Discussion Paper: The Threat of Real Time Deepfakes

06/04/2023
by   Guy Frankovits, et al.
0

Generative deep learning models are able to create realistic audio and video. This technology has been used to impersonate the faces and voices of individuals. These “deepfakes” are being used to spread misinformation, enable scams, perform fraud, and blackmail the innocent. The technology continues to advance and today attackers have the ability to generate deepfakes in real-time. This new capability poses a significant threat to society as attackers begin to exploit the technology in advances social engineering attacks. In this paper, we discuss the implications of this emerging threat, identify the challenges with preventing these attacks and suggest a better direction for researching stronger defences.

READ FULL TEXT

page 1

page 3

research
01/08/2023

Deepfake CAPTCHA: A Method for Preventing Fake Calls

Deep learning technology has made it possible to generate realistic cont...
research
08/17/2022

DF-Captcha: A Deepfake Captcha for Preventing Fake Calls

Social engineering (SE) is a form of deception that aims to trick people...
research
05/28/2020

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums

Abusers increasingly use spyware apps, account compromise, and social en...
research
12/14/2020

The Emerging Threats of Deepfake Attacks and Countermeasures

Deepfake technology (DT) has taken a new level of sophistication. Cyberc...
research
06/02/2020

Threat Detection and Investigation with System-level Provenance Graphs: A Survey

With the development of information technology, the border of the cybers...
research
02/11/2020

The Rumour Mill: Making Misinformation Spread Visible and Tangible

The spread of misinformation presents a technological and social threat ...
research
07/29/2023

Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation

System auditing is a crucial technique for detecting APT attacks. Howeve...

Please sign up or login with your details

Forgot password? Click here to reset