Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction.
Proceedings of the 31st USENIX Security Symposium, 2022
Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021
Characterizing the Security of the SMS Ecosystem with Public Gateways.
ACM Trans. Priv. Secur., 2019
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
CoRR, 2019
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
2MA: Verifying Voice Commands via Two Microphone Authentication.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls.
Proceedings of the 26th USENIX Security Symposium, 2017
Detecting SMS Spam in the Age of Legitimate Bulk Messaging.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels.
Proceedings of the 25th USENIX Security Symposium, 2016
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways.
Proceedings of the IEEE Symposium on Security and Privacy, 2016