv preprint arXiv:1809.10875. (2018)
  • 36. 
 
 
 
 Schönherr, L., et. al.: Adversarial Attacks Against ASR Systems via Psychoacoustic Hiding. In Proc. of NDSS. (2019) Yuan, X., et. al.: CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proc. of USENIX Security. (2018)
  • 37. 
 
 
 Taori, R., et. al.: Targeted Adversarial Examples for Black Box Audio Systems. arXiv preprint arXiv:1805.07820. (2018)