Follow
Maliheh Shirvanian
Maliheh Shirvanian
Verified email at netflix.com
Title
Cited by
Cited by
Year
All your voices are belong to us: Stealing voices to fool humans and machines
D Mukhopadhyay, M Shirvanian, N Saxena
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
1212015
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
M Shirvanian, S Jarecki, N Saxena, N Nathan
NDSS, 2014
742014
Wiretapping via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones
M Shirvanian, N Saxena
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
692014
The sounds of the phones: Dangers of zero-effort second factor login based on ambient audio
B Shrestha, M Shirvanian, P Shrestha, N Saxena
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
592016
Device-enhanced password protocols with optimal online-offline protection
S Jarecki, H Krawczyk, M Shirvanian, N Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
522016
Two-factor authentication with end-to-end password security
S Jarecki, H Krawczyk, M Shirvanian, N Saxena
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
442018
Sphinx: A password store that perfectly hides passwords from itself
M Shirvanian, S Jareckiy, H Krawczykz, N Saxena
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
352017
On the security and usability of crypto phones
M Shirvanian, N Saxena
Proceedings of the 31st Annual Computer Security Applications Conference, 21-30, 2015
242015
Echovib: Exploring voice authentication via unique non-linear vibrations of short replayed speech
SA Anand, J Liu, C Wang, M Shirvanian, N Saxena, Y Chen
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
212021
On the pitfalls of end-to-end encrypted communications: A study of remote key-fingerprint verification
M Shirvanian, N Saxena, JJ George
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
202017
Two-factor password-authenticated key exchange with end-to-end security
S Jarecki, M Jubur, H Krawczyk, N Saxena, M Shirvanian
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-37, 2021
192021
Building and studying a password store that perfectly hides passwords from itself
M Shirvanian, N Saxena, S Jarecki, H Krawczyk
IEEE Transactions on Dependable and Secure Computing 16 (5), 770-782, 2019
182019
Quantifying the breakability of voice assistants
M Shirvanian, S Vo, N Saxena
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
122019
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines
M Shirvanian, N Saxena, D Mukhopadhyay
Journal of computer security 26 (3), 311-333, 2018
112018
Avoiding lock outs: Proactive fido account recovery using managerless group signatures
SS Arora, S Badrinarayanan, S Raghuraman, M Shirvanian, K Wagner, ...
Cryptology ePrint Archive, 2022
102022
2D-2FA: A new dimension in two-factor authentication
M Shirvanian, S Agrawal
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
102021
A hidden-password online password manager
M Shirvanian, CR Price, M Jubur, N Saxena, S Jarecki, H Krawczyk
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1683-1686, 2021
92021
Cccp: closed caption crypto phones to resist mitm attacks, human errors and click-through
M Shirvanian, N Saxena
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
92017
Voicefox: Leveraging inbuilt transcription to enhance the security of machine-human speaker verification against voice synthesis attacks
M Shirvanian, M Mohammed, N Saxena, SA Anand
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
82020
Adaptive SVD-based digital image watermarking
M Shirvanian, F Torkamani Azar
International Workshop on Digital Watermarking, 113-123, 2008
52008
The system can't perform the operation now. Try again later.
Articles 1–20