Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Ideas for defeating Anti-Deep-Fakes
Search
Ren Kimura
November 14, 2024
Programming
0
85
Ideas for defeating Anti-Deep-Fakes
[email protected]
Ren Kimura
November 14, 2024
Tweet
Share
More Decks by Ren Kimura
See All by Ren Kimura
脅威解析概論
rkx1209
0
84
セキュリティベンチャーのリスク管理
rkx1209
0
140
ファジング+トリアージ技術を用いた脆弱性解析自動化
rkx1209
0
120
Introduction to Fuzzing
rkx1209
6
4.3k
ARM TrustZone エクスプロイト入門
rkx1209
7
8.4k
The Game is Over. Nintendo switch has been totally compromised
rkx1209
9
5.2k
インサイドNintendo Switch
rkx1209
18
13k
More efficient remote debugging with Thin Hypervisor
rkx1209
3
2.6k
Reverse Debugging with radare2
rkx1209
6
2k
Other Decks in Programming
See All in Programming
AIの誤りが許されない業務システムにおいて“信頼されるAI” を目指す / building-trusted-ai-systems
yuya4
7
4.2k
MDN Web Docs に日本語翻訳でコントリビュート
ohmori_yusuke
0
130
CSC307 Lecture 02
javiergs
PRO
1
740
PC-6001でPSG曲を鳴らすまでを全部NetBSD上の Makefile に押し込んでみた / osc2025hiroshima
tsutsui
0
200
【卒業研究】会話ログ分析によるユーザーごとの関心に応じた話題提案手法
momok47
0
160
副作用をどこに置くか問題:オブジェクト指向で整理する設計判断ツリー
koxya
1
190
HTTPプロトコル正しく理解していますか? 〜かわいい猫と共に学ぼう。ฅ^•ω•^ฅ ニャ〜
hekuchan
2
590
生成AI時代を勝ち抜くエンジニア組織マネジメント
coconala_engineer
0
37k
令和最新版Android Studioで化石デバイス向けアプリを作る
arkw
0
470
ZJIT: The Ruby 4 JIT Compiler / Ruby Release 30th Anniversary Party
k0kubun
1
310
QAフローを最適化し、品質水準を満たしながらリリースまでの期間を最短化する #RSGT2026
shibayu36
0
740
Context is King? 〜Verifiability時代とコンテキスト設計 / Beyond "Context is King"
rkaga
10
1.5k
Featured
See All Featured
Building Experiences: Design Systems, User Experience, and Full Site Editing
marktimemedia
0
360
Reflections from 52 weeks, 52 projects
jeffersonlam
355
21k
A designer walks into a library…
pauljervisheath
210
24k
Designing Dashboards & Data Visualisations in Web Apps
destraynor
231
54k
Facilitating Awesome Meetings
lara
57
6.7k
How STYLIGHT went responsive
nonsquared
100
6k
The Pragmatic Product Professional
lauravandoore
37
7.1k
The Art of Delivering Value - GDevCon NA Keynote
reverentgeek
16
1.8k
Money Talks: Using Revenue to Get Sh*t Done
nikkihalliwell
0
130
CoffeeScript is Beautiful & I Never Want to Write Plain JavaScript Again
sstephenson
162
16k
How to optimise 3,500 product descriptions for ecommerce in one day using ChatGPT
katarinadahlin
PRO
0
3.4k
30 Presentation Tips
portentint
PRO
1
180
Transcript
Ideas for defeating Anti-Deep-Fakes Ren Kimura (@RKX1209) AVTOKYO 2024.11.14 Prepare
for the next cyber threat
2 whoami Founder & CEO of Ricerca Security, Inc. Product
Manager (PdM) Ren Kimura (X: @RKX1209) Interested in : Bizdev and Vulnerability Research (VR)
Face Synthesis 3 What is the “Deep Fake” = Techniques
to generate fake media (video, image, voice…) Face manipulation techniques for generating fake videos/images. Face Swap Attribute Manipulation Expression Swap
Name cosine dist login Admin’s voice 0.0 N/A Text to
Speach 0.08 ✔ Another person’s voice 0.69 ☓ 4 DeepFake demo Login_With_Voice_Verification Voice Cloning
5 Any perfect verifier exists? Media data movie.mp4 image.jpg voice.wav
verifier “Real” “Fake”
6 Verification methods Detection Science & Tech Spotlight: Combating Deepfakes
(GAO-24-107292) Authentication • Bit patterns • Color abnormalities • Facial/Vocal inconsistencies “Recorded by camera.”
7 C2PA (Coalition for Content Provenance and Authenticity) original.jpg •
2024-09-04 21:00 • Created: Canon EOS R1 … C2PA meta data c2pa.actions hash function encrypt function encrypted hash Private key in EOS R1
8 edited.jpg C2PA meta data c2pa.actions c2pa.ingredients • original.jpg hash
function encrypt function encrypted hash Private key in Adobes account • 2024-09-10 12:54 • Edited: Adobe Photoshop • Actions: Crop, Frame… … Chain of metadata
9 Chain of trust original.jpg edited.jpg C2PA metadata “Recorded by
Canon EOS R1“ X.509 certificate chain “Edited by Adobe Photoshop“ parent Editor (adobe account)
10 C2PA signing by Generative AI services image.webp image.webp C2PA
metadata “Created by DALL-E“ X.509 certificate chain “Use original one as an ingredient“ parent
11 "Captured with a camera" (~2024.10.15) “I am really at
the zoo” https://www.youtube.com/watch?v=gfjgRHtDa38
12 Guessing from their official help page. original.mp4 “Recorded by
Canon EOS R1“ upload ・・・・ Whitelist “They are cameras” How does it work
13 ❌ Generative AI: “No camera” gen_by_sora.mp4 “Created by OpenAIs
SORA“ upload C2PA metadata X.509 certificate chain ・・・・ Whitelist “They are cameras” Not matched!
14 ✔"Captured with a camera" “Recorded by Canon EOS R1
“ “Edited by Adobe Premiere Pro“ ・・・・ Whitelist “They are cameras” upload Get original mp4 by social engineering, crawling…
15 Air gapping scenario edited.mp4 faked.mp4 C2PA metadata “Recorded by
Canon EOS R1 “ X.509 certificate chain Record over the air
16 ❌ “No camera” edited.mp4 faked.mp4 C2PA metadata “Recorded by
Sony α7 IV “ X.509 certificate chain SONY metadata “It may record 2D flattened area“ Record 3d-depth over the air
17 My approach:
18 Perfect verifier doesn’t exist Media data movie.mp4 image.jpg voice.wav
verifier “Real” “Fake”
19 What should Blue/White-team do? “A Guide to Preparing and
Responding to Deepfake Events” OWASP TOP10 LLM App&GenAI (2024.10)
20 What should Blue/White-team do? Financial gain through fraud by
impersonation. Impersonation for cyberattacks Job Interview Fraud Mis/Dis/Mal Information
21 Conclusion Detection and Authentication methods are not perfect Proposed
a new technique to bypass C2PA authentication Defense-in-depth and layered controls are required.
None