Follow
Maliheh Shirvanian
Maliheh Shirvanian
Verified email at netflix.com
Title
Cited by
Cited by
Year
All your voices are belong to us: Stealing voices to fool humans and machines
D Mukhopadhyay, M Shirvanian, N Saxena
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
1112015
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
M Shirvanian, S Jarecki, N Saxena, N Nathan
NDSS, 2014
662014
Wiretapping via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones
M Shirvanian, N Saxena
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
642014
The sounds of the phones: Dangers of zero-effort second factor login based on ambient audio
B Shrestha, M Shirvanian, P Shrestha, N Saxena
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
542016
Device-enhanced password protocols with optimal online-offline protection
S Jarecki, H Krawczyk, M Shirvanian, N Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
462016
Two-factor authentication with end-to-end password security
S Jarecki, H Krawczyk, M Shirvanian, N Saxena
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
422018
Sphinx: A password store that perfectly hides passwords from itself
M Shirvanian, S Jareckiy, H Krawczykz, N Saxena
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
332017
On the security and usability of crypto phones
M Shirvanian, N Saxena
Proceedings of the 31st Annual Computer Security Applications Conference, 21-30, 2015
222015
Echovib: Exploring voice authentication via unique non-linear vibrations of short replayed speech
SA Anand, J Liu, C Wang, M Shirvanian, N Saxena, Y Chen
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
162021
Building and studying a password store that perfectly hides passwords from itself
M Shirvanian, N Saxena, S Jarecki, H Krawczyk
IEEE Transactions on Dependable and Secure Computing 16 (5), 770-782, 2019
162019
On the pitfalls of end-to-end encrypted communications: A study of remote key-fingerprint verification
M Shirvanian, N Saxena, JJ George
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
152017
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines
M Shirvanian, N Saxena, D Mukhopadhyay
Journal of computer security 26 (3), 311-333, 2018
122018
Quantifying the breakability of voice assistants
M Shirvanian, S Vo, N Saxena
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
112019
Two-factor password-authenticated key exchange with end-to-end security
S Jarecki, M Jubur, H Krawczyk, N Saxena, M Shirvanian
ACM Transactions on Privacy and Security (TOPS) 24 (3), 1-37, 2021
102021
Cccp: closed caption crypto phones to resist mitm attacks, human errors and click-through
M Shirvanian, N Saxena
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
82017
Avoiding lock outs: Proactive fido account recovery using managerless group signatures
SS Arora, S Badrinarayanan, S Raghuraman, M Shirvanian, K Wagner, ...
Cryptology ePrint Archive, 2022
72022
2D-2FA: a new dimension in two-factor authentication
M Shirvanian, S Agrawal
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
72021
Voicefox: Leveraging inbuilt transcription to enhance the security of machine-human speaker verification against voice synthesis attacks
M Shirvanian, M Mohammed, N Saxena, SA Anand
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
72020
A hidden-password online password manager
M Shirvanian, CR Price, M Jubur, N Saxena, S Jarecki, H Krawczyk
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1683-1686, 2021
52021
Adaptive SVD-based digital image watermarking
M Shirvanian, F Torkamani Azar
International Workshop on Digital Watermarking, 113-123, 2008
52008
The system can't perform the operation now. Try again later.
Articles 1–20