• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Research
  • Publications
  • People
  • Teaching
  • Media Outreach
  • News
  • AI Spies News

SPIES Lab, Computer Science and Engineering

Texas A&M University College of Engineering

News

Paper accepted to CSCML 2025

Posted on August 13, 2025 by Jimmy Dani

  • Robust and Verifiable MPC with Applications to Linear Machine Learning Inference
    Tzu-Shen Wang, Jimmy Dani, Juan Garay, Soamar Homsi, and Nitesh Saxena
    In the 9th International Symposium on Cyber Security, Cryptology, and Machine Learning (CSCML), December 2025.

Filed Under: Uncategorized

SPIES graduate to start as Assistant Professor

Posted on July 22, 2025 by nsaxena

https://www.tamuct.edu/directory/dir_Images/saini-shalini.jpgShalini Saini, SPIES Lab’s recent PhD graduate, is taking up a faculty job. She is joining the Computer Science and Engineering Technology department at the University of Maryland Eastern Shore, as a tenure-track Assistant Professor starting Fall 2025.

Many congratulations to Shalini for making the SPIES lab proud, and best wishes for continuing to make a strong impact in academia!

 

Filed Under: Uncategorized

Paper accepted to ACM CCS 2025

Posted on July 2, 2025 by nsaxena

  • Harnessing Vital Sign Vibration Harmonics for Effortless and Inbuilt XR User Authentication
    Tianfang Zhang, Qiufan Ji, Md Mojibur Rahman Redoy Akanda, Zhengkun Ye, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen
    In the ACM SIGSAC Conference on Computer and Communications Security (CCS), October 2025. 

Filed Under: News, Uncategorized

News: Security and Accessibility Gaps in Web Authentication for Blind and Visually Impaired Users

Posted on June 30, 2025 by Jimmy Dani

College Station, TX — June 2025

This news story was fully generated by AI, the text using GPT-4.5 and the image using GPT-4o, with necessary review and corrections by the SPIES researchers.

SHARE THIS

🐦 Twitter
📘 Facebook
🔗 LinkedIn
✉️ Email

In groundbreaking research presented at the ACM Web Conference 2025 (WWW), researchers from Texas A&M University’s Security and Privacy in Emerging Computing and Networking Systems (SPIES) lab have highlighted significant vulnerabilities and accessibility challenges in two-factor (2FA) and passwordless authentication methods for blind and visually impaired users relying on screen readers.

Illustration showing a blind user using a laptop and phone with screen reader, facing push notification and phishing risks

The study, titled “Broken Access: On the Challenges of Screen Reader Assisted Two-Factor and Passwordless Authentication,” reveals how commonly used authentication methods, such as Google, Microsoft, and Duo’s OTP-2FA, phone call 2FA, push notifications, and FIDO-based MFA, often fail to effectively accommodate the specific needs of blind and visually impaired individuals. Through systematic evaluation using the team’s newly developed Authentication Workflows Accessibility Review and Evaluation (AWARE) framework, researchers found numerous critical security issues, including susceptibility to phishing, notification fatigue, and concurrent login attacks.

“Our goal was to expose overlooked gaps in the current authentication landscape that disproportionately affect blind and visually impaired users,” said Md Mojibur Rahman Redoy Akanda, lead author and PhD student working with Dr. Nitesh Saxena. “Despite being promoted as secure and usable, many real-world 2FA and passwordless systems are simply not designed with accessibility in mind.”

Key findings highlight how imprecise instructions and insufficient accessibility considerations significantly increase vulnerability for visually impaired users. Specifically, the researchers identified critical conflicts between simultaneous authentication steps (such as receiving OTP codes via phone calls) and screen reader audio prompts, leading to confusion and potential security breaches. Additionally, they discovered screen readers mispronouncing numeric OTPs, interpreting them incorrectly as continuous numbers rather than distinct digits, and observed difficulties in managing authentication prompts when users concurrently used screen readers on both smartphones and PCs.

“This research opens up a much-needed conversation at the intersection of accessibility and cybersecurity,” said Dr. Nitesh Saxena, Director of the SPIES Lab at Texas A&M University. “We hope these findings will guide system designers, developers, and policymakers to adopt more inclusive authentication practices—making secure access a right, not a privilege.”

This research underscores the urgent need for developers to implement clearer authentication workflows and better integration of accessibility standards. The SPIES team offers concrete recommendations for enhancing security and usability, such as explicit instructions, automated phishing detection, and optimized communication between authentication interfaces and screen readers.

The findings presented at WWW ’25 are a pivotal step toward ensuring digital authentication methods are secure and inclusive for all users, particularly the visually impaired.

To read the full paper, click here.

Citation:
Md Mojibur Rahman Redoy Akanda, Ahmed Tanvir Mahdad, and Nitesh Saxena. 2025. Broken Access: On the Challenges of Screen Reader Assisted Two-Factor and Passwordless Authentication. In Proceedings of the ACM Web Conference 2025 (WWW ’25), April 28–May 2, 2025, Sydney, NSW, Australia. ACM, New York, NY, USA, 13 pages. https://doi.org/10.1145/3696410.3714579

Read more stories like this on AI Spies News.

Follow us on Medium.

Filed Under: AI Spies News

Paper accepted to ICME 2025

Posted on June 24, 2025 by nsaxena

MarkMatch: Same-Hand Stuffing Detection.
Fei Zhao, Runlin Zhang, Chengcui Zhang, and Nitesh Saxena
IEEE International Conference on Multimedia and expo (ICME), June 30-July 4th, 2025.

Filed Under: Uncategorized

SPIES Lab’s Browser Fingerprinting Work in the News

Posted on June 23, 2025 by Jimmy Dani

SPIES Lab’s study, led by Zengrui Liu (former SPIES), Jimmy Dani and Nitesh Saxena, provides the first evidence of the use of browser fingerprints for online tracking. The researchers discovered that websites are covertly employing browser fingerprinting — a technique that uniquely identifies a web browser — to track users across browsing sessions and sites.

Read our full paper here.

Media outlets featuring our browser fingerprinting work include:

  • Your browser is snitching on you, The Kim Komando Show
  • New Research Provides First Evidence of the Use of Browser Fingerprints for Online Tracking, Soylent News
  • Tracking of Internet users via browser fingerprinting, IT Daily
  • Tracking of Internet users via browser fingerprinting, PCtipp
  • Tracking Internet users via browser fingerprinting, Innovation & Information
  • Psylo browser tries to obscure digital fingerprints by giving every tab its own IP address, The Register
  • Tracking of Internet users via fingerprinting, pressetext
  • New Research Reveals How Websites Secretly Track Users Without Cookies, Israel Homeland Security (iHSL)
  • Your web browser may be spying on you — Even without cookies, Knowridge Science Report
  • VPNs cannot protect against browser fingerprinting – but this new web browser could be the fix, msn.com
  • Researchers Link Browser Fingerprints to Ad Targeting, Undermining Online Privacy Promises, Digital Information World
  • Websites are secretly tracking you using your browser’s ‘fingerprint’, Earth.com
  • Websites Are Tracking You Via Browser Fingerprinting, Hacker News
  • Websites Are Tracking You Via Browser Fingerprinting, researchers show, Tech Xplore
  • Psylo browser tries to obscure digital fingerprints by giving every tab its own IP address, The Register
  • The browser reveals its identity. Why is this a problem?, gazeta na niedzielę (GNN)
  • Risky Bulletin: Russian hackers abuse app-specific passwords to bypass MFA, RISKY.BIZ
  • Researchers relate browser fingerprints to ad targeting, undermining promises of online privacy., Consultant ALEX BARBOSA
  • VPNs cannot protect against browser fingerprinting – but this new web browser could be the fix, Tech Radar, June 21, 2025

Filed Under: Uncategorized

Journal paper accepted to IEEE TIFS

Posted on June 19, 2025 by nsaxena

Building and Testing a Hidden-Password Online Password Manager
Mohammed Jubur, Chistopher Price, Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk and Nitesh Saxena
In IEEE Transactions on Information Forensics and Security (TIFS), 2025

Filed Under: Uncategorized

SPIES Lab’s Browser Fingerprinting Work Features in News

Posted on June 18, 2025 by Jimmy Dani

SPIES Lab’s study, led by Zengrui Liu (former SPIES), Jimmy Dani and Nitesh Saxena, provides the first evidence of the use of browser fingerprints for online tracking. The researchers discovered that websites are covertly employing browser fingerprinting — a technique that uniquely identifies a web browser — to track users across browsing sessions and sites.

Read our full paper here.

Websites Are Tracking You Via Browser Fingerprinting, Department of Computer Science & Engineering, Texas A&M University

Filed Under: Uncategorized

Paper Accepted to USENIX Security 2025

Posted on June 6, 2025 by Jimmy Dani

SoK: Inaccessible & Insecure: An Exposition of Authentication Challenges Faced by Blind and Visually Impaired Users in State-of-the-Art Academic Proposals
Md Mojibur Rahman Redoy Akanda, Amanda Lacy, Nitesh Saxena
In 34th USENIX Security Symposium, August 2025.

Filed Under: Uncategorized

2 Papers Accepted to PST 2025

Posted on June 6, 2025 by Jimmy Dani

  • A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers
    Jimmy Dani, Kalyan Nakka, Nitesh Saxena
    In 22nd Annual International Conference on Privacy, Security, and Trust (PST), August 2025.
  • Encryption Struggles Persist: When Tech-Savvy Students Face Challenges with PGP in Thunderbird
    Md Imanul Huq, Ahmed Tanvir Mahdad, Nitesh Saxena
    In 22nd Annual International Conference on Privacy, Security, and Trust (PST), August 2025.

Filed Under: Uncategorized

  • « Go to Previous Page
  • Go to page 1
  • 2
  • Go to page 3
  • Go to page 4
  • Interim page numbers omitted …
  • Go to page 24
  • Go to Next Page »

Recent News

  • Paper accepted to WiSec 2026 January 13, 2026
  • Paper accepted to EACL 2026 January 5, 2026
  • Paper accepted to USENIX Security 2026 December 17, 2025
  • SPIES Lab Research Cited in News Coverage on AI Security Breach December 14, 2025
  • SPIES Lab Research Featured in TAMU College of Engineering Spotlight December 5, 2025
  • Paper accepted to IJCNLP-AACL 2025 October 25, 2025
  • TAMU SPIES Lab Wins CCS 2025 Distinguished Paper Award! October 20, 2025
  • Paper accepted to eCrime 2025 September 9, 2025
  • Paper accepted to IEEE S&P (Magazine) August 24, 2025
  • Another recent SPIES graduate to take up faculty position August 21, 2025
  • Paper accepted to CSCML 2025 August 13, 2025
  • SPIES graduate to start as Assistant Professor July 22, 2025
  • Paper accepted to ACM CCS 2025 July 2, 2025
  • News: Security and Accessibility Gaps in Web Authentication for Blind and Visually Impaired Users June 30, 2025
  • Paper accepted to ICME 2025 June 24, 2025
  • SPIES Lab’s Browser Fingerprinting Work in the News June 23, 2025
  • Journal paper accepted to IEEE TIFS June 19, 2025
  • SPIES Lab’s Browser Fingerprinting Work Features in News June 18, 2025
  • Paper Accepted to USENIX Security 2025 June 6, 2025
  • 2 Papers Accepted to PST 2025 June 6, 2025

© 2016–2026 SPIES Lab, Computer Science and Engineering Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment