Follow
Tavish Vaidya
Tavish Vaidya
Verified email at google.com
Title
Cited by
Cited by
Year
Hidden Voice Commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th USENIX Security Symposium (USENIX Security 16), Austin, TX, 2016
7412016
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition
T Vaidya, M Zhang, Yuankai, Sherr, C Shields
9th USENIX Workshop on Offensive Technologies (WOOT'15), 2015
2442015
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
R Jansen, T Vaidya, M Sherr
28th USENIX Security Symposium (USENIX Security '19), Santa Clara, CA, 2019
502019
Does Being Verified Make You More Credible? Account Verification’s Effect on Tweet Credibility
T Vaidya, D Votipka, ML Mazurek, M Sherr
ACM Conference on Human Factors in Computing Systems (CHI), 2019
392019
You Talk Too Much: Limiting Privacy Exposure via Voice Input
T Vaidya, M Sherr
2019 International Workshop on Privacy Engineering - IWPE'19, 2019
252019
Dispersing Asymmetric DDoS Attacks with SplitStack
A Chen, A Sriraman, T Vaidya, Y Zhang, A Haeberlen, BT Loo, LTX Phan, ...
Proceedings of the 15th ACM Workshop on Hot Topics in Networks (HotNets'16), 2016
232016
2001-2013: Survey and Analysis of Major Cyberattacks
T Vaidya
arXiv preprint arXiv:1507.06673, 2015
222015
An Extensive Evaluation of the Internet's Open Proxies
A Mani*, T Vaidya*, D Dworken, M Sherr
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
212018
DeDoS: Defusing DoS with Dispersion Oriented Software
HM Demoulin*, T Vaidya*, I Pedisich, B DiMaiolo, J Qian, C Shah, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
132018
Ephemeral exit bridges for tor
Z Zhang, T Vaidya, K Subramanian, W Zhou, M Sherr
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
62020
Mind Your s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)
T Vaidya, M Sherr
Cambridge International Workshop on Security Protocols, 91-104, 2015
62015
Whisper: A unilateral defense against voip traffic re-identification attacks
T Vaidya, T Walsh, M Sherr
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
52019
A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers
HM Demoulin*, T Vaidya*, I Pedisich, N Sultana, B Wang, J Qian, Y Zhang, ...
Proceedings of the SIGCOMM Posters and Demos, 71-73, 2017
42017
Where art thou, Eve? Experiences laying traps for Internet eavesdroppers
T Vaidya, E Burger, M Sherr, C Shields
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
42017
Helping users understand their web footprints
L Singh, H Yang, M Sherr, Y Wei, A Hian-Cheong, K Tian, J Zhu, S Zhang, ...
Proceedings of the 24th International Conference on World Wide Web, 117-118, 2015
42015
Hidden voice commands 25th USENIX Security Symposium (USENIX Security 16)
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
Austin, TX, 1-20, 2016
32016
Two Factor Authentication Using Audio Communication Between Machines with and without Human Interaction
T Vaidya, M Sherr
US Patent App. 16/564,386, 2020
22020
Exploiting and Harnessing the Processes and Differences of Speech Understanding in Humans and Machines
T Vaidya
Georgetown University, 2019
2019
Poster: Studying the Pervasiveness of Internet Interception with Honey{POP,SMTP,Telnet}
T Vaidya, E Burger, M Sherr, C Shields
24th USENIX Security Symposium (USENIX Security'15), Washington, D.C., 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–19