Prakash Shrestha

Orcid: 0000-0002-7779-6399

According to our database1, Prakash Shrestha authored at least 24 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Sound-based Two-factor Authentication: Vulnerabilities and Redesign.
ACM Trans. Priv. Secur., 2024

2023
Chirp-Loc: Multi-factor authentication via acoustically-generated location signatures.
Pervasive Mob. Comput., January, 2023

Knowledge management initiatives for achieving sustainable development goal 4.7: higher education institutions' stakeholder perspectives.
J. Knowl. Manag., 2023

Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking.
ACM Comput. Surv., 2023

People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

2022
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication.
Proceedings of the Applied Cryptography and Network Security, 2022

Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Predicting Misinformation and Engagement in COVID-19 Twitter Discourse in the First Months of the Outbreak.
CoRR, 2020

Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A flow-based approach for Trickbot banking trojan detection.
Comput. Secur., 2019

CATCHA: When Cats Track Your Movements Online.
Proceedings of the Information Security Practice and Experience, 2019

Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
An Offensive and Defensive Exposition of Wearable Computing.
ACM Comput. Surv., 2018

Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
YELP: masking sound-based opportunistic attacks in zero-effort deauthentication.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

2016
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication.
CoRR, 2015

Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015


  Loading...