SlideShare a Scribd company logo
1 of 45
Download to read offline
PUT WORDS IN MY MOUTH
DC2711
Amy Mania
amy@telspace.co.za | @The_MunX
whoami
• Junior Security Analyst @ Telspace
• Recreational Researcher
• Architect
• Understand how to make, so you can learn
how to break.
PUT WORDS IN MY MOUTH
INTRODUCTION
POP CULTURE, IOTS, ANATOMY, SOFTWARE
IN THE WILD
RESEARCH, PREDICTIONS, INCIDENTS
PROOF OF CONCEPT
CONTEXT
IoT
IoT
IoT
• Reputable brand = security + updates
• Cheap device = stuck with initial product
IoT
• Designed to always be listening.
• Google & Amazon staff QA recorded audio.
• Trust? Privacy?
IoT
• Always listening = always recording
• Where is this data stored?
• Database breach?
IoT
But, how do machines understand us?
HOW A VOICE IS MADE
The Part That
Makes Sound:
string of a
violin
vocal folds
The Part That
Shapes Sound:
body of a violin
supralaryngeal
articulators
HOW A VOICE IS MADE
supralaryngeal articulators/vocal tract
VOICE RECOGNITION
Phenomes:
• r eh k ao g n ay z s p iy ch
– "recognise speech "
• r eh k ay n ay s b iy ch
– "wreck a nice beach"
VOICE RECOGNITION
• Homonyms
– there and their
– air and heir
– be and bee
• Speech
– accent
– tempo & mumble
– enunciation
VOICE RECOGNITION
• How does software understand WHAT we
are saying?
• NATURAL LANGUAGE PROCESSING:
– CONTEXT and/or PROBABILITY
VOICE-PRINTING
VOICE VERIFICATION
How voices are identified as unique:
• Text Dependent:
– Same passphrase during sign-up and verification
• Text Independent
– verifying the identity without constraint on the
speech content
EACH VOICE IS “UNIQUE”
Listen up, maggots. You are not special.
You are not a beautiful or unique snowflake.
You're the same decaying organic
matter as everything else.
Tyler Durden - Fight Club
THE LAW
• Protection of Personal Information Act
Biometric information includes a technique of
personal identification that is based on physical,
physiological or behavioural characterisation
including blood typing, fingerprinting, DNA
analysis, retinal scanning and voice recognition.
THE LAW
• Verbal agreements are no less binding than
written agreements.
• Having your voice spoofed is theft!
IN THE WILD
Many predictions about voice spoofing attacks…
• Breaking Smart Speakers: We Are Listening To You - Tencent Blade Team
• Your Voice is My Passport – Seymour & Aqil
• This AI Can Clone Any Voice, Including Yours - Bloomberg
• Can-You-Hear-Me Scam - Criminals
• Vocal theft on the horizon - Taylor Armerding
• Busted: Thousands Of Amazon Employees Listening To Alexa Conversations – Durden
• Digital Voice Assistants: The New Front in the War on IoT Hackers – Edwards
• Balancing safety and convenience with biometrics – Gool
IT HAPPENED…
IN THE WILD
IN THE WILD
• Attacks require a lot of preparation, time,
‘expertise’ and resources.
• Attack vector will become much easier.
• ‘High profile’ individuals = more risk.
TOOLS
THE FOLLOWING AUDIO CLIPS ARE NOT REAL, THEY
WERE GENERATED BY A MACHINE LEARNING MODEL:
TOOLS
• TacoTron
• LyreBird
• Adobe VoCo
DEEP FAKE APPLICATIONS
DEEPTHROAT
INPUT: SAMPLE VOICE
M A G I C
OUTPUT: SPOOFED VOICE
DEEPTHROAT – STEP 1
• Input audio
– e.g. recording from IoT, or videos from YouTube
• Cut input into 10 second clips
• Pass to a Subtitle API
– Manually check subtitles/transcription
DEEPTHROAT – STEP 2
• App takes input audio and it is processed
through the Deep Learning model
DEEPTHROAT – STEP 3
• Threat Actor prepares the Attack Script
• Once the spoofed voice is generated, the
App automatically creates the sentences
from the Attack Script
DEEPTHROAT – STEP 4
• Connect VAC
– Virtual Audio Cable allows sound from one
application to be passed to another.
• Connects to a Phone-Call App (e.g. Skype)
– Can make international calls
– Number cannot be easily traced back
DEEPTHROAT – STEP 5
• Ambiance
– Background noise can be added to cover up for
poorly generated syllables or make the audio
sound more realistic
DEEPTHROAT – STEP 6
ATTACK
PoC
PoC
Can this fool a bank?
PoC
PoC
PoC
Real-Time-Voice-Cloning Demo
MITIGATION
• Prevention is almost impossible*
• Opt out if a service-provider uses your voice
for identity-verification or authorisation.
MITIGATION
• Something you know (PASSWORD)
• Something you ‘are’ (VOICE/FINGERPRINT)
• Something you have (PHYSICAL TOKEN/2FA)
Amy mania - Put Words In My Mouth - DC2711 2019

More Related Content

What's hot

Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobilegrugq
 
Security First - Adam Baldwin
Security First - Adam BaldwinSecurity First - Adam Baldwin
Security First - Adam BaldwinAdam Baldwin
 
FETC - A Laptop in Every Classroom: Lessons Learned
FETC - A Laptop in Every Classroom: Lessons LearnedFETC - A Laptop in Every Classroom: Lessons Learned
FETC - A Laptop in Every Classroom: Lessons LearnedJoseph Schorr
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
Synapse india reviews on android and ios
Synapse india reviews on android and iosSynapse india reviews on android and ios
Synapse india reviews on android and iossaritasingh19866
 
Android intro
Android introAndroid intro
Android introvjy424
 
6 Months Industrial Training in Big Data in Chandigarh
6 Months Industrial Training in Big Data in Chandigarh6 Months Industrial Training in Big Data in Chandigarh
6 Months Industrial Training in Big Data in ChandigarhArcadian Learning
 
Synapseindia android apps intro to android and i os
Synapseindia android apps intro to android and i osSynapseindia android apps intro to android and i os
Synapseindia android apps intro to android and i osSynapseindiappsdevelopment
 
Internet security lessons for IoT
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoTDirk Zittersteyn
 
Video Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptxVideo Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptxTechnomine
 

What's hot (12)

Lorex Security
Lorex SecurityLorex Security
Lorex Security
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
 
Security First - Adam Baldwin
Security First - Adam BaldwinSecurity First - Adam Baldwin
Security First - Adam Baldwin
 
FETC - A Laptop in Every Classroom: Lessons Learned
FETC - A Laptop in Every Classroom: Lessons LearnedFETC - A Laptop in Every Classroom: Lessons Learned
FETC - A Laptop in Every Classroom: Lessons Learned
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Synapse india reviews on android and ios
Synapse india reviews on android and iosSynapse india reviews on android and ios
Synapse india reviews on android and ios
 
Android intro
Android introAndroid intro
Android intro
 
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
 
6 Months Industrial Training in Big Data in Chandigarh
6 Months Industrial Training in Big Data in Chandigarh6 Months Industrial Training in Big Data in Chandigarh
6 Months Industrial Training in Big Data in Chandigarh
 
Synapseindia android apps intro to android and i os
Synapseindia android apps intro to android and i osSynapseindia android apps intro to android and i os
Synapseindia android apps intro to android and i os
 
Internet security lessons for IoT
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoT
 
Video Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptxVideo Surveillance in Residential Communities!.pptx
Video Surveillance in Residential Communities!.pptx
 

Similar to Amy mania - Put Words In My Mouth - DC2711 2019

CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacNCCOMMS
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwordsBunmi Sowande
 
Podcasting 101, by Elise Michaels
Podcasting 101, by Elise MichaelsPodcasting 101, by Elise Michaels
Podcasting 101, by Elise MichaelsRobert Kieffer
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Kenneth Carnesi, JD
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
 
Building trust and Enabling innivation for voice enabled IOT
Building trust and Enabling innivation for voice enabled IOTBuilding trust and Enabling innivation for voice enabled IOT
Building trust and Enabling innivation for voice enabled IOTPriyanka Aash
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
DIGITAL MEDIA
DIGITAL MEDIADIGITAL MEDIA
DIGITAL MEDIARene Ge
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBarcamp Kerala
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023KharimMchatta
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to usPriyanka Aash
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
Sphereshield for Zoom - Presentation
Sphereshield for Zoom - PresentationSphereshield for Zoom - Presentation
Sphereshield for Zoom - PresentationAGATSoftware
 
Plenary Keynote Intro at Bio IT World West - Diane Burley, Lucidworks VP Content
Plenary Keynote Intro at Bio IT World West - Diane Burley, Lucidworks VP ContentPlenary Keynote Intro at Bio IT World West - Diane Burley, Lucidworks VP Content
Plenary Keynote Intro at Bio IT World West - Diane Burley, Lucidworks VP ContentLucidworks
 

Similar to Amy mania - Put Words In My Mouth - DC2711 2019 (20)

CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha Kranjac
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
Podcasting 101, by Elise Michaels
Podcasting 101, by Elise MichaelsPodcasting 101, by Elise Michaels
Podcasting 101, by Elise Michaels
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
Building trust and Enabling innivation for voice enabled IOT
Building trust and Enabling innivation for voice enabled IOTBuilding trust and Enabling innivation for voice enabled IOT
Building trust and Enabling innivation for voice enabled IOT
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
DIGITAL MEDIA
DIGITAL MEDIADIGITAL MEDIA
DIGITAL MEDIA
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 HackingBar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
What is ethical hacking
What is ethical hackingWhat is ethical hacking
What is ethical hacking
 
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to us
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Sphereshield for Zoom - Presentation
Sphereshield for Zoom - PresentationSphereshield for Zoom - Presentation
Sphereshield for Zoom - Presentation
 
Plenary Keynote Intro at Bio IT World West - Diane Burley, Lucidworks VP Content
Plenary Keynote Intro at Bio IT World West - Diane Burley, Lucidworks VP ContentPlenary Keynote Intro at Bio IT World West - Diane Burley, Lucidworks VP Content
Plenary Keynote Intro at Bio IT World West - Diane Burley, Lucidworks VP Content
 

Recently uploaded

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 

Amy mania - Put Words In My Mouth - DC2711 2019

  • 1. PUT WORDS IN MY MOUTH DC2711 Amy Mania amy@telspace.co.za | @The_MunX
  • 2. whoami • Junior Security Analyst @ Telspace • Recreational Researcher • Architect • Understand how to make, so you can learn how to break.
  • 3. PUT WORDS IN MY MOUTH INTRODUCTION POP CULTURE, IOTS, ANATOMY, SOFTWARE IN THE WILD RESEARCH, PREDICTIONS, INCIDENTS PROOF OF CONCEPT
  • 5.
  • 6. IoT
  • 7. IoT
  • 8. IoT • Reputable brand = security + updates • Cheap device = stuck with initial product
  • 9. IoT • Designed to always be listening. • Google & Amazon staff QA recorded audio. • Trust? Privacy?
  • 10. IoT • Always listening = always recording • Where is this data stored? • Database breach?
  • 11. IoT But, how do machines understand us?
  • 12. HOW A VOICE IS MADE The Part That Makes Sound: string of a violin vocal folds The Part That Shapes Sound: body of a violin supralaryngeal articulators
  • 13. HOW A VOICE IS MADE supralaryngeal articulators/vocal tract
  • 14. VOICE RECOGNITION Phenomes: • r eh k ao g n ay z s p iy ch – "recognise speech " • r eh k ay n ay s b iy ch – "wreck a nice beach"
  • 15. VOICE RECOGNITION • Homonyms – there and their – air and heir – be and bee • Speech – accent – tempo & mumble – enunciation
  • 16. VOICE RECOGNITION • How does software understand WHAT we are saying? • NATURAL LANGUAGE PROCESSING: – CONTEXT and/or PROBABILITY
  • 18. VOICE VERIFICATION How voices are identified as unique: • Text Dependent: – Same passphrase during sign-up and verification • Text Independent – verifying the identity without constraint on the speech content
  • 19. EACH VOICE IS “UNIQUE” Listen up, maggots. You are not special. You are not a beautiful or unique snowflake. You're the same decaying organic matter as everything else. Tyler Durden - Fight Club
  • 20. THE LAW • Protection of Personal Information Act Biometric information includes a technique of personal identification that is based on physical, physiological or behavioural characterisation including blood typing, fingerprinting, DNA analysis, retinal scanning and voice recognition.
  • 21. THE LAW • Verbal agreements are no less binding than written agreements. • Having your voice spoofed is theft!
  • 22. IN THE WILD Many predictions about voice spoofing attacks… • Breaking Smart Speakers: We Are Listening To You - Tencent Blade Team • Your Voice is My Passport – Seymour & Aqil • This AI Can Clone Any Voice, Including Yours - Bloomberg • Can-You-Hear-Me Scam - Criminals • Vocal theft on the horizon - Taylor Armerding • Busted: Thousands Of Amazon Employees Listening To Alexa Conversations – Durden • Digital Voice Assistants: The New Front in the War on IoT Hackers – Edwards • Balancing safety and convenience with biometrics – Gool
  • 25. IN THE WILD • Attacks require a lot of preparation, time, ‘expertise’ and resources. • Attack vector will become much easier. • ‘High profile’ individuals = more risk.
  • 26. TOOLS
  • 27. THE FOLLOWING AUDIO CLIPS ARE NOT REAL, THEY WERE GENERATED BY A MACHINE LEARNING MODEL:
  • 30.
  • 31. DEEPTHROAT INPUT: SAMPLE VOICE M A G I C OUTPUT: SPOOFED VOICE
  • 32. DEEPTHROAT – STEP 1 • Input audio – e.g. recording from IoT, or videos from YouTube • Cut input into 10 second clips • Pass to a Subtitle API – Manually check subtitles/transcription
  • 33. DEEPTHROAT – STEP 2 • App takes input audio and it is processed through the Deep Learning model
  • 34. DEEPTHROAT – STEP 3 • Threat Actor prepares the Attack Script • Once the spoofed voice is generated, the App automatically creates the sentences from the Attack Script
  • 35. DEEPTHROAT – STEP 4 • Connect VAC – Virtual Audio Cable allows sound from one application to be passed to another. • Connects to a Phone-Call App (e.g. Skype) – Can make international calls – Number cannot be easily traced back
  • 36. DEEPTHROAT – STEP 5 • Ambiance – Background noise can be added to cover up for poorly generated syllables or make the audio sound more realistic
  • 38. PoC
  • 39. PoC Can this fool a bank?
  • 40. PoC
  • 41. PoC
  • 43. MITIGATION • Prevention is almost impossible* • Opt out if a service-provider uses your voice for identity-verification or authorisation.
  • 44. MITIGATION • Something you know (PASSWORD) • Something you ‘are’ (VOICE/FINGERPRINT) • Something you have (PHYSICAL TOKEN/2FA)