-
Chapter and Conference Paper
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage
Personal Identification Numbers (PINs) are widely used as the primary authentication method for Automated Teller Machines (ATMs) and Point of Sale (PoS). ATM and PoS typically mitigate attacks including should...
-
Chapter and Conference Paper
PassGAN: A Deep Learning Approach for Password Guessing
State-of-the-art password guessing tools, such as HashCat and John the Ripper, enable users to check billions of passwords per second against password hashes
-
Chapter and Conference Paper
SILK-TV: Secret Information Leakage from Keystroke Timing Videos
Shoulder surfing attacks are an unfortunate consequence of entering passwords or PINs into computers, smartphones, PoS terminals, and ATMs. Such attacks generally involve observing the victim’s input device. T...
-
Chapter and Conference Paper
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking
Named Data Networking (NDN) is an instance of information-centric network architecture designed as a candidate replacement for the current IP-based Internet. It emphasizes efficient content distribution, achie...
-
Chapter and Conference Paper
Privacy-Preserving Matching of Community-Contributed Content
Popular consumer review sites, such as Yelp and Tripadvisor, are based upon massive amounts of voluntarily contributed content. Sharing of data among different review sites can offer certain benefits, such as ...
-
Chapter and Conference Paper
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
In today’s digital society, electronic information is increasingly shared among different entities, and decisions are made based on common attributes. To address associated privacy concerns, the research commu...
-
Chapter and Conference Paper
On the Security of Password Manager Database Formats
Password managers are critical pieces of software relied upon by users to securely store valuable and sensitive information, from online banking passwords and login credentials to passport- and social security...
-
Chapter and Conference Paper
Fast and Private Computation of Cardinality of Set Intersection and Union
In many everyday scenarios, sensitive information must be shared between parties without complete mutual trust. Private set operations are particularly useful to enable sharing information with privacy, as the...
-
Chapter and Conference Paper
Secure and Efficient Protocols for Iris and Fingerprint Identification
Recent advances in biometric recognition and the increasing use of biometric data prompt significant privacy challenges associated with the possible misuse, loss, or theft of biometric data. Biometric matching...
-
Chapter and Conference Paper
Resource Management with X.509 Inter-domain Authorization Certificates (InterAC)
Collaboration among independent administrative domains would require: i) confidentiality, integrity, non-repudiation of communication between the domains; ii) minimum and reversible modifications to the intra-...
-
Chapter and Conference Paper
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the standard quadratic residuosity assumption. Our scheme is a variant of Cocks IBE (which is not anonymous) and i...