Manar Mohamed

Orcid: 0000-0001-5342-0744

According to our database1, Manar Mohamed authored at least 16 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2019

ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2017
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes.
IEEE Trans. Inf. Forensics Secur., 2017

On the security and usability of dynamic cognitive game CAPTCHAs.
J. Comput. Secur., 2017

2016
Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics.
CoRR, 2016

Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

SMASheD: Sniffing and Manipulating Android Sensor Data.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Gametrics: towards attack-resilient behavioral authentication with simple cognitive games.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Curbing mobile malware based on user-transparent hand movements.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Gaming the game: Defeating a game captcha with efficient and robust hybrid attacks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.
CoRR, 2013


  Loading...