All your voices are belong to us: Stealing voices to fool humans and machines D Mukhopadhyay, M Shirvanian, N Saxena Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 121 | 2015 |
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices. M Shirvanian, S Jarecki, N Saxena, N Nathan NDSS, 2014 | 74 | 2014 |
Wiretapping via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones M Shirvanian, N Saxena Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 69 | 2014 |
The sounds of the phones: Dangers of zero-effort second factor login based on ambient audio B Shrestha, M Shirvanian, P Shrestha, N Saxena Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 59 | 2016 |
Device-enhanced password protocols with optimal online-offline protection S Jarecki, H Krawczyk, M Shirvanian, N Saxena Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 52 | 2016 |
Two-factor authentication with end-to-end password security S Jarecki, H Krawczyk, M Shirvanian, N Saxena Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 44 | 2018 |
Sphinx: A password store that perfectly hides passwords from itself M Shirvanian, S Jareckiy, H Krawczykz, N Saxena 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 35 | 2017 |
On the security and usability of crypto phones M Shirvanian, N Saxena Proceedings of the 31st Annual Computer Security Applications Conference, 21-30, 2015 | 24 | 2015 |
Echovib: Exploring voice authentication via unique non-linear vibrations of short replayed speech SA Anand, J Liu, C Wang, M Shirvanian, N Saxena, Y Chen Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 21 | 2021 |
On the pitfalls of end-to-end encrypted communications: A study of remote key-fingerprint verification M Shirvanian, N Saxena, JJ George Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 20 | 2017 |
Two-factor password-authenticated key exchange with end-to-end security S Jarecki, M Jubur, H Krawczyk, N Saxena, M Shirvanian ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-37, 2021 | 19 | 2021 |
Building and studying a password store that perfectly hides passwords from itself M Shirvanian, N Saxena, S Jarecki, H Krawczyk IEEE Transactions on Dependable and Secure Computing 16 (5), 770-782, 2019 | 18 | 2019 |
Quantifying the breakability of voice assistants M Shirvanian, S Vo, N Saxena 2019 IEEE International Conference on Pervasive Computing and Communications …, 2019 | 12 | 2019 |
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines M Shirvanian, N Saxena, D Mukhopadhyay Journal of computer security 26 (3), 311-333, 2018 | 11 | 2018 |
Avoiding lock outs: Proactive fido account recovery using managerless group signatures SS Arora, S Badrinarayanan, S Raghuraman, M Shirvanian, K Wagner, ... Cryptology ePrint Archive, 2022 | 10 | 2022 |
2D-2FA: A new dimension in two-factor authentication M Shirvanian, S Agrawal Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 10 | 2021 |
A hidden-password online password manager M Shirvanian, CR Price, M Jubur, N Saxena, S Jarecki, H Krawczyk Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1683-1686, 2021 | 9 | 2021 |
Cccp: closed caption crypto phones to resist mitm attacks, human errors and click-through M Shirvanian, N Saxena Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 9 | 2017 |
Voicefox: Leveraging inbuilt transcription to enhance the security of machine-human speaker verification against voice synthesis attacks M Shirvanian, M Mohammed, N Saxena, SA Anand Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 8 | 2020 |
Adaptive SVD-based digital image watermarking M Shirvanian, F Torkamani Azar International Workshop on Digital Watermarking, 113-123, 2008 | 5 | 2008 |