all InfoSec news
A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network. (arXiv:2303.16031v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
Speaker verification has been widely used in many authentication scenarios.
However, training models for speaker verification requires large amounts of
data and computing power, so users often use untrustworthy third-party data or
deploy third-party models directly, which may create security risks. In this
paper, we propose a backdoor attack for the above scenario. Specifically, for
the Siamese network in the speaker verification system, we try to implant a
universal identity in the model that can simulate any enrolled speaker and …
attack authentication backdoor computing data identity large may network party power risks scenario security security risks system third third-party training verification