The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio B Shrestha, M Shirvanian, P Shrestha, N Saxena ACM SIGSAC Conference on Computer and Communications Security, 908-919, 2016 | 56 | 2016 |
A flow-based approach for Trickbot banking trojan detection A Gezer, G Warner, C Wilson, P Shrestha Computers & Security 84, 179-192, 2019 | 55 | 2019 |
An offensive and defensive exposition of wearable computing P Shrestha, N Saxena ACM Computing Surveys (CSUR) 50 (6), 1-39, 2017 | 46 | 2017 |
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks O Huhta, P Shrestha, S Udar, M Juuti, N Saxena, N Asokan The Network and Distributed System Security Symposium 2016, 2016 | 44 | 2016 |
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise P Shrestha, M Mohamed, N Saxena ACM Conference on Security & Privacy in Wireless and Mobile Networks, 67-77, 2016 | 32 | 2016 |
Listening watch: Wearable two-factor authentication using speech signals resilient to near-far attacks P Shrestha, N Saxena Proceedings of the 11th ACM conference on security & privacy in wireless and …, 2018 | 30 | 2018 |
Predicting misinformation and engagement in covid-19 twitter discourse in the first months of the outbreak M Silva, F Ceschin, P Shrestha, C Brant, J Fernandes, CS Silva, A Grégio, ... arXiv preprint arXiv:2012.02164, 2020 | 20 | 2020 |
Bypassing push-based second factor and passwordless authentication with human-indistinguishable notifications M Jubur, P Shrestha, N Saxena, J Prakash Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 18 | 2021 |
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals SA Anand, P Shrestha, N Saxena Cryptology and Network Security (CANS), 95-110, 2015 | 12 | 2015 |
Challenges and opportunities for practical and effective dynamic information flow tracking C Brant, P Shrestha, B Mixon-Baca, K Chen, S Varlioglu, N Elsayed, Y Jin, ... ACM Computing Surveys (CSUR) 55 (1), 1-33, 2021 | 10 | 2021 |
Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables P Shrestha, N Saxena Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 10 | 2020 |
Gummy browsers: targeted browser spoofing against state-of-the-art fingerprinting techniques Z Liu, P Shrestha, N Saxena International Conference on Applied Cryptography and Network Security, 147-169, 2022 | 9 | 2022 |
Catcha: When cats track your movements online P Shrestha, N Saxena, A Neupane, K Satvat Information Security Practice and Experience: 15th International Conference …, 2019 | 4 | 2019 |
Home alone: The insider threat of unattended wearables and a defense using audio proximity P Shrestha, B Shrestha, N Saxena 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 4 | 2018 |
Challenge-response behavioral mobile authentication: A comparative study of graphical patterns and cognitive games M Mohamed, P Shrestha, N Saxena Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 3 | 2019 |
Yelp: masking sound-based opportunistic attacks in zero-effort deauthentication P Shrestha, SA Anand, N Saxena Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 3 | 2017 |
Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication O Huhta, P Shrestha, S Udar, N Saxena, N Asokan arXiv preprint arXiv:1505.05779, 2015 | 1 | 2015 |
IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables P Shrestha, Z Liu, N Saxena Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | | 2020 |
People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation--A Comparison Between COVID and General Narratives on Twitter M Silva, F Ceschin, P Shrestha, C Brant, S Gilda, J Fernandes, CS Silva, ... arXiv preprint arXiv:2012.02164, 2020 | | 2020 |
New Authentication And Privacy Paradigms In Mobile And Wearable Computing P Shrestha The University of Alabama at Birmingham, 2019 | | 2019 |