The crux of voice (in)security: a brain study of speaker legitimacy detection
The crux of voice (in)security: a brain study of speaker legitimacy detection Neupane et al., NDSS’19
The key results of this paper are easy to understand, but the implications are going to take us a long time to unravel. Speech morphing (voice morphing) is the process of translating a speaker’s voice to sound like a given impersonation target. This capability is now available off-the-shelf —this paper uses the CMU Festvox voice converter— and is getting better all the time. Being able to impersonate someone’s voice takes things like social engineering attacks to a whole new level…
…voice imitation is an emerging class of threats, especially given the advancement in speech synthesis technology seen in a variety of contexts that can harm a victim’s reputation and her security/safety. For instance, the attacker could publish the morphed voice samples on social media, impersonate the victim in phone conversations, leave fake voice messages to the victim’s contacts, and even launch man-in-the-middle attacks against end-to-end encryption technologies that require users to verify the voices of the callers, to name a few instances of such attacks.
So voice should sit alongside images and video as a source we can’t trust in our new Continue reading


Within a span of 24 hours, Ericsson and Nokia both claimed to have 16 commercial 5G deals with...


SDxCentral Weekly Wrap for March 29, 2019: Oracle jobs cuts are tied to the cloud; VeloCloud's...
U.K. authorities have “limited confidence in Huawei’s ability to understand the content of any...
As SD-WAN matures it will need to meet the requirements of the changing enterprise, which include...
If compromised, the flaw could allow an attacker to write files to any path on the user’s machine.