Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets | 0 | 0.34 | 2022 |
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques | 0 | 0.34 | 2022 |
Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices | 0 | 0.34 | 2022 |
Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds | 0 | 0.34 | 2022 |
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication | 0 | 0.34 | 2022 |
SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors | 0 | 0.34 | 2021 |
A hidden-password online password manager | 0 | 0.34 | 2021 |
Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors | 0 | 0.34 | 2021 |
Press ${@}{\$}{@}{\$}$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures | 0 | 0.34 | 2021 |
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech | 2 | 0.38 | 2021 |
Countering Concurrent Login Attacks in “Just Tap” Push-based Authentication: A Redesign and Usability Evaluations | 0 | 0.34 | 2021 |
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications | 1 | 0.37 | 2021 |
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers | 1 | 0.35 | 2021 |
WearID - Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training. | 2 | 0.37 | 2020 |
Voicefox - Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks. | 0 | 0.34 | 2020 |
IvoriWatch - Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables. | 0 | 0.34 | 2020 |
CREPE: A Privacy-Enhanced Crash Reporting System | 0 | 0.34 | 2020 |
Building and Studying a Password Store that Perfectly Hides Passwords from Itself | 0 | 0.34 | 2019 |
Noisy Vibrational Pairing of IoT Devices | 0 | 0.34 | 2019 |
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games | 0 | 0.34 | 2019 |
Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations | 0 | 0.34 | 2019 |
Compromising Speech Privacy under Continuous Masking in Personal Spaces | 0 | 0.34 | 2019 |
ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics | 0 | 0.34 | 2019 |
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures | 1 | 0.48 | 2019 |
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations | 2 | 0.37 | 2019 |
Sensor-Based Proximity Detection in the Face of Active Adversaries | 0 | 0.34 | 2019 |
The Crux of Voice (In)Security - A Brain Study of Speaker Legitimacy Detection. | 0 | 0.34 | 2019 |
Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks. | 1 | 0.36 | 2018 |
Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports. | 0 | 0.34 | 2018 |
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines. | 0 | 0.34 | 2018 |
Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors | 6 | 0.46 | 2018 |
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration. | 7 | 0.42 | 2017 |
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through. | 1 | 0.36 | 2017 |
Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study. | 2 | 0.38 | 2017 |
On the security and usability of dynamic cognitive game CAPTCHAs. | 2 | 0.40 | 2017 |
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. | 1 | 0.36 | 2017 |
PEEP: Passively Eavesdropping Private Input via Brainwave Signals. | 1 | 0.34 | 2017 |
Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping | 1 | 0.36 | 2017 |
YELP: masking sound-based opportunistic attacks in zero-effort deauthentication. | 0 | 0.34 | 2017 |
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. | 3 | 0.40 | 2017 |
Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings. | 2 | 0.36 | 2016 |
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio. | 5 | 0.44 | 2016 |
SMASheD: Sniffing and Manipulating Android Sensor Data. | 3 | 0.38 | 2016 |
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics. | 2 | 0.36 | 2016 |
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games. | 0 | 0.34 | 2016 |
Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics. | 2 | 0.38 | 2016 |
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks | 10 | 0.48 | 2016 |
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise. | 5 | 0.45 | 2016 |
Task-dependent Changes in Frontal-Parietal Activation and Connectivity during Visual Search. | 0 | 0.34 | 2016 |
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings | 8 | 0.50 | 2015 |