- Robust and Verifiable MPC with Applications to Linear Machine Learning Inference
Tzu-Shen Wang, Jimmy Dani, Juan Garay, Soamar Homsi, and Nitesh Saxena
In the 9th International Symposium on Cyber Security, Cryptology, and Machine Learning (CSCML), December 2025.
News
SPIES graduate to start as Assistant Professor
Shalini Saini, SPIES Lab’s recent PhD graduate, is taking up a faculty job. She is joining the Computer Science and Engineering Technology department at the University of Maryland Eastern Shore, as a tenure-track Assistant Professor starting Fall 2025.
Many congratulations to Shalini for making the SPIES lab proud, and best wishes for continuing to make a strong impact in academia!
Paper accepted to ACM CCS 2025
- Harnessing Vital Sign Vibration Harmonics for Effortless and Inbuilt XR User Authentication
Tianfang Zhang, Qiufan Ji, Md Mojibur Rahman Redoy Akanda, Zhengkun Ye, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen
In the ACM SIGSAC Conference on Computer and Communications Security (CCS), October 2025.
News: Security and Accessibility Gaps in Web Authentication for Blind and Visually Impaired Users
College Station, TX — June 2025
SHARE THIS
In groundbreaking research presented at the ACM Web Conference 2025 (WWW), researchers from Texas A&M University’s Security and Privacy in Emerging Computing and Networking Systems (SPIES) lab have highlighted significant vulnerabilities and accessibility challenges in two-factor (2FA) and passwordless authentication methods for blind and visually impaired users relying on screen readers.

The study, titled “Broken Access: On the Challenges of Screen Reader Assisted Two-Factor and Passwordless Authentication,” reveals how commonly used authentication methods, such as Google, Microsoft, and Duo’s OTP-2FA, phone call 2FA, push notifications, and FIDO-based MFA, often fail to effectively accommodate the specific needs of blind and visually impaired individuals. Through systematic evaluation using the team’s newly developed Authentication Workflows Accessibility Review and Evaluation (AWARE) framework, researchers found numerous critical security issues, including susceptibility to phishing, notification fatigue, and concurrent login attacks.
Key findings highlight how imprecise instructions and insufficient accessibility considerations significantly increase vulnerability for visually impaired users. Specifically, the researchers identified critical conflicts between simultaneous authentication steps (such as receiving OTP codes via phone calls) and screen reader audio prompts, leading to confusion and potential security breaches. Additionally, they discovered screen readers mispronouncing numeric OTPs, interpreting them incorrectly as continuous numbers rather than distinct digits, and observed difficulties in managing authentication prompts when users concurrently used screen readers on both smartphones and PCs.
This research underscores the urgent need for developers to implement clearer authentication workflows and better integration of accessibility standards. The SPIES team offers concrete recommendations for enhancing security and usability, such as explicit instructions, automated phishing detection, and optimized communication between authentication interfaces and screen readers.
The findings presented at WWW ’25 are a pivotal step toward ensuring digital authentication methods are secure and inclusive for all users, particularly the visually impaired.
To read the full paper, click here.
Citation:
Md Mojibur Rahman Redoy Akanda, Ahmed Tanvir Mahdad, and Nitesh Saxena. 2025. Broken Access: On the Challenges of Screen Reader Assisted Two-Factor and Passwordless Authentication. In Proceedings of the ACM Web Conference 2025 (WWW ’25), April 28–May 2, 2025, Sydney, NSW, Australia. ACM, New York, NY, USA, 13 pages. https://doi.org/10.1145/3696410.3714579
Read more stories like this on AI Spies News.
Follow us on Medium.
Paper accepted to ICME 2025
MarkMatch: Same-Hand Stuffing Detection.
Fei Zhao, Runlin Zhang, Chengcui Zhang, and Nitesh Saxena
IEEE International Conference on Multimedia and expo (ICME), June 30-July 4th, 2025.
SPIES Lab’s Browser Fingerprinting Work in the News
SPIES Lab’s study, led by Zengrui Liu (former SPIES), Jimmy Dani and Nitesh Saxena, provides the first evidence of the use of browser fingerprints for online tracking. The researchers discovered that websites are covertly employing browser fingerprinting — a technique that uniquely identifies a web browser — to track users across browsing sessions and sites.
Read our full paper here.
Media outlets featuring our browser fingerprinting work include:
- Your browser is snitching on you, The Kim Komando Show
- New Research Provides First Evidence of the Use of Browser Fingerprints for Online Tracking, Soylent News
- Tracking of Internet users via browser fingerprinting, IT Daily
- Tracking of Internet users via browser fingerprinting, PCtipp
- Tracking Internet users via browser fingerprinting, Innovation & Information
- Psylo browser tries to obscure digital fingerprints by giving every tab its own IP address, The Register
- Tracking of Internet users via fingerprinting, pressetext
- New Research Reveals How Websites Secretly Track Users Without Cookies, Israel Homeland Security (iHSL)
- Your web browser may be spying on you — Even without cookies, Knowridge Science Report
- VPNs cannot protect against browser fingerprinting – but this new web browser could be the fix, msn.com
- Researchers Link Browser Fingerprints to Ad Targeting, Undermining Online Privacy Promises, Digital Information World
- Websites are secretly tracking you using your browser’s ‘fingerprint’, Earth.com
- Websites Are Tracking You Via Browser Fingerprinting, Hacker News
- Websites Are Tracking You Via Browser Fingerprinting, researchers show, Tech Xplore
- Psylo browser tries to obscure digital fingerprints by giving every tab its own IP address, The Register
- The browser reveals its identity. Why is this a problem?, gazeta na niedzielę (GNN)
- Risky Bulletin: Russian hackers abuse app-specific passwords to bypass MFA, RISKY.BIZ
- Researchers relate browser fingerprints to ad targeting, undermining promises of online privacy., Consultant ALEX BARBOSA
- VPNs cannot protect against browser fingerprinting – but this new web browser could be the fix, Tech Radar, June 21, 2025
Journal paper accepted to IEEE TIFS
Building and Testing a Hidden-Password Online Password Manager
Mohammed Jubur, Chistopher Price, Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk and Nitesh Saxena
In IEEE Transactions on Information Forensics and Security (TIFS), 2025
SPIES Lab’s Browser Fingerprinting Work Features in News
SPIES Lab’s study, led by Zengrui Liu (former SPIES), Jimmy Dani and Nitesh Saxena, provides the first evidence of the use of browser fingerprints for online tracking. The researchers discovered that websites are covertly employing browser fingerprinting — a technique that uniquely identifies a web browser — to track users across browsing sessions and sites.
Read our full paper here.
Websites Are Tracking You Via Browser Fingerprinting, Department of Computer Science & Engineering, Texas A&M University

Paper Accepted to USENIX Security 2025
SoK: Inaccessible & Insecure: An Exposition of Authentication Challenges Faced by Blind and Visually Impaired Users in State-of-the-Art Academic Proposals
Md Mojibur Rahman Redoy Akanda, Amanda Lacy, Nitesh Saxena
In 34th USENIX Security Symposium, August 2025.
2 Papers Accepted to PST 2025
- A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers
Jimmy Dani, Kalyan Nakka, Nitesh Saxena
In 22nd Annual International Conference on Privacy, Security, and Trust (PST), August 2025.
- Encryption Struggles Persist: When Tech-Savvy Students Face Challenges with PGP in Thunderbird
Md Imanul Huq, Ahmed Tanvir Mahdad, Nitesh Saxena
In 22nd Annual International Conference on Privacy, Security, and Trust (PST), August 2025.
