Extension of our “Wiretapping via Mimicry” paper from CCS 2014:
Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones: Defeating Humans and Machines
Maliheh Shirvanian, Dibya Mukhopadhyay and Nitesh Saxena
In Journal of Computer Security (JCS), 2017.
[pdf]