Accessibility and Inclusiveness of New Information and Communication Technologies for Disabled Users and Content Creators in the Metaverse.
CoRR, 2023
Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021
MoveAR: Continuous Biometric Authentication for Augmented Reality Headsets.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients.
CoRR, 2020
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication.
ACM Trans. Priv. Secur., 2019
Security of mixed reality systems: authenticating users, devices, and data.
PhD thesis, 2018
Using EEG-Based BCI Devices to Subliminally Probe for Private Information.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition.
CoRR, 2016
Generating Secret Keys from Biometric Body Impedance Measurements.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Using Reflexive Eye Movements for Fast Challenge-Response Authentication.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
User authentication based on keystroke dynamics analysis.
Proceedings of the 2012 Proceedings of the 35th International Convention, 2012