Patrick Traynor’s research while affiliated with University of Florida and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (136)


RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces
  • Conference Paper

December 2024

·

3 Reads

Nathaniel Bennett

·

Weidong Zhu

·

Benjamin Simon

·

[...]

·

Kevin R. B. Butler



Figure 5: This ecosystem offers a variety of price points. On average, AI nudification generations cost between $1.00 and $0.06 depending on the application that the user bought from and the subscription tier that they purchased.
Analyzing the AI Nudification Application Ecosystem
  • Preprint
  • File available

November 2024

·

59 Reads

Given a source image of a clothed person (an image subject), AI-based nudification applications can produce nude (undressed) images of that person. Moreover, not only do such applications exist, but there is ample evidence of the use of such applications in the real world and without the consent of an image subject. Still, despite the growing awareness of the existence of such applications and their potential to violate the rights of image subjects and cause downstream harms, there has been no systematic study of the nudification application ecosystem across multiple applications. We conduct such a study here, focusing on 20 popular and easy-to-find nudification websites. We study the positioning of these web applications (e.g., finding that most sites explicitly target the nudification of women, not all people), the features that they advertise (e.g., ranging from undressing-in-place to the rendering of image subjects in sexual positions, as well as differing user-privacy options), and their underlying monetization infrastructure (e.g., credit cards and cryptocurrencies). We believe this work will empower future, data-informed conversations -- within the scientific, technical, and policy communities -- on how to better protect individuals' rights and minimize harm in the face of modern (and future) AI-based nudification applications. Content warning: This paper includes descriptions of web applications that can be used to create synthetic non-consensual explicit AI-created imagery (SNEACI). This paper also includes an artistic rendering of a user interface for such an application.

Download







Citations (75)


... Only 17 (22%) papers released their source code, and 5 papers (6%) release the exact prompts used to realize the attack. In contrast, 57 papers (72%) do not provide such low-level details (a result which echoes [62,161]). A detailed explanation of this analysis is provided in Appendix A-D (and these results are also shown in Table IV). ...

Reference:

SoK: On the Offensive Potential of AI
"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
  • Citing Conference Paper
  • November 2023

... By adding high frequency components out of the voice band, attackers can launch spectrum addition attacks to generate the audio that can be interpreted by machines but incomprehensible to humans [1]. In contrast, by removing the frequency components of weak strength from the audio spectrum, an attacker can launch spectrum reduction attacks to generate the audio that can be perceived by humans but cannot be correctly interpreted by machines [3], [2]. Moreover, attackers can manipulate the spectrum magnitude with a specific filter to bypass the spectrum-based detection mechanisms [69]. ...

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems

... The various attacks that can occur in the context of SMS OTP include replay attacks, brute force attacks, poor OTP creation attacks, man-in-the-middle attacks, phishing attacks, redirection attacks, and malware attacks. Due to the high risk of attack, the National Institute of Standards and Technology (NIST) [2] and the National Cyber Security Center (NCSC) [3] have removed SMS as a recommended OTP delivery channel. NIST states that the use of SMS is vulnerable to social engineering and malware attacks through endpoint compromise [2]. ...

SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication
  • Citing Conference Paper
  • May 2022

... Research has shown that DNNs are also vulnerable to adversarial attacks (Abdullah et al., 2021b;Finlayson et al., 2019;Ma et al., 2021;Szegedy, 2013;Wang et al., 2022Wang et al., , 2023. As modern ASR systems increasingly incorporate Semantic Web-driven technologies to better understand speech, the potential for adversarial attacks becomes even more complex. ...

Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

... Abdullah et al. [171] contribute to the growing body of work on adversarial attacks by classifying and evaluating the various vulnerabilities of ASR systems, particularly the endto-end architectures that are commonly used. Their research shows that adversarial attacks generally do not transfer well between different ASR models, calling for more adaptive and comprehensive defense strategies that can account for the unique challenges posed by these architectures. ...

SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
  • Citing Conference Paper
  • May 2021

... According to industry research, merchants are projected to incur losses of USD 130 billion from fraudulent transactions between 2018 and 2023 [1]. Many financial institutions allocate a security budget ranging from 20% to 30%, known as extended detection and response (XDR), considered a top priority in their security investments [2]. ...

Credit Card Fraud Is a Computer Security Problem
  • Citing Article
  • March 2021

IEEE Security and Privacy Magazine

... Adversarial attacks [3][4][5][6], for instance, aim to confuse the SV system by introducing well-crafted perturbations into the speech signals. In recent years, many studies [7][8][9][10][11][12] have conducted effective adversarial attacks on SV systems. On the other hand, spoofing attacks [13,14] attempt to mimic the timbre of target speakers through methods commonly including impersonation, replay, voice conversion, and speech synthesis. ...

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
  • Citing Conference Paper
  • January 2019

... The consequences become dangerous when these attacks are directed towards vital infrastructure. They can potentially disrupt essential services such as healthcare, transportation, and emergency response systems, as noted in various studies [25,26]. It is worth highlighting that the increasing integration of Internet of Things (IoT) devices into critical infrastructure renders them particularly susceptible to exploitation. ...

Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System
  • Citing Conference Paper
  • January 2019