Discussion Paper: The Threat of Real Time Deepfakes

Guy Frankovits, Yisroel Mirsky

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Generative deep learning models are able to create realistic audio and video. This technology has been used to impersonate the faces and voices of individuals. These "deepfakes"are being used to spread misinformation, enable scams, perform fraud, and blackmail the innocent. The technology continues to advance and today attackers have the ability to generate deepfakes in real-Time. This new capability poses a significant threat to society as attackers begin to exploit the technology in advances social engineering attacks. In this paper, we discuss the implications of this emerging threat, identify the challenges with preventing these attacks and suggest a better direction for researching stronger defences.

Original languageEnglish
Title of host publicationWDC 2023 - Proceedings of the 2nd Workshop on the security implications of Deepfakes and Cheapfakes, held in conjunction with ACM AsiaCCS 2023
PublisherAssociation for Computing Machinery, Inc
Pages20-23
Number of pages4
ISBN (Electronic)9798400700989
DOIs
StatePublished - 10 Jul 2023
Event2nd Workshop on the security implications of Deepfakes and Cheapfakes, WDC 2023, held in conjunction with ACM AsiaCCS 2023 - Melbourne, Australia
Duration: 10 Jul 202314 Jul 2023

Publication series

NameWDC 2023 - Proceedings of the 2nd Workshop on the security implications of Deepfakes and Cheapfakes, held in conjunction with ACM AsiaCCS 2023

Conference

Conference2nd Workshop on the security implications of Deepfakes and Cheapfakes, WDC 2023, held in conjunction with ACM AsiaCCS 2023
Country/TerritoryAustralia
CityMelbourne
Period10/07/2314/07/23

Keywords

  • Deepfake
  • cyber security
  • deep fake
  • impersonation
  • phishing
  • social engineering

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'Discussion Paper: The Threat of Real Time Deepfakes'. Together they form a unique fingerprint.

Cite this