Author of the publication

Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications.

, , , and . AsiaCCS, page 447-461. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity., , and . CNS, page 1-9. IEEE, (2018)Predicting Misinformation and Engagement in COVID-19 Twitter Discourse in the First Months of the Outbreak., , , , , , , , and . CoRR, (2020)IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables., , and . ACSAC, page 706-716. ACM, (2020)Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 147-169. Springer, (2022)Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications., , , and . AsiaCCS, page 447-461. ACM, (2021)Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks., , , , , and . NDSS, The Internet Society, (2016)Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables., and . WISEC, page 13-24. ACM, (2020)Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise., , and . WISEC, page 67-77. ACM, (2016)People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation., , , , , , , , , and . SocialSec, volume 14097 of Lecture Notes in Computer Science, page 3-22. Springer, (2023)Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks., and . WISEC, page 99-110. ACM, (2018)