This is the implementation of the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification".