acm-header
Sign In

Communications of the ACM

ACM TechNews

How Secure Are Voice Authentication Systems?


View as: Print Mobile App Share:

Voice authentication–which allows companies to verify the identity of their clients via a supposedly unique “voiceprint”–has increasingly been used in remote banking, call centers and other security-critical scenarios.

Credit: Getty Images

Computer scientists at Canada's University of Waterloo have developed an attack that can bypass voice authentication security systems after six attempts.

They created a program able to remove the markers in deepfake audio so it is indistinguishable from authentic audio.

Although their success rate against Amazon Connect's voice authentication system ranged from just 10% in a four-second attack to more than 40% in an attack of less than 30 seconds, their success rate was 99% after six attempts on less-sophisticated systems.

University of Waterloo's Urs Hengartner said, "By demonstrating the insecurity of voice authentication, we hope that companies relying on voice authentication as their only authentication factor will consider deploying additional or stronger authentication measures."

From University of Waterloo (Canada)
View Full Article

 

Abstracts Copyright © 2023 SmithBucklin, Washington, D.C., USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account