{"id":"https://openalex.org/W4385080277","doi":"https://doi.org/10.1109/sp46215.2023.10179374","title":"Breaking Security-Critical Voice Authentication","display_name":"Breaking Security-Critical Voice Authentication","publication_year":2023,"publication_date":"2023-05-01","ids":{"openalex":"https://openalex.org/W4385080277","doi":"https://doi.org/10.1109/sp46215.2023.10179374"},"language":"en","primary_location":{"id":"doi:10.1109/sp46215.2023.10179374","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46215.2023.10179374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041529188","display_name":"Andre Kassis","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Andre Kassis","raw_affiliation_strings":["University of Waterloo,Cheriton School of Computer Science,Waterloo,Canada","Cheriton School of Computer Science, University of Waterloo, Waterloo, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo,Cheriton School of Computer Science,Waterloo,Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"Cheriton School of Computer Science, University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102843571","display_name":"Urs Hengartner","orcid":"https://orcid.org/0000-0002-9840-0015"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Urs Hengartner","raw_affiliation_strings":["University of Waterloo,Cheriton School of Computer Science,Waterloo,Canada","Cheriton School of Computer Science, University of Waterloo, Waterloo, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo,Cheriton School of Computer Science,Waterloo,Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"Cheriton School of Computer Science, University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041529188"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":2.0922,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89549198,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"951","last_page":"968"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.9641844034194946},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8526191711425781},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7467705011367798},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6391542553901672},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5897398591041565},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5263934135437012},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47509634494781494},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4430181682109833},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1544317603111267}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.9641844034194946},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8526191711425781},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7467705011367798},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6391542553901672},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5897398591041565},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5263934135437012},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47509634494781494},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4430181682109833},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1544317603111267},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp46215.2023.10179374","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46215.2023.10179374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":92,"referenced_works":["https://openalex.org/W1550612414","https://openalex.org/W1959608418","https://openalex.org/W1985029311","https://openalex.org/W2120605154","https://openalex.org/W2191779130","https://openalex.org/W2219249508","https://openalex.org/W2260330803","https://openalex.org/W2295176885","https://openalex.org/W2303197844","https://openalex.org/W2536166232","https://openalex.org/W2588445447","https://openalex.org/W2604341542","https://openalex.org/W2765636281","https://openalex.org/W2765811365","https://openalex.org/W2770312844","https://openalex.org/W2922258480","https://openalex.org/W2936802426","https://openalex.org/W2962717526","https://openalex.org/W2962747881","https://openalex.org/W2962788625","https://openalex.org/W2963077926","https://openalex.org/W2963127219","https://openalex.org/W2963389226","https://openalex.org/W2963857521","https://openalex.org/W2964243274","https://openalex.org/W2964301649","https://openalex.org/W2967606780","https://openalex.org/W2972359262","https://openalex.org/W2972811785","https://openalex.org/W2972908178","https://openalex.org/W3006808893","https://openalex.org/W3007679772","https://openalex.org/W3015811740","https://openalex.org/W3015958938","https://openalex.org/W3016138785","https://openalex.org/W3026777299","https://openalex.org/W3048605852","https://openalex.org/W3054852761","https://openalex.org/W3081618117","https://openalex.org/W3091896612","https://openalex.org/W3095259706","https://openalex.org/W3095570773","https://openalex.org/W3096023981","https://openalex.org/W3096614974","https://openalex.org/W3097794099","https://openalex.org/W3105920175","https://openalex.org/W3109668151","https://openalex.org/W3111548756","https://openalex.org/W3123630726","https://openalex.org/W3126280775","https://openalex.org/W3127781933","https://openalex.org/W3131867595","https://openalex.org/W3135833668","https://openalex.org/W3153453329","https://openalex.org/W3155956353","https://openalex.org/W3156272176","https://openalex.org/W3158663310","https://openalex.org/W3160636055","https://openalex.org/W3161011913","https://openalex.org/W3169964936","https://openalex.org/W3170179936","https://openalex.org/W3197134965","https://openalex.org/W3197358873","https://openalex.org/W3197934651","https://openalex.org/W3198329097","https://openalex.org/W3198486673","https://openalex.org/W3200167423","https://openalex.org/W3201197228","https://openalex.org/W3201506562","https://openalex.org/W3201773091","https://openalex.org/W3207651366","https://openalex.org/W3209050974","https://openalex.org/W3211329195","https://openalex.org/W4206071703","https://openalex.org/W4225527248","https://openalex.org/W4226246616","https://openalex.org/W4245692952","https://openalex.org/W4289173095","https://openalex.org/W4298633870","https://openalex.org/W4304197304","https://openalex.org/W4381198892","https://openalex.org/W6640963894","https://openalex.org/W6688816777","https://openalex.org/W6729756640","https://openalex.org/W6746295503","https://openalex.org/W6748288002","https://openalex.org/W6782061724","https://openalex.org/W6782072790","https://openalex.org/W6789915674","https://openalex.org/W6791025947","https://openalex.org/W6799089041","https://openalex.org/W6803516594"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2998478967","https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W3128793638","https://openalex.org/W2607818178","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W4387799680","https://openalex.org/W4308237908"],"abstract_inverted_index":{"Voice":[0],"authentication":[1],"(VA)":[2],"has":[3],"recently":[4],"become":[5],"an":[6,61],"integral":[7],"part":[8],"in":[9,233,276,297,299],"numerous":[10],"security-critical":[11,123,231],"operations,":[12],"such":[13],"as":[14,60,212],"bank":[15],"transactions":[16],"and":[17,45,50,56,75,113,150,181,191,214,262,290],"call":[18,277,281],"center":[19],"conversations.":[20],"The":[21,166,193],"vulnerability":[22],"of":[23,35,105,139,195,240,266,273,286,301,305],"automatic":[24],"speaker":[25],"verification":[26],"systems":[27,55,289],"(ASVs)":[28],"to":[29,41,116,156,161,177,201,242,293,310,313],"spoofing":[30,73,143],"attacks":[31,91],"instigated":[32],"the":[33,68,99,106,133,154,159,163,210,251,270,284,302],"development":[34],"countermeasures":[36,144],"(CMs),":[37],"whose":[38],"task":[39],"is":[40,172],"differentiate":[42],"between":[43,179],"bonafide":[44,182],"spoofed":[46,180],"speech.":[47],"Together,":[48],"ASVs":[49],"CMs":[51,174],"form":[52],"today\u2019s":[53],"VA":[54,93,232,288],"are":[57,188,198],"being":[58],"advertised":[59],"impregnable":[62],"access":[63,312],"control":[64],"mechanism.":[65],"We":[66],"develop":[67],"first":[69,252],"practical":[70],"attack":[71,164,197,227,255],"on":[72,132,185,256],"countermeasures,":[74],"demonstrate":[76],"how":[77],"a":[78,122,225,264],"malicious":[79],"actor":[80],"may":[81],"efficiently":[82],"craft":[83,162],"audio":[84,183],"samples":[85,206],"against":[86,92],"these":[87,125,204,308],"defenses.":[88],"Previous":[89],"adversarial":[90,205],"have":[94],"been":[95],"mainly":[96],"designed":[97],"for":[98,224],"whitebox":[100],"scenario,":[101],"which":[102],"assumes":[103],"knowledge":[104],"system\u2019s":[107],"internals,":[108],"or":[109],"requires":[110],"large":[111],"query":[112],"time":[114],"budgets":[115],"launch":[117],"target-specific":[118],"attacks.":[119],"When":[120],"attacking":[121],"system,":[124],"assumptions":[126],"do":[127],"not":[128],"hold.":[129],"Our":[130,279],"attack,":[131],"other":[134],"hand,":[135],"targets":[136],"common":[137],"points":[138],"failure":[140],"that":[141,173,187,203,228],"all":[142],"share,":[145],"making":[146],"it":[147],"real-time,":[148],"model-agnostic,":[149],"completely":[151],"blackbox":[152],"without":[153],"need":[155],"interact":[157],"with":[158,244],"target":[160],"samples.":[165],"key":[167],"message":[168],"from":[169],"our":[170,196],"work":[171],"mistakenly":[175],"learn":[176],"distinguish":[178],"based":[184],"cues":[186],"easily":[189],"identifiable":[190],"forgeable.":[192],"effects":[194],"subtle":[199],"enough":[200],"guarantee":[202],"can":[207,229],"still":[208],"bypass":[209,230],"ASV":[211],"well":[213],"preserve":[215],"their":[216,295,314],"original":[217],"textual":[218],"contents.":[219],"These":[220],"properties":[221],"combined":[222],"make":[223],"powerful":[226],"its":[234],"strictest":[235],"form,":[236],"yielding":[237],"success":[238],"rates":[239],"up":[241],"99%":[243],"only":[245],"6":[246],"attempts.":[247],"Finally,":[248],"we":[249],"perform":[250],"targeted,":[253],"over-telephony-network":[254],"CMs,":[257],"bypassing":[258,307],"several":[259],"known":[260],"challenges":[261],"enabling":[263],"variety":[265],"potential":[267],"threats,":[268],"given":[269],"increased":[271],"use":[272],"voice":[274],"biometrics":[275],"centers.":[278],"results":[280],"into":[282],"question":[283],"security":[285],"modern":[287],"urge":[291],"users":[292],"rethink":[294],"trust":[296],"them,":[298],"light":[300],"real":[303],"threat":[304],"attackers":[306],"measures":[309],"gain":[311],"most":[315],"valuable":[316],"resources.":[317]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
