• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home Page
  • Research
  • Publications
  • Students
  • Teaching & WFD
  • Media
  • Links
  • News Archive

Nitesh Saxena - Professor, Computer Science; Associate Director, Global Cyber Research Institute; Dean's Research Fellow 2022-23

Texas A&M University College of Engineering

News

Paper accepted to ISPEC 2019

Posted on August 2, 2019 by Zengrui Liu

CATCHA: When Cats  Track Your Movements OnlinePrakash Shrestha, Nitesh Saxena, Ajaya Neupane and Kiavash SatvatInternational Conference on Information Security Practice and Experience (ISPEC), November, 2019

Filed Under: Uncategorized

4 papers accepted to PST 2019

Posted on June 21, 2019 by Zengrui Liu

  • Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations
    • Maliheh Shirvanian, and Nitesh Saxena International Conference on Privacy, Security and Trust (PST), August, 2019 [pdf]
  • ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics
    • Babins Shrestha, Manar Mohamed and Nitesh Saxena International Conference on Privacy, Security and Trust (PST), August, 2019 [pdf]
  • Compromising Speech Privacy under Continuous Masking in Personal Spaces
    • S Abhishek Anand, Payton Walker and Nitesh Saxena International Conference on Privacy, Security and Trust (PST), August, 2019 [pdf]
  • Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information
    • Ajaya Neupane, Kiavash Satvat, Mahshid Hosseini and Nitesh Saxena International Conference on Privacy, Security and Trust (PST), August, 2019 [pdf]

Filed Under: Uncategorized

Publications

Posted on May 18, 2019 by Zengrui Liu

JOURNALS

  • 2018
    • Building and Studying a Password Store that Perfectly Hides Passwords from Itself.
      Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, and Hugo Krawczyk
      In IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Paradigm Shifts in Cryptographic Engineering.
      [pdf]
    • Sensor-based Proximity Detection in the Face of Active Adversaries
      Babins Shrestha, Nitesh Saxena, Hien Truong and N. Asokan.
      In IEEE Transactions on Mobile Computing (TMC),
      [pdf]
    • Noisy Vibrational Pairing of IoT Devices
      Abhishek Anand, and Nitesh Saxena
      In IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Emerging Attacks and Solutions for Secure Hardware in the Internet of Things, 2018.
      [pdf]
    • Good Vibrations: Accessing ‘Smart’ Systems by Touching Any Solid Surface
      Jian Liu, Chen Wang, Yingying Chen, and Nitesh Saxena,
      Biometric Technology Today, Issue 4, Pages 7-10, 2018.
      [pdf]
  • 2017
    • Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures
      Song Gao, Manar Mohamed, Nitesh Saxena, and Chengcui Zhang
      In IEEE Transactions on Dependable and Secure Computing (TDSC), 2017.
      [pdf]
    • An Offensive and Defensive Exposition of Wearable Computing
      Prakash Shrestha and Nitesh Saxena
      In ACM Computing Surveys (CSUR), 2017.
      [pdf]
    • Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones: Defeating Humans and Machines
      Maliheh Shirvanian, Dibya Mukhopadhyay and Nitesh Saxena
      In  Journal of Computer Security (JCS), 2017.
      [pdf]
    • On the Security and Usability of Dynamic Cognitive Game CAPTCHAs.
      Manar Mohamed, Song Gao, Niharika Sachdeva, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru and Paul van Oorschot
      In  Journal of Computer Security (JCS), 2017.
      [pdf]
  • 2016
    • SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes.
      Manar Mohamed, Babins Shrestha and Nitesh Saxena
      In IEEE Transactions on Information Forensics and Security (TIFS), 2016.
      [pdf]
    • Neural Markers of Cybersecurity: An fMRI Study of Phishing, and Malware Warnings
      Ajaya Neupane, Nitesh Saxena, Jose O Maximo, and Rajesh K Kana
      IEEE Transactions on Information Forensics and Security (TIFS), 2016.
      [pdf]
    • Task-dependent Changes in Frontal-Parietal Activation and Connectivity during Visual Search
      Jose O Maximo, Ajaya Neupane, Nitesh Saxena, Robert M Joseph, and Rajesh K Kana
      Brain Connectivity,  2016.
      [pdf]
  • 2015
    • Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware
      Babins Shresth, Di Ma, Yan Zhu, Haoyu Li, and Nitesh Saxena
      IEEE Transactions on Information Forensics and Security (TIFS), to appear, 2015.
      [pdf]
    • Consumer Perceptions of Mobile and Traditional Point-Of-Sale Credit or Debit Card Systems
      Nitesh Saxena, John J. Sloan, Manasvee Godbole, Jun Yu Jacinta Cai, Michael Georgescu, Oliver Nick Harper and David C. Schwebel
      In International Journal of Cyber Criminology, Volume 2, Issue 2, 2015.
      [pdf]
  • 2014
    • Using Contextual Co-Presence to Strengthen Zero-Interaction Authentication: Design, Integration and Usability
      Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan and Petteri Nurmi
      Elsevier Journal of Pervasive and Mobile Computing (PMC), to appear, 2014.
      [pdf]
    • Keyboard Acoustic Side Channel Attacks: Exploring Realistic and Security-Sensitive Scenarios
      Tzipora Halevi and Nitesh SaxenaInternational Journal of Information Security, to appear, 2014.[pdf]
    • Web Search Query Privacy: Evaluating Query Obfuscation and Anonymizing Networks
      Sai Teja Peddinti and Nitesh Saxena
      Journal of Computer Security, Volume 22, Number 1, 2014.
      [pdf]
  • 2013
    • Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks
      Tzipora Halevi, Haoyu Li, Di Ma, Nitesh Saxena, Jonathan Voris, and Tuo Xiang
      IEEE Transactions on Emerging Topics in Computing (TETC), Volume 1, Issue 2, November, 2013.
      [pdf]
    • Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing
      Tzipora Halevi and Nitesh Saxena
      IEEE Transactions on Information Forensics and Security (TIFS), Volume:8, Issue: 3, March, 2013.
      [pdf]
    • Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
      Di Ma, Nitesh Saxena, Tuo Xiang, and Yan Zhu
      IEEE Transactions on Dependable and Secure Computing, Vol 10, Issue 2, March 2013.
      [pdf]
  • 2012
  • Authenticated Key Exchange with Key Re-Use in the Short Authenticated Strings Model
    Stanislaw Jarecki and Nitesh Saxena
    American Mathematical Society, Special Session on Mathematical Aspects of Cryptography and Cyber Security, Volume 582, December 2012.
    [pdf]
  • Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
    Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh Saxena, Dinko Begusic
    IEEE Transactions on Mobile Computing, February, 2011.
    [pdf]
  • 2011
    • A Context-Aware Approach to Defend Against Unauthorized Reading and Relay Attacks in RFID Systems
      Di Ma and Nitesh Saxena
      Wiley International Journal of Security and Communication Networks, Special Issue on “Protecting the Internet of Things”, December, 2011.
      [pdf]
    • Data Remanence Effects on Memory Based Entropy Collection for RFID Systems
      Nitesh Saxena and Jonathan Voris
      International Journal of Information Security, Volume 10, Number 4, July 2011.
      [pdf]
    • Secure Device Pairing based on a Visual Channel: Design and Usability Study
      Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, and N. Asokan
      IEEE Transactions on Information Forensics and Security (TIFS), Volume 6, Issue 1, March 2011.
      [pdf]
  • 2010
    • Tree-based HB Protocols for Privacy-Preserving Authentication of RFID Tags
      Tzipora Halevi, Nitesh Saxena and Shai Halevi
      Journal of Computer Security — Special Issue on RFID System Security, Volume 19, Issue 2, April 2011.
      [pdf]
    • On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
      Stanislaw Jarecki and Nitesh Saxena,
      IEEE Transactions on Information Forensics and Security (TIFS), Volume 5, Issue 4, December 2010
      [pdf]
  • 2009
    • Non-Interactive Self-Certification for Long-Lived Mobile Ad Hoc Networks
      Nitesh Saxena, and Jeong H. Yi,
      IEEE Transactions on Information Forensics and Security (TIFS), Volume 4, Issue 4, December 2009
      [pdf]
    • A Comparative Study of Secure Device Pairing Methods
      Arun Kumar, Nitesh Saxena, Gene Tsudik and Ersin Uzun
      Elsevier Pervasive and Mobile Computing Journal (PMC), Volume 5, Issue 6, December 2009.
      [pdf]
    • Efficient Node Admission and Certificate-less Secure Communication in Short-lived MANETs
      Nitesh Saxena, Gene Tsudik and Jeong H. Yi,
      IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 20, Issue 2, February 2009
      [pdf]
  • 2007
    • Threshold Cryptography in P2P and MANETs: the Case of Access Control
      Nitesh Saxena, Gene Tsudik and Jeong H. Yi,
      Elsevier Computer Networks, Volume 51 , Issue 12, August 2007
      [pdf]
    • Robust Self-Keying Mobile Ad Hoc Networks,
      Claude Castellucia, Nitesh Saxena, and Jeong H. Yi,
      Elsevier Computer Networks, Volume 51, Issue 4, March 2007
      [pdf]

CONFERENCES / WORKSHOPS

  • 2019
    • The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection
      Ajaya Neupane, Nitesh Saxena, Leanne Hirshfield and Sarah Bratt
      In the Network and Distributed System Security Symposium (NDSS), February 2019.
      [pdf]
    • Quantifying the Breakability of Mobile Assistants
      [Runner Up, The Mark Weiser Best Paper Award]
      Maliheh Shirvanian, Summer Vo and Nitesh Saxena
      International Conference on Pervasive Computing and Communications (PerCom)
      , March 2019.
      [pdf]
    • Challenge-Response Behavioral Mobile Authentication: A Comparative Study of Graphical Patterns and Cognitive Games
      Manar Mohamed, Prakash Shrestha and Nitesh Saxena.
      In Annual Computer Security Applications Conference (ACSAC), December 2019.
    • Defeating Hidden Audio Channel Attacks on Voice Assistants via Audio-Induced Surface Vibrations
      Chen Wang, Abhishek Anand, Jian Liu, Payton Walker, Yingying Chen and Nitesh Saxena
      In Annual Computer Security Applications Conference (ACSAC), December 2019.
    • Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech TransformationsMaliheh Shirvanian, and Nitesh SaxenaInternational Conference on Privacy, Security and Trust (PST), August, 2019
      [pdf]
    • ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait BiometricsBabins Shrestha, Manar Mohamed and Nitesh SaxenaInternational Conference on Privacy, Security and Trust (PST), August, 2019
      [pdf]
    • Compromising Speech Privacy under Continuous Masking in Personal SpacesS Abhishek Anand, Payton Walker and Nitesh SaxenaInternational Conference on Privacy, Security and Trust (PST), August, 2019
      [pdf]
    • Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal InformationAjaya Neupane, Kiavash Satvat, Mahshid Hosseini and Nitesh SaxenaInternational Conference on Privacy, Security and Trust (PST), August, 2019
      [pdf]
    • CATCHA: When Cats  Track Your Movements OnlinePrakash Shrestha, Nitesh Saxena, Ajaya Neupane and Kiavash SatvatInternational Conference on Information Security Practice and Experience (ISPEC), November, 2019
      [pdf]
  • 2018
    • Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.
      Abhishek Anand and Nitesh Saxena
      In IEEE Symposium on Security and Privacy (IEEE S&P; Oakland), May 2018.
      [pdf]
    • Do Social Disorders Facilitate Social Engineering? A Case Study of Autism and Phishing Attacks.
      Ajaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos and Haley J. Bishop
      In the 34th Annual Computer Security Applications Conference (ACSAC), December 2018
    • Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks
      Prakash Shrestha, and Nitesh Saxena
      In ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), June 2018.
      [pdf]
    • Two-Factor Authentication with End-to-End Password Security.
      Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian and Nitesh Saxena
      In International Conference on Practice and Theory of Public Key Cryptography (PKC), March 2018.
      [pdf]
    • Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses.
      Abhishek Anand and Nitesh Saxena
      In ACM Conference on Data and Application Security and Privacy (CODASPY), March 2018..
      [pdf]
    • Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity.
      Prakash Shrestha, Babins Shrestha and Nitesh Saxena
      In IEEE Conference on Communications and Network Security (CNS), May/June 2018..
      [pdf]
  • 2017
    • CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through
      Maliheh Shirvanian and Nitesh Saxena
      ACM Conference on Computer and Communications Security (CCS), October/Novermber 2017.
      [pdf]
    •  VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration.
      Jian Liu, Chen Wang, Yingying Chen and Nitesh Saxena
      In ACM Conference on Computer and Communications Security (CCS), October/Novermber 2017.
      [pdf]
    • On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification.
      Maliheh Shirvanian, Nitesh Saxena and Jesvin James George.
      In Annual Computer Security Applications Conference (ACSAC), December 2017; arXiv preprint arXiv:1707.05285, 2017/7/17.
      [pdf]
    • Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study.
      Ajaya Neupane, Nitesh Saxena and Leanne Hirshfield
      In Security and Privacy Track, the World-Wide Web Conference (WWW), 2017.
      [pdf]
    • SPHINX: A Password Store that Perfectly Hides Passwords from Itself.
      Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk  and Nitesh Saxena
      In IEEE International Conference on Distributed Computing Systems (ICDCS) , June 2017.
      [pdf]
    • YELP: Masking Sound-based Opportunistic Attacks in Zero-Effort Deauthentication
      Prakash Shrestha, Abhishek Anand and Nitesh Saxena
      ACM Conference on Wireless Network Security (WiSec), July 2017.
      [pdf]
    • Coresident Evil: Noisy Vibrational Pairing in the Face of Co-located Acoustic Eavesdropping
      Abhishek Anand, and Nitesh Saxena
      ACM Conference on Wireless Network Security (WiSec), July 2017.
      [pdf]
    • PEEP: Passively Eavesdropping Private Input via Brainwave Signals
      Ajaya Neupane, Md. Lutfor Rahman and Nitesh Saxena
      In Financial Cryptography and Data Security (FC), April 2017.
      [pdf]
  • 2016
    • The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.
      Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha and Nitesh Saxena
      In ACM Conference on Computer and Communications Security (CCS), October 2016.
      [ pdf]
    • Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.
      Otto Huhta, Prakash Shrestha, Swapnil Udar, Mika Juuti, Nitesh Saxena and N. Asokan
      In the Network and Distributed System Security Symposium (NDSS), February 2016.
      [pdf]
    • Gametrics: Towards Attack-Resilient Behavioral Authentication with Simple Cognitive Games
      Manar Mohamed and Nitesh Saxena
      In Annual Computer Security Applications Conference (ACSAC), December 2016
      [pdf]
    • Theft-Resilient Mobile Payments: Transparently Authenticating NFC Users with Tapping Gesture Biometrics
      Babins Shrestha, Manar Mohamed, Sandeep Tamrakar and Nitesh Saxena
      In Annual Computer Security Applications Conference (ACSAC), December 2016
      [pdf]
    • Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
      Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian and Nitesh Saxena
      In ACM Symposium on Information, Computer and Communications Security (AsiaCCS), June 2016.
      [pdf]
    • Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise
      Prakash Shrestha, Manar Mohamed and Nitesh Saxena
      ACM Conference on Wireless Network Security (WiSec), July 2016
      [pdf]
    • Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise
      Abhishek Anand, and Nitesh Saxena
      ACM Conference on Wireless Network Security (WiSec), July 2016
      [pdf]
    • A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds.
      Abhishek Anand and Nitesh Saxena
      In Financial Cryptography and Data Security, February, 2016..
      [pdf]
    • SMASheD: Sniffing and Manipulating Android Sensor Data.
      Manar Mohamed, Babins Shrestha and Nitesh Saxena
      In ACM Conference on Data and Application Security and Privacy (CODASPY), March 2016.
      [pdf]
  • 2015
    • A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings
      Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, and Leanne Hirshfield
      In ACM Conference on Computer and Communications Security (CCS), October 2015
      [pdf]
    • Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks
      Song Gao, Manar Mohamed, Nitesh Saxena, and Chengcui Zhang
      In Annual Computer Security Applications Conference (ACSAC), December 2015
      [pdf]
    • On the Security and Usability of Crypto Phones
      Maliheh Shirvanian and Nitesh Saxena
      In Annual Computer Security Applications Conference (ACSAC), December 2015
      [pdf]
    • All Your Voices Are Belong to Us: Stealing Voices to Fool Humans and Machines
      Dibya Mukhopadhyay, Maliheh Shirvanian and Nitesh Saxena
      European Symposium on Research in Computer Security (ESORICS), September 2015.
      [pdf]
    • Bad Sounds Good Sounds: Attacking and Defending Tap-based Rhythmic Passwords using Acoustic Signals
      S Abhishek Anand, Prakash Shrestha, and Nitesh Saxena
      International Conference on Cryptology and Network Security (CANS), December 2015.
      [pdf]
    • Curbing Mobile Malware based on User-Transparent Hand Movements
      Babins Shrestha, Manar Mohamed, Anders Borg, Nitesh Saxena and Sandeep Tamrakar.
      International Conference on Pervasive Computing and Communications (PerCom), March 2015.
      [pdf]
  • 2014
    • Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones
      Maliheh Shirvanian and Nitesh Saxena
      ACM Conference on Computer and Communications Security (CCS), November 2014.
      [pdf]
    • Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings [Distinguished Paper Award]
      Ajaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu, and Rajesh Kana
      The Network and Distributed System Security Symposium (NDSS), February 2014
      [pdf]
    • Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices
      Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena and Naveen Nathan.
      The Network and Distributed System Security Symposium (NDSS), February 2014
      [pdf]
    • Gaming the Game: Defeating a Game CAPTCHA with Efficient and Robust Hybrid Attacks
      Song Gao, Manar Mohamed, Nitesh Saxena, and Chengcui Zhang.
      In Security and Forensics Track, IEEE International Conference on Multimedia and Expo (ICME), July 2014.
      [pdf]
    • Comparing and Fusing Different Sensor Modalities for Relay Attack Resistance in Zero-Interaction Authentication
      Hien Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan, and Petteri Nurmi.
      International Conference on Pervasive Computing and Communications (PerCom), March 2014.
      [pdf]
    • A Three-Way Investigation of a Game-CAPTCHA: Automated Attacks, Relay Attacks and Usability.
      Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. Van Oorschot and Wei-Bang Chen
      In ACM Symposium on Information, Computer and Communications Security (AsiaCCS), June 2014.
      [pdf]
    • Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-Sensing
      Babins Shrestha, Nitesh Saxena, Hien Truong and N. Asokan.
      In Financial Cryptography and Data Security, March 2014.
      [pdf]
    • Dynamic Cognitive Game CAPTCHA Usability and Detection of Streaming-Based Farming
      Manar Mohamed, Song Gao, Nitesh Saxena, and Chengcui Zhang.
      In the Workshop on Usable Security (USEC), co-located with NDSS, February 2014.
      [pdf]
  • 2013
    • On the Viability of CAPTCHAs for Use in Telephony Systems: A Usability Field Study
      NIharika Sachdeva, Nitesh Saxena, and Ponnurangam Kumaraguru
      Information Security Conference (ISC), November 2013..
      [pdf]
    • Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture
      Babins Shrestha, Nitesh Saxena and Justin Harrison
      International Conference on Cryptology and Network Security, November 2013.
      [pdf]
    • Tap-Wave-Rub: Lightweight Malware Prevention for Smartphones using Intuitive Human Gestures
      Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu, and Haoyu Li
      ACM Conference on Wireless Network Security (WiSec), April 2013
      [extended version pdf]
    • Sensing-Enabled Channels for Hard-to-Detect Command and Control of Mobile Devices
      Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, and Dustin Rinehart
      ACM Symposium on Information, Computer and Communications Security (AsiaCCS), May 2013
      [pdf]
    • Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing
      Alexander Gallego, Nitesh Saxena, and Jonathan Voris
      International Conference on Financial Cryptography and Data Security (FC), April 2013.
      [pdf]
    • An Investigation of the Usability of a Game for Secure Wireless Device Association
      Alexander Gallego, Nitesh Saxena, and Jonathan Voris
      6th International Conference on Computer Games, Multimedia and Allied Technology (CGAT), April 2013.
      [pdf]
  • 2012
    • Secure Proximity Detection for NFC Devices based on Ambient Sensor Data
      Tzipora Halevi, Di Ma, Nitesh Saxena, and Tuo Xiang
      European Symposium on Research in Computer Security (ESORICS), September 2012
      [pdf]
    • Exploring Mobile Proxies for Better Password Authentication
      Nitesh Saxena and Jonathan Voris
      International Conference on Information and Communications Security (ICICS), October 2012
      [pdf]
    • A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques
      Tzipora Halevi and Nitesh Saxena
      ACM Symposium on Information, Computer and Communications Security (AsiaCCS), May 2012
      [pdf]
    • Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
      Di Ma, Anudath K Prasad, Nitesh Saxena, and Tuo Xiang
      ACM Conference on Wireless Network Security (WiSec), April 2012
      [pdf]
    • Sensing-Enabled Defenses to RFID Unauthorized Reading and Relay Attacks without Changing the Usage Model
      Tzipora Halevi, Sein Lin, Di Ma, Anudath K Prasad, Nitesh Saxena, Jonathan Voris and Tuo Xiang
      International Conference on Pervasive Computing and Communications (PerCom), March 2012
      [pdf]
    • Estimating Age Privacy Leakage in Online Social Networks
      Ratan Dey, Cong Tang, Keith Ross and Nitesh Saxena
      International Conference on Computer Communications (IEEE INFOCOM), March 2012
      [pdf]
  • 2011
    • Password-Protected Secret Sharing
      Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena and Yanbin Liu
      ACM Conference on Computer and Communications Security (CCS), October 2011
      [pdf]
    • Cover Locations: Availing Location-Based Services Without Revealing the Location
      Sai Teja Peddinti, Avis Dsouza, and Nitesh Saxena
      Workshop on Privacy in the Electronic Society (WPES 2010), co-located with ACM CCS, October, 2011.
      [pdf]
    • On the Limitations of Query Obfuscation Techniques for Location Privacy
      Sai Teja Peddinti and Nitesh Saxena
      International Conference on Ubiquitous Computing (Ubicomp), September 2011.
      [pdf]
    • Playful Security: A Computer Game for Secure Pairing of Wireless Devices
      Alexander Gallego, Nitesh Saxena, and Jonathan Voris
      The 16th International Computer Games Conference (CGames): AI, Animation, Mobile, Interactive Multimedia, Educational & Serious Games, July 2011.
      [pdf]
    • Accelerometers and Randomness: Perfect Together
      Jonathan Voris, Nitesh Saxena, and Tzipora Halevi
      ACM Conference on Wireless Network Security (WiSec), June 2011.
      [pdf]
    • Vibrate-to-Unlock: Mobile Phone Assisted User Authentication to Multiple Personal RFID Tags
      Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris and N. Asokan
      International Conference on Pervasive Computing and Communications (PerCom)
      , March 2011.
      [pdf]
    • What’s in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook
      Cong Tang, Keith Ross, Nitesh Saxena and Ruichuan Chen
      International 
      Workshop on Social Networks and Social Media Mining on the Web (SNSMW), co-located with DASFAA, April 2011.
      [pdf]
    • Pairing Devices for Social Interactions: A Comparative Usability Evaluation
      Ersin Uzun, Nitesh Saxena and Arun Kumar
      ACM 
      Conference on Human Factors in Computing Systems (CHI), May 2011.
      [pdf]
    • On the Effectiveness of Anonymizing Networks for Web Search Privacy
      Sai Teja Peddinti and Nitesh Saxena
      ACM Symposium on Information, Computer and Communications Security (AsiaCCS)
      , March 2011.
      [pdf]
  • 2010
    • On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels: The Case of Acoustic Eavesdropping
      Tzipora Halevi and Nitesh Saxena
      ACM Conference on Computer and Communications Security (CCS), October 2010
      [pdf]
    • A Comparative Usability Evaluation of Traditional Password Managers
      Ambarish Karole, Nitesh Saxena and Nicolas Christin
      International Conference on Information Security and Cryptology (ICISC), December 2010
      [pdf]
    • On the Privacy of Peer-Assisted Distribution of Security Patches
      Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena and Keith W. Ross
      IEEE International Conference on Peer-to-Peer Computing (P2P), August 2010
      [pdf]
    • Authenticated Key Agreement with Key Re-Use in the Short Authenticated Strings Model
      Stanislaw Jarecki and Nitesh Saxena
      Conference on Security and Cryptography for Networks (SCN), September 2010.
      [pdf]
    • Groupthink: Usability of Secure Group Association for Wireless Devices
      Rishab Nithyanand, Nitesh Saxena, Gene Tsudik and Ersin Uzun
      International Conference on Ubiquitous Computing (Ubicomp), September 2010.
      [pdf]
    • Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model
      Nitesh Saxena and Jonathan Voris
      Workshop on RFID Security (RFIDSec), June 2010.
      [pdf]
    • On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot
      Sai Teja Peddinti and Nitesh Saxena
      Privacy Enhancing Technologies Symposium (PETS), July 2010.
      [pdf]
    • Shoulder Surfing Safe Login in a Partially Observable Attacker Model
      Toni Perkovic, Mario Cagalj and Nitesh Saxena
      Financial Cryptography (FC), January 2010.
      [pdf]
  • 2009
    • On the Usability of Secure Association of Wireless Devices Based On Distance Bounding
      Mario Cagalj, Nitesh Saxena and Ersin Uzun
      Cryptology and Network Security (CANS), December 2009.
      [pdf]
    • Blink ‘Em All: Secure, Scalable and User-Friendly Initialization of Sensor Nodes
      Nitesh Saxena and Md. Borhan Uddin
      Cryptology and Network Security (CANS), December 2009.
      [pdf]
    • Authentication Technologies for the Blind or Visually Impaired
      Nitesh Saxena and James Watt
      USENIX Workshop on Hot Topics in Secuirty (HotSec), August 2009.
      [pdf]
    • We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags
      Nitesh Saxena and Jonathan Voris
      Workshop on RFID Security (RFIDSec), July 2009.
      [pdf]
    • Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
      Tzipora Halevi, Nitesh Saxena and Shai Halevi
      Workshop on RFID Security (RFIDSec), July 2009.
      [pdf]
    • Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
      Ambarish Karole and Nitesh Saxena
      International Symposium on Emerging Ubiquitous and Pervasive Systems (EUPS), August 2009.
      [pdf]
    • Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes
      Nitesh Saxena and Md. Borhan Uddin
      Applied Cryptography and Network Security (ACNS), Industrial Track paper, June 2009.
      [pdf]
    • Secure Pairing of “Interface-Constrained” Devices Resistant Against Rushing User Behavior
      Nitesh Saxena and Md. Borhan Uddin
      Applied Cryptography and Network Security (ACNS), June 2009.
      [pdf]
    • Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
      Arun Kumar, Nitesh Saxena, Gene Tsudik and Ersin Uzun
      International Conference on Pervasive Computing and Communications (PerCom), March 2009.
      [pdf]
  • 2008
    • Automated Device Pairing for Asymmetric Pairing Scenarios
      Nitesh Saxena and Md. Borhan Uddin
      International Conference on Information and Communications Security (ICICS), October 2008.
      [pdf]
    • Universal Device Pairing using an Auxiliary Device
      Nitesh Saxena, Md. Borhan Uddin and Jonathan Voris
      Symposium On Usable Privacy and Security (SOUPS), July 2008.
      [pdf]
    • Efficient Device Pairing using Synchronized “Human-Comparable” Audiovisual Patterns
      Ramnath Prasad and Nitesh Saxena
      Applied Cryptography and Network Security (ACNS), June 2008.
      [pdf]
    • Pairing Devices with Good Quality Output Interfaces
      Nitesh Saxena and Jonathan Voris
      International Workshop on Wireless Security and Privacy (WISP) (co-located with ICDCS).
      June 2008.
      [pdf]
  • 2007
    • The Pollution Attack in P2P Live Video Streaming: Messurement Results and Defenses
      Prithula Dhungel, Xiaojun Hei, Keith W. Ross, and Nitesh Saxena
      Peer-to-Peer Streaming and IP-TV Workshop (P2P-TV) (co-located with SIGCOMM),
      August 2007
      [pdf]
  • 2006 and earlier
    • Public Key Cryptography sans Certificates in Ad Hoc Networks (Best Student Paper!)
      Nitesh Saxena
      Applied Cryptography and Network Security (ACNS), June 2 006.
      [pdf]
    • Secure Device Pairing based on a Visual Channel
      Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, and N. Asokan
      IEEE Symposium on Security and Privacy, Oakland, appeared as short paper (6 pages),
      May 2006.
      [full paper: pdf][short paper: pdf]
    • Securing Communication in Various Ad Hoc Network Settings
      Nitesh Saxena
      IEEE Infocom Student Workshop, April 2006.
    • Efficient Node Admission for Short-lived Mobile Ad Hoc Networks
      Nitesh Saxena, Gene Tsudik, and Jeong H. Yi,
      IEEE Conference on Networking Protocols (ICNP), November 2005.
      [pdf]
    • Self-Configurable Key Pre-distribution in Mobile Ad Hoc Networks,
      Claude Castellucia, Nitesh Saxena, and Jeong H. Yi,
      IFIP Networking Conference, May 2005.
      [pdf]
    • Futher Simplifications in Proactive RSA Signatures,
      Stanislaw Jarecki, and Nitesh Saxena,
      Theory of Cryptography Conference (TCC), February 2005.
      [pdf]
    • Identity-based Access Control for Ad Hoc Groups,
      Nitesh Saxena, Gene Tsudik, and Jeong H. Yi,
      International Conference on Information Security and Cryptology (ICISC), December 2004.
      [pdf]
    • An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol,
      Stanislaw Jarecki, Nitesh Saxena, and Jeong Hyun Yi,
      ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp.1-9, Washington, DC, USA, October 25, 2004.
      [pdf]
    • Access Control in Ad Hoc Groups,
      Nitesh Saxena, Gene Tsudik, and Jeong H. Yi,
      International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P), Volendam, The Netherlands, October 2004.
      [pdf]
    • Experimenting with Admission Control in P2P,
      Nitesh Saxena, Gene Tsudik, and Jeong H. Yi,
      International Workshop on Advanced Developments in System and Software Security (WADIS), Taipei, Taiwan, December 2003.
      [pdf]
    • Admission Control in Peer-to-Peer: Design and Performance Evaluation,
      Nitesh Saxena, Gene Tsudik, and Jeong H. Yi,
      ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp.104-114, Fairfax, VA, USA, October 31, 2003.
      [pdf]

BOOK CHAPTERS

  • Towards Sensing-Enabled RFID Security and PrivacyDi Ma and Nitesh Saxena
    Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID, IGI Global, 2012.
  • Expermenting with Admission Control in P2P NetworksNitesh Saxena, Gene Tsudik and Jeong H. Yi,
    Computer Security in the 21st Century, ISBN: 0-387-24005-5, Springer, 2005.

DISSERTATIONS

  • Decentralized Security Services (Nominated for the ACM Doctoral Dissertation Award!)Nitesh Saxena,
    Ph.D Dissertation, UC Irvine, August 2006
    [pdf]
  • Cryptanalysis of the SchlusselzusatzNitesh Saxena,
    M.S. Dissertation, UC Santa Barbara, March 2002
    Also appears in the chapter on “The Emergence of Cipher Machines” of the book Computer Security and Crypgraphy, by Alan G. Konheim
    [pdf]

Filed Under: News

Runner Up, The Mark Weiser Best Paper Award

Posted on March 15, 2019 by Zengrui Liu

The SPIES lab’s paper at Percom 2019 was a runner up for the prestigious Mark Weiser Best Paper Award: Quantifying the Breakability of Mobile Assistants
Maliheh Shirvanian, Summer Vo and Nitesh Saxena
International Conference on Pervasive Computing and Communications (PerCom)
, March 2019. [pdf]

Filed Under: Uncategorized

Hello world!

Posted on September 22, 2016 by coems

Welcome to CoE WordPress. This is your first post. Edit or delete it, then start blogging!

Filed Under: Uncategorized

Prof. Saxena Co-Leads CIA-JFR’s Information Assurance Pillar

Posted on July 25, 2013 by Zengrui Liu

Prof. Saxena will be serving as the co-leader of the Information Assurance/Security Pillar of UAB’s CIA-JFR Center.

Filed Under: Uncategorized

Cisco funds a research project on VoIP Security

Posted on July 7, 2013 by Zengrui Liu

Prof. Saxena (PI) awarded $150,000 in research funding from Cisco Systems to launch a new project on Voice-over-IP secure communications, specifically “Establishing Peer-to-Peer Secure VoIP Connections.” This is a joint project with Prof. Bangalore (Co-PI) @CCL lab.
UAB Press Release
 
 

Filed Under: Uncategorized

Prof. Saxena to serve as AE for IEEE TIFS

Posted on July 7, 2013 by Zengrui Liu

IEEE Transactions on Information Forensics and Security is a flagship journal within the Security community, likely one of the best.
Information on Forensics and Security

Filed Under: Uncategorized

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 8
  • Go to page 9
  • 10

Latest News

  • AI Spies News — BPSniff (IEEE S&P 2025) Paper News Story May 12, 2025
  • Launching the AI Spies News Channel May 12, 2025
  • Paper accepted to WiSec 2025 May 11, 2025
  • SPIES Lab’s Secure Messaging Work Features in News May 3, 2025
  • SPIES Lab Student to Start as an Assistant Professor April 18, 2025

© 2016–2025 Nitesh Saxena - Professor, Computer Science; Associate Director, Global Cyber Research Institute; Dean's Research Fellow 2022-23 Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment