VentriLock: Exploring voice-based authentication systems
Chaouki KASMI & José LOPES ESTEVES ANSSI, FRANCE
Hack In Paris – 06/2017
VentriLock: Exploring voice-based authentication systems Chaouki K - - PowerPoint PPT Presentation
VentriLock: Exploring voice-based authentication systems Chaouki K ASMI & Jos L OPES E STEVES ANSSI, F RANCE Hack In Paris 06/2017 WHO WE ARE Chaouki Kasmi and Jos Lopes Esteves ANSSI-FNISA / Wireless Security Lab
Hack In Paris – 06/2017
Chaouki Kasmi & José Lopes Esteves
2
Chaouki Kasmi & José Lopes Esteves
3
Chaouki Kasmi & José Lopes Esteves
5
Where? Who? What?
Chaouki Kasmi & José Lopes Esteves
6
Chaouki Kasmi & José Lopes Esteves
7
Chaouki Kasmi & José Lopes Esteves
8
Chaouki Kasmi & José Lopes Esteves
9
Chaouki Kasmi & José Lopes Esteves
10
Chaouki Kasmi & José Lopes Esteves
11
flickr.com/photos/hikingartist
Chaouki Kasmi & José Lopes Esteves
13
biometricsinstitute.org ISO/IEC 2382-37. Information technology — Vocabulary — Part 37: Biometrics
Chaouki Kasmi & José Lopes Esteves
14
Biometrics Behavioral Voice Physical Head Hand Others Others
Chaouki Kasmi & José Lopes Esteves
15
Chaouki Kasmi & José Lopes Esteves
16
http://www.busim.ee.boun.edu.tr
Chaouki Kasmi & José Lopes Esteves
17
http://www.busim.ee.boun.edu.tr
Chaouki Kasmi & José Lopes Esteves
18
Acquisition Signal processing Feature extraction Microphone Pre-emphasis Filtering… LPC, MFCC, LPCC, DWT, WPD, PLP… GMM, RNN… Comparison / Decision
Chaouki Kasmi & José Lopes Esteves
19
Chaouki Kasmi & José Lopes Esteves
20
Chaouki Kasmi & José Lopes Esteves
21
Extract from [12]
Chaouki Kasmi & José Lopes Esteves
23
Chaouki Kasmi & José Lopes Esteves
24
Chaouki Kasmi & José Lopes Esteves
25
Dan Jurafsky “Lecture 6: Feature Extraction and Acoustic Modeling “
Chaouki Kasmi & José Lopes Esteves
26
Chaouki Kasmi & José Lopes Esteves
27
Chaouki Kasmi & José Lopes Esteves
28
Chaouki Kasmi & José Lopes Esteves
30
Chaouki Kasmi & José Lopes Esteves
31
Chaouki Kasmi & José Lopes Esteves
32
Chaouki Kasmi & José Lopes Esteves
33
Chaouki Kasmi & José Lopes Esteves
34
Chaouki Kasmi & José Lopes Esteves
35
Chaouki Kasmi & José Lopes Esteves
36
1 bis
Chaouki Kasmi & José Lopes Esteves
37
Video 1
Chaouki Kasmi & José Lopes Esteves
38
Chaouki Kasmi & José Lopes Esteves
39
Video 2
Chaouki Kasmi & José Lopes Esteves
40
Chaouki Kasmi & José Lopes Esteves
41
1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1 try 2-100 try > 100 try – NOK Video 3
Chaouki Kasmi & José Lopes Esteves
42
1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 1 try 2-100 try > 100 try – NOK Removed
Chaouki Kasmi & José Lopes Esteves
43
Test Target 1 (Siri) Target 2 (S-voice) Target 3 (Google now) Impersonation
TD reconstruction
FD reconstruction
Model shifting
Chaouki Kasmi & José Lopes Esteves
45
Chaouki Kasmi & José Lopes Esteves
46
Chaouki Kasmi & José Lopes Esteves
47
Chaouki Kasmi & José Lopes Esteves
48
Chaouki Kasmi & José Lopes Esteves
49
Test Target 1 (Siri) Target 2 (S-voice) Target 3 (Google now) Impersonation
Replay
FD reconstruction
Features bruteforce WIP WIP WIP
Chaouki Kasmi & José Lopes Esteves
50
Chaouki Kasmi & José Lopes Esteves
51
Chaouki Kasmi & José Lopes Esteves
52
We thank the manufacturers and the editors for their interesting feedbacks
Chaouki Kasmi & José Lopes Esteves
[1] W. Diao et al., Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. SPSM 2014 [2] AVG, How an app could use Google Now to send an email on your behalf, YouTube, 2014 [3] T. Vaidya et al., Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition, Usenix Woot, 2015 [4] T. Vaidya et al., Hidden Voice Commands, Usenix Security, 2016 [5] C. Kasmi, J. Lopes Esteves, You don’t hear but you phone’s voice interface does, Hack In Paris15, 2015 [6] C. Kasmi, J. Lopes Esteves, Whisper in the Wire: Voice Command Injection Reloaded, Hack In Paris 16, 2016 [7] S. Chen et al, You can hear but you cannot steal: Defending against voice impersonation attacks
[8] Qualcomm, Continuous voice authentication for a mobile device, US patent WO2012135681 A3, 2012 [9] C.Kasmi, J.Lopes Esteves, Automated analysis of the effects induced by radio-frequency pulses
[10] JF.Bonastre et al., Person Authentication by Voice: A Need for Caution, EUROSPEECH, ISCA, 2003 [11] S. Prabhakar et al., Biometrics Recognition: Security and Privacy Concerns, IEEE Security & Privacy, 2003
54
Chaouki Kasmi & José Lopes Esteves
55