{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:25:43Z","timestamp":1774365943552,"version":"3.50.1"},"reference-count":109,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179374","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"951-968","source":"Crossref","is-referenced-by-count":13,"title":["Breaking Security-Critical Voice Authentication"],"prefix":"10.1109","author":[{"given":"Andre","family":"Kassis","sequence":"first","affiliation":[{"name":"University of Waterloo,Cheriton School of Computer Science,Waterloo,Canada"}]},{"given":"Urs","family":"Hengartner","sequence":"additional","affiliation":[{"name":"University of Waterloo,Cheriton School of Computer Science,Waterloo,Canada"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Voice Biometrics Market Size Worth $4.82Bn, Globally, by 2028"},{"key":"ref2","article-title":"Citi Uses Voice Prints To Authenticate Customers Quickly And Effortlessly"},{"key":"ref3","article-title":"What is Voice ID security\u0192"},{"key":"ref4","article-title":"Nuance VocalPassword : voice biometrics authentication"},{"key":"ref6","article-title":"ING Introduces a Voice-Controlled Mobile Banking App Powered by Nuance"},{"key":"ref7","article-title":"Nuance Voice Biometrics Quickly Identifies Customers and Strengthens Security for National Australia Bank"},{"key":"ref8","article-title":"Voice Print System"},{"key":"ref9","article-title":"How I broke into a bank account with an AI-generated voice","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461368"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2007.907344"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484742"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-8"},{"key":"ref15","article-title":"2022 Intelligent Authentication and Fraud Prevention Intelliview"},{"key":"ref16","article-title":"Gatekeeper: Cloud-native biometric security for every channel"},{"key":"ref17","article-title":"ID R&D. ID R&D Voice"},{"key":"ref18","article-title":"ID R&D. ID R&D ranks first in detecting synthetic speech in Global ASVspoof Challenge"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2022-16"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423348"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462693"},{"key":"ref23","article-title":"Did you hear that\u0192 Adversarial examples against automatic speech recognition","author":"Alzantot","journal-title":"NIPS 2018."},{"key":"ref24","article-title":"Devil\u2019s whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices","volume-title":"USENIX Security 2020.","author":"Chen"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485383"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/sp40001.2021.00004"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6664578"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384733"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00009"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU46091.2019.9003763"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2834"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2666534"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105469"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.21437\/iberspeech.2021-54"},{"key":"ref35","article-title":"Connect VoiceID"},{"key":"ref36","article-title":"Cloud STT"},{"key":"ref37","article-title":"Azure STT"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3238-7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053076"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISIMP.2004.1434021"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-27"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3080-9"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1052"},{"key":"ref44","article-title":"Void: A fast and light voice liveness detection system","author":"Ahmed","journal-title":"USENIX Security 2020."},{"key":"ref45","article-title":"Your microphone array retains your identity: A robust voice liveness detection system for smart speaker","author":"Meng","year":"2022","journal-title":"USENIX Security"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978296"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133962"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3437518"},{"key":"ref49","article-title":"A rootkit for Android. Based on \u201cAndroid platform based linux kernel rootkit\u201d from Phrack Issue 68"},{"key":"ref50","article-title":"Android: How to Bypass Root Check and Certificate Pinning"},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.21437\/Interspeech.2019-2441","article-title":"LibriTTS: A corpus derived from LibriSpeech for text-to-speech","volume-title":"Interspeech 2019.","author":"Zen"},{"key":"ref52","article-title":"Voice ID in the ANZ App"},{"key":"ref53","article-title":"Social Engineering Attacks by the Numbers: Prevalence, Costs, and Impact"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/taslp.2023.3285283"},{"key":"ref55","article-title":"Wavefake: a data set to facilitate audio deepfake detection","author":"Frank","journal-title":"NeurIPS 2021."},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.21437\/odyssey.2016-41"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1121\/1.1916407"},{"key":"ref58","article-title":"Pre-emphasis"},{"key":"ref59","article-title":"timsainb\/noisereduce: v1.0","author":"Sainburg","year":"2019"},{"key":"ref60","article-title":"Vocal Toolkit"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-7b98e3ed-003"},{"key":"ref62","article-title":"Python interface to the WebRTC Voice Activity Detector (VAD)"},{"key":"ref63","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016"},{"key":"ref64","article-title":"Amazon Connect"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/icassp43922.2022.9747766"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-1"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3089437"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.21437\/ASVSPOOF.2021-4"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-2125"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-702"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3076358"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413828"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2021-1187"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-1768"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2249"},{"key":"ref77","article-title":"Google releases dataset to help AI systems spot fake audio recordings"},{"key":"ref79","article-title":"CommanderSong: A systematic approach for practical adversarial voice recognition","author":"Yuan","journal-title":"USENIX Security 2018."},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462665"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2020.101114"},{"key":"ref84","article-title":"MUSAN: A Music, Speech, and Noise Corpus","author":"Snyder","year":"2015"},{"key":"ref85","article-title":"Who are you (I really wanna know)\u0192 Detecting audio deepfakes through vocal tract reconstruction","author":"Blue","journal-title":"USENIX Security 2022."},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00014"},{"key":"ref87","article-title":"Mechanical Turk Platform"},{"key":"ref88","article-title":"Text-To-Speech"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053643"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414843"},{"key":"ref91","article-title":"Adversarial attacks and defenses for speaker identification systems","author":"Joshi","year":"2021"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2019-2983"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"ref94","article-title":"Auto-encoding variational Bayes","author":"Kingma","year":"2013"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2441"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427289"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2021-1281"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417254"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPA.2018.8659666"},{"key":"ref100","article-title":"Pipe Overflow: Smashing voice authentication for fun and profit","author":"Ahmed","year":"2022"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2671435"},{"key":"ref102","article-title":"Houdini: Fooling deep structured visual and speech recognition models with adversarial examples","author":"Cisse","journal-title":"NIPS 2017."},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053747"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3376897.3377856"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1955"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2458"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2021.101199"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23362"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2021.3124420"},{"key":"ref110","article-title":"Adversarial post-processing of voice conversion against spoofing detection","volume-title":"Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","author":"Ding"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6410478"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/3552466.3556532"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref114","article-title":"Microsoft Azure Speech Recognition vs. Rev AI Speech to Text API"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179374.pdf?arnumber=10179374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:11:58Z","timestamp":1721452318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":109,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179374","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}