Author of the publication

A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds.

, and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 346-364. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals., , and . CANS, volume 9476 of Lecture Notes in Computer Science, page 95-110. Springer, (2015)Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks., , , and . ACSAC, page 870-883. ACM, (2020)Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses., and . CODASPY, page 103-110. ACM, (2018)A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds., and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 346-364. Springer, (2016)Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations., , , , , and . ACSAC, page 42-56. ACM, (2019)Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers., , , , and . WISEC, page 288-299. ACM, (2021)Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise., and . WISEC, page 103-108. ACM, (2016)YELP: masking sound-based opportunistic attacks in zero-effort deauthentication., , and . WISEC, page 195-206. ACM, (2017)Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping., and . WISEC, page 173-183. ACM, (2017)Noisy Vibrational Pairing of IoT Devices., and . IEEE Trans. Dependable Secur. Comput., 16 (3): 530-545 (2019)