


Остановите войну!
for scientists:


default search action
Nitesh Saxena
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j31]Prakash Shrestha
, Hien Thi Thu Truong, Pupu Toivonen, Nitesh Saxena, Sasu Tarkoma, Petteri Nurmi:
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures. Pervasive Mob. Comput. 88: 101720 (2023) - [i28]Payton Walker, Tianfang Zhang, Cong Shi, Nitesh Saxena, Yingying Chen:
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. CoRR abs/2302.02042 (2023) - 2022
- [j30]Xin Yang
, Song Yang
, Jian Liu
, Chen Wang
, Yingying Chen
, Nitesh Saxena:
Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices. IEEE Trans. Mob. Comput. 21(10): 3565-3580 (2022) - [c120]Prakash Shrestha, Nitesh Saxena:
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication. ACNS 2022: 85-104 - [c119]Zengrui Liu, Prakash Shrestha, Nitesh Saxena:
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques. ACNS 2022: 147-169 - [c118]Payton Walker, Shalini Saini, S. Abhishek Anand, Tzipora Halevi, Nitesh Saxena:
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations. AsiaCCS 2022: 67-81 - [c117]Payton Walker, Nitesh Saxena:
Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space. EuroS&P 2022: 537-554 - [c116]Cong Shi, Tianming Zhao, Wenjin Zhang, Ahmed Tanvir Mahdad, Zhengkun Ye, Yan Wang, Nitesh Saxena, Yingying Chen:
Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds. ICDCS 2022: 680-690 - [c115]Tianfang Zhang, Cong Shi, Tianming Zhao, Zhengkun Ye, Payton Walker, Nitesh Saxena, Yan Wang, Yingying Chen:
Personalized health monitoring via vital sign measurements leveraging motion sensors on AR/VR headsets. MobiSys 2022: 529-530 - [c114]Tianming Zhao, Zhengkun Ye, Tianfang Zhang, Cong Shi, Ahmed Tanvir Mahdad, Yan Wang, Yingying Chen, Nitesh Saxena:
Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets. MobiSys 2022: 589-590 - [c113]Cagri Arisoy, Anuradha Mandal, Nitesh Saxena:
Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility. PST 2022: 1-12 - [c112]Shalini Saini, Dhiral Panjwani, Nitesh Saxena:
Mobile Mental Health Apps: Alternative Intervention or Intrusion? PST 2022: 1-11 - [c111]Payton Walker, Nathan McClaran, Zihao Zheng, Nitesh Saxena, Guofei Gu:
BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition. WISEC 2022: 119-124 - [c110]Anuradha Mandal, Nitesh Saxena:
SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices. WISEC 2022: 175-187 - [i27]Zengrui Liu, Umar Iqbal, Nitesh Saxena:
Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy? CoRR abs/2202.00885 (2022) - [i26]Shalini Saini, Nitesh Saxena:
Predatory Medicine: Exploring and Measuring the Vulnerability of Medical AI to Predatory Science. CoRR abs/2203.06245 (2022) - [i25]Shalini Saini, Dhiral Panjwani, Nitesh Saxena:
Mobile Mental Health Apps: Alternative Intervention or Intrusion? CoRR abs/2206.10728 (2022) - [i24]Cagri Arisoy, Anuradha Mandal, Nitesh Saxena:
Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility. CoRR abs/2207.08376 (2022) - [i23]Ahmed Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, Nitesh Saxena:
EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers. CoRR abs/2212.12151 (2022) - 2021
- [j29]Cong Shi
, Yan Wang
, Yingying (Jennifer) Chen
, Nitesh Saxena:
Authentication of Voice Commands by Leveraging Vibrations in Wearables. IEEE Secur. Priv. 19(6): 83-92 (2021) - [j28]Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian:
Two-factor Password-authenticated Key Exchange with End-to-end Security. ACM Trans. Priv. Secur. 24(3): 17:1-17:37 (2021) - [c109]Payton Walker
, Nitesh Saxena:
Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise. ACSAC 2021: 414-424 - [c108]S. Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen:
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech. AsiaCCS 2021: 67-81 - [c107]Yi Wu, Xiangyu Xu, Payton R. Walker
, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu:
HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks. AsiaCCS 2021: 82-94 - [c106]Mohammed Jubur, Prakash Shrestha, Nitesh Saxena, Jay Prakash:
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications. AsiaCCS 2021: 447-461 - [c105]Jay Prakash, Clarice Chua Qing Yu, Tanvi Ravindra Thombre, Andrei Bytes, Mohammed Jubur, Nitesh Saxena, Lucienne Blessing
, Jianying Zhou, Tony Q. S. Quek:
Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations. EuroS&P 2021: 21-36 - [c104]Prakash Shrestha, Nitesh Saxena, Diksha Shukla, Vir V. Phoha
:
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures. EuroS&P 2021: 71-87 - [c103]Ahmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena:
Analyzing the Security of OTP 2FA in the Face of Malicious Terminals. ICICS (1) 2021: 97-115 - [c102]Cong Shi, Xiangyu Xu, Tianfang Zhang, Payton Walker
, Yi Wu, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu:
Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors. MobiCom 2021: 478-490 - [c101]Maliheh Shirvanian, Christopher Robert Price
, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
A hidden-password online password manager. SAC 2021: 1683-1686 - [c100]Payton Walker
, Nitesh Saxena:
SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors. WISEC 2021: 273-287 - [c99]S. Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen:
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers. WISEC 2021: 288-299 - [i22]Kiavash Satvat, Maliheh Shirvanian, Nitesh Saxena:
PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency. CoRR abs/2102.13607 (2021) - [i21]Zengrui Liu, Prakash Shrestha, Nitesh Saxena:
Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques. CoRR abs/2110.10129 (2021) - 2020
- [c98]Prakash Shrestha, Zengrui Liu, Nitesh Saxena:
IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables. ACSAC 2020: 706-716 - [c97]Cong Shi, Yan Wang
, Yingying Chen, Nitesh Saxena, Chen Wang:
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training. ACSAC 2020: 829-842 - [c96]Maliheh Shirvanian, Manar Mohamed, Nitesh Saxena, S. Abhishek Anand:
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks. ACSAC 2020: 870-883 - [c95]Kiavash Satvat, Maliheh Shirvanian, Mahshid Hosseini, Nitesh Saxena:
CREPE: A Privacy-Enhanced Crash Reporting System. CODASPY 2020: 295-306 - [c94]Prakash Shrestha, Nitesh Saxena:
Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables. WISEC 2020: 13-24 - [e3]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 335, Springer 2020, ISBN 978-3-030-63085-0 [contents] - [e2]Noseong Park, Kun Sun, Sara Foresti, Kevin R. B. Butler, Nitesh Saxena:
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 336, Springer 2020, ISBN 978-3-030-63094-2 [contents] - [i20]Chen Wang, Cong Shi, Yingying Chen, Yan Wang, Nitesh Saxena:
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity. CoRR abs/2003.09083 (2020)
2010 – 2019
- 2019
- [j27]S. Abhishek Anand
, Nitesh Saxena:
Noisy Vibrational Pairing of IoT Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 530-545 (2019) - [j26]Maliheh Shirvanian
, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. IEEE Trans. Dependable Secur. Comput. 16(5): 770-782 (2019) - [j25]Song Gao, Manar Mohamed
, Nitesh Saxena, Chengcui Zhang:
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures. IEEE Trans. Dependable Secur. Comput. 16(6): 1040-1053 (2019) - [j24]Babins Shrestha
, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan
:
Sensor-Based Proximity Detection in the Face of Active Adversaries. IEEE Trans. Mob. Comput. 18(2): 444-457 (2019) - [c93]Chen Wang, S. Abhishek Anand, Jian Liu, Payton Walker
, Yingying Chen, Nitesh Saxena:
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations. ACSAC 2019: 42-56 - [c92]Manar Mohamed, Prakash Shrestha, Nitesh Saxena:
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games. ACSAC 2019: 355-365 - [c91]Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat:
CATCHA: When Cats Track Your Movements Online. ISPEC 2019: 172-193 - [c90]Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield, Sarah E. Bratt:
The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection. NDSS 2019 - [c89]Maliheh Shirvanian, Summer Vo, Nitesh Saxena:
Quantifying the Breakability of Voice Assistants. PerCom 2019: 1-11 - [c88]S. Abhishek Anand, Payton Walker
, Nitesh Saxena:
Compromising Speech Privacy under Continuous Masking in Personal Spaces. PST 2019: 1-10 - [c87]Ajaya Neupane, Kiavash Satvat, Mahshid Hosseini, Nitesh Saxena:
Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information. PST 2019: 1-10 - [c86]Maliheh Shirvanian, Nitesh Saxena:
Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations. PST 2019: 1-10 - [c85]Babins Shrestha, Manar Mohamed, Nitesh Saxena:
ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics. PST 2019: 1-10 - [i19]S. Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen:
Spearphone: A Speech Privacy Exploit via Accelerometer-Sensed Reverberations from Smartphone Loudspeakers. CoRR abs/1907.05972 (2019) - 2018
- [j23]Prakash Shrestha
, Nitesh Saxena:
An Offensive and Defensive Exposition of Wearable Computing. ACM Comput. Surv. 50(6): 92:1-92:39 (2018) - [j22]Maliheh Shirvanian, Nitesh Saxena, Dibya Mukhopadhyay:
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines. J. Comput. Secur. 26(3): 311-333 (2018) - [c84]Ajaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, Haley Johnson Bishop:
Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks. ACSAC 2018: 467-477 - [c83]Prakash Shrestha, Babins Shrestha, Nitesh Saxena:
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity. CNS 2018: 1-9 - [c82]S. Abhishek Anand, Nitesh Saxena:
Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses. CODASPY 2018: 103-110 - [c81]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. Public Key Cryptography (2) 2018: 431-461 - [c80]S. Abhishek Anand, Nitesh Saxena:
Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. IEEE Symposium on Security and Privacy 2018: 1000-1017 - [c79]Prakash Shrestha, Nitesh Saxena:
Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks. WISEC 2018: 99-110 - [i18]Kiavash Satvat, Nitesh Saxena:
Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports. CoRR abs/1808.01718 (2018) - [i17]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. IACR Cryptol. ePrint Arch. 2018: 33 (2018) - [i16]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. IACR Cryptol. ePrint Arch. 2018: 695 (2018) - 2017
- [j21]Manar Mohamed, Song Gao, Niharika Sachdeva, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot
:
On the security and usability of dynamic cognitive game CAPTCHAs. J. Comput. Secur. 25(3): 205-230 (2017) - [j20]Manar Mohamed
, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. IEEE Trans. Inf. Forensics Secur. 12(4): 901-913 (2017) - [c78]Maliheh Shirvanian, Nitesh Saxena, Jesvin James George:
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. ACSAC 2017: 499-511 - [c77]Jian Liu, Chen Wang, Yingying Chen
, Nitesh Saxena:
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration. CCS 2017: 73-87 - [c76]Maliheh Shirvanian, Nitesh Saxena:
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through. CCS 2017: 1329-1342 - [c75]Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena:
PEEP: Passively Eavesdropping Private Input via Brainwave Signals. Financial Cryptography 2017: 227-246 - [c74]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. ICDCS 2017: 1094-1104 - [c73]S. Abhishek Anand, Nitesh Saxena:
Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping. WISEC 2017: 173-183 - [c72]Prakash Shrestha, S. Abhishek Anand, Nitesh Saxena:
YELP: masking sound-based opportunistic attacks in zero-effort deauthentication. WISEC 2017: 195-206 - [c71]Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield
:
Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study. WWW 2017: 1571-1580 - [i15]Maliheh Shirvanian, Nitesh Saxena, Jesvin James George:
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. CoRR abs/1707.05285 (2017) - 2016
- [j19]Jose Omar Maximo, Ajaya Neupane, Nitesh Saxena, Robert M. Joseph
, Rajesh K. Kana:
Task-Dependent Changes in Frontal-Parietal Activation and Connectivity During Visual Search. Brain Connect. 6(4): 335-344 (2016) - [j18]Ajaya Neupane
, Nitesh Saxena, Jose Omar Maximo, Rajesh K. Kana:
Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings. IEEE Trans. Inf. Forensics Secur. 11(9): 1970-1983 (2016) - [c70]Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena:
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics. ACSAC 2016: 265-276 - [c69]Manar Mohamed, Nitesh Saxena:
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games. ACSAC 2016: 277-288 - [c68]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. AsiaCCS 2016: 177-188 - [c67]Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena:
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio. CCS 2016: 908-919 - [c66]Manar Mohamed, Babins Shrestha, Nitesh Saxena:
SMASheD: Sniffing and Manipulating Android Sensor Data. CODASPY 2016: 152-159 - [c65]S. Abhishek Anand, Nitesh Saxena:
A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds. Financial Cryptography 2016: 346-364 - [c64]Otto Huhta, Swapnil Udar, Mika Juuti, Prakash Shrestha, Nitesh Saxena, N. Asokan:
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. NDSS 2016 - [c63]Prakash Shrestha, Manar Mohamed, Nitesh Saxena:
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise. WISEC 2016: 67-77 - [c62]S. Abhishek Anand, Nitesh Saxena:
Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise. WISEC 2016: 103-108 - [i14]Babins Shrestha, Manar Mohamed, Nitesh Saxena:
Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics. CoRR abs/1605.00766 (2016) - 2015
- [j17]Tzipora Halevi, Nitesh Saxena:
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios. Int. J. Inf. Sec. 14(5): 443-456 (2015) - [j16]Babins Shrestha, Di Ma
, Yan Zhu
, Haoyu Li, Nitesh Saxena:
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. IEEE Trans. Inf. Forensics Secur. 10(11): 2270-2283 (2015) - [c61]Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang:
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks. ACSAC 2015: 11-20 - [c60]Maliheh Shirvanian, Nitesh Saxena:
On the Security and Usability of Crypto Phones. ACSAC 2015: 21-30 - [c59]S. Abhishek Anand, Prakash Shrestha, Nitesh Saxena:
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals. CANS 2015: 95-110 - [c58]Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne M. Hirshfield
:
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings. CCS 2015: 479-491 - [c57]Dibya Mukhopadhyay, Maliheh Shirvanian, Nitesh Saxena:
All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines. ESORICS (2) 2015: 599-621 - [c56]Babins Shrestha, Manar Mohamed, Anders Borg, Nitesh Saxena, Sandeep Tamrakar:
Curbing mobile malware based on user-transparent hand movements. PerCom 2015: 221-229 - [i13]Otto Huhta, Prakash Shrestha, Swapnil Udar, Nitesh Saxena, N. Asokan:
Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication. CoRR abs/1505.05779 (2015) - [i12]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Contextual Proximity Detection in the Face of Context-Manipulating Adversaries. CoRR abs/1511.00905 (2015) - [i11]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. IACR Cryptol. ePrint Arch. 2015: 1099 (2015) - 2014
- [j15]Sai Teja Peddinti, Nitesh Saxena:
Web search query privacy: Evaluating query obfuscation and anonymizing networks. J. Comput. Secur. 22(1): 155-199 (2014) - [j14]Di Ma
, Nitesh Saxena:
A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems. Secur. Commun. Networks 7(12): 2684-2695 (2014) - [c55]Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot
, Wei-bang Chen:
A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability. AsiaCCS 2014: 195-206 - [c54]Maliheh Shirvanian, Nitesh Saxena:
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones. CCS 2014: 868-879 - [c53]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan
:
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing. Financial Cryptography 2014: 349-364 - [c52]Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang:
Gaming the game: Defeating a game captcha with efficient and robust hybrid attacks. ICME 2014: 1-6 - [c51]Ajaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu, Rajesh K. Kana:
Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings. NDSS 2014 - [c50]Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena, Naveen Nathan:
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices. NDSS 2014 - [c49]Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan
, Petteri Nurmi
:
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication. PerCom 2014: 163-171 - [e1]Nitesh Saxena, Ahmad-Reza Sadeghi:
Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8651, Springer 2014, ISBN 978-3-319-13065-1 [contents] - 2013
- [j13]Di Ma
, Nitesh Saxena, Tuo Xiang, Yan Zhu
:
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing. IEEE Trans. Dependable Secur. Comput. 10(2): 57-69 (2013) - [j12]Tzipora Halevi, Haoyu Li, Di Ma
, Nitesh Saxena, Jonathan Voris, Tuo Xiang:
Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks. IEEE Trans. Emerg. Top. Comput. 1(2): 307-318 (2013) - [j11]Tzipora Halevi, Nitesh Saxena:
Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing. IEEE Trans. Inf. Forensics Secur. 8(3): 563-577 (2013) - [c48]