Publications
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
- Network and Distributed System Security Symposium (NDSS), 2023.
- Hadi Abdullah, Aaditya Karlekar, Saurabh Prasad, Sajid Rahman, Logan Blue, Luke Bauer, Vincent Bindschaedler, and Patrick Traynor
- Paper
Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction
- The 31st USENIX Security Symposium, 2022.
- Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin Butler, Patrick Traynor.
Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems
- The 10th International Conference on Learning Representations, 2022.
- Hadi Abdullah, Aditya Karlekar, Vincent Bindschaedler, and Patrick Traynor.
- Paper
Beyond Lp clipping: Equalization-based Psychoacoustic Attacks against ASRs
- The 13th Asian Conference on Machine Learning, 2021.
- Hadi Abdullah, Muhammad Sajidur Rahman, Christian Peeters, Cassidy Gibson, Washington Garcia, Vincent Bindschaedler, Thomas Shrimpton, and Patrick Traynor.
- Paper
The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
- 42nd IEEE Symposium on Security and Privacy, 2021.
- Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, and Patrick Traynor.
- Paper - Project Webpage
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
- 42nd IEEE Symposium on Security and Privacy, 2021.
- Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor.
- Paper - Project Webpage - Code
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.
- Network and Distributed System Security Symposium (NDSS), 2019.
- 2nd place at CSAW'19 Applied Research Competition.
- Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin Butler, and Joseph Wilson.
- Paper - Project Webpage - Code
2MA: Verifying Voice Commands via Two Microphone Authentication.
- ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS), 2018.
- Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor. In Proceedings of the 13th ACM
Sonar: Detecting SS7 Redirection Attacks Via Call Audio-Based Distance Bounding
- IEEE Symposium on Security and Privacy (S&P), 2018.
- Christian Peeters, Hadi Abdullah, Nolen Scaife and Jasmine Bowers and Patrick Traynor and Bradley Reaves and Kevin Butler
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls.
- USENIX Security Symposium, 2017.
- Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, and Tom Shrimpton.
A novel approach of data sanitization by noise addition and knowledge discovery by clustering
- Computer Networks and Information Security, 2015
- Hadi Abdullah and Ahsan Siddique.