Follow
Prakash Shrestha
Title
Cited by
Cited by
Year
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio
B Shrestha, M Shirvanian, P Shrestha, N Saxena
ACM SIGSAC Conference on Computer and Communications Security, 908-919, 2016
542016
A flow-based approach for Trickbot banking trojan detection
A Gezer, G Warner, C Wilson, P Shrestha
Computers & Security 84, 179-192, 2019
522019
An offensive and defensive exposition of wearable computing
P Shrestha, N Saxena
ACM Computing Surveys (CSUR) 50 (6), 1-39, 2017
462017
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks
O Huhta, P Shrestha, S Udar, M Juuti, N Saxena, N Asokan
The Network and Distributed System Security Symposium 2016, 2016
442016
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise
P Shrestha, M Mohamed, N Saxena
ACM Conference on Security & Privacy in Wireless and Mobile Networks, 67-77, 2016
322016
Listening watch: Wearable two-factor authentication using speech signals resilient to near-far attacks
P Shrestha, N Saxena
Proceedings of the 11th ACM conference on security & privacy in wireless and …, 2018
292018
Predicting misinformation and engagement in covid-19 twitter discourse in the first months of the outbreak
M Silva, F Ceschin, P Shrestha, C Brant, J Fernandes, CS Silva, A Grégio, ...
arXiv preprint arXiv:2012.02164, 2020
192020
Bypassing push-based second factor and passwordless authentication with human-indistinguishable notifications
M Jubur, P Shrestha, N Saxena, J Prakash
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
162021
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals
SA Anand, P Shrestha, N Saxena
Cryptology and Network Security (CANS), 95-110, 2015
122015
Challenges and opportunities for practical and effective dynamic information flow tracking
C Brant, P Shrestha, B Mixon-Baca, K Chen, S Varlioglu, N Elsayed, Y Jin, ...
ACM Computing Surveys (CSUR) 55 (1), 1-33, 2021
102021
Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables
P Shrestha, N Saxena
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
102020
Gummy browsers: targeted browser spoofing against state-of-the-art fingerprinting techniques
Z Liu, P Shrestha, N Saxena
International Conference on Applied Cryptography and Network Security, 147-169, 2022
92022
Catcha: When cats track your movements online
P Shrestha, N Saxena, A Neupane, K Satvat
Information Security Practice and Experience: 15th International Conference …, 2019
42019
Home alone: The insider threat of unattended wearables and a defense using audio proximity
P Shrestha, B Shrestha, N Saxena
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
42018
Challenge-response behavioral mobile authentication: A comparative study of graphical patterns and cognitive games
M Mohamed, P Shrestha, N Saxena
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
32019
Yelp: masking sound-based opportunistic attacks in zero-effort deauthentication
P Shrestha, SA Anand, N Saxena
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
32017
Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication
O Huhta, P Shrestha, S Udar, N Saxena, N Asokan
arXiv preprint arXiv:1505.05779, 2015
12015
IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables
P Shrestha, Z Liu, N Saxena
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
2020
People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation--A Comparison Between COVID and General Narratives on Twitter
M Silva, F Ceschin, P Shrestha, C Brant, S Gilda, J Fernandes, CS Silva, ...
arXiv preprint arXiv:2012.02164, 2020
2020
New Authentication And Privacy Paradigms In Mobile And Wearable Computing
P Shrestha
The University of Alabama at Birmingham, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20