منابع مشابه
All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines
In this paper, we study voice impersonation attacks to defeat humans and machines. Equipped with the current advancement in automated speech synthesis, our attacker can build a very close model of a victim’s voice after learning only a very limited number of samples in the victim’s voice (e.g., mined through the Internet, or recorded via physical proximity). Specifically, the attacker uses voic...
متن کاملAll Your Access Tokens Are Belong to Us: Uncovering Large Facebook Collusion Networks Using Honeypots
Reputation fraud is prevalent in online social networks. Numerous services provide fake content, likes, and followers to artificially boost the popularity and trustworthiness of brands and celebrities. Such activities undermine the trusted nature of online social networks. In this paper, we uncover a thriving ecosystem of reputation manipulation services on Facebook that leverage the principle ...
متن کاملAll Your Droid Are Belong to Us: A Survey of Current Android Attacks
In the past few years, mobile devices (smartphones, PDAs) have seen both their computational power and their data connectivity rise to a level nearly equivalent to that available on small desktop computers, while becoming ubiquitous. On the downside, these mobile devices are now an extremely attractive target for largescale security attacks. Mobile device middleware is thus experiencing an incr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Royal Society of Medicine
سال: 1997
ISSN: 0141-0768,1758-1095
DOI: 10.1177/014107689709000907