Audio Attack Patterns

Reason about audio attack patterns as a defender. Learn ultrasonic / inaudible commands aimed at ASR, ASR misdirection through homophones / accents, voice-clone-as-input, the unique surface for voice agents and phone systems, the eval methodology, the defence stack (band-limit, ASR robustness training, voice-liveness, multi-factor confirmation on irreversible actions), and the disclosure norm.

6
Lessons
📋
Templates
Practitioner-Ready
100%
Free

Lessons in This Topic

Work through these 6 lessons in order, or jump to whichever is most relevant.