User-Aided Device Authentication: The Case of Constrained Wireless Devices
News
The doctorhood…
Tzipora Halevi successfully defends her PhD thesis, making her the second SPIES PhD graduate after Jon Voris. Who’s next?
Paper accepted at ESORICS 2012
Secure Proximity Detection for NFC Devices based on Ambient Sensor Data
NIST grant proposal invited for the next round
Our collaborative proposal submitted in response to the NIST’s National Strategy for Trusted Identities in Cyberspace (NSTIC) Pilot Grant Program has been invited for the next round of competition. Only 27 pre-proposals were selected out of a total of 186 submissions; an acceptance rate of merely 14.5%. The proposal centers around our work on usable authentication primitives and fault-tolerant distributed security services. This grant is expected to fund up to $4M over a period of two years per proposal.
And the award goes to…
Austin Robinson wins the Mu Alpha Theta Award for “the most challenging, thorough, and creative investigation of a problem involving mathematics accessible to high school students” at the Regional Science and Enigeering Fair.
Paper accepted at AsiaCCS 2012
A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques
Paper accepted at WiSec 2012
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
Prof. Saxena gives an invited talk at Brown University
Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing
Paper accepted at Percom 2012
Sensing-Enabled Defenses to RFID Unauthorized Reading and Relay Attacks without Changing the Usage Model
Paper accepted at INFOCOM 2012
Estimating Age Privacy Leakage in Online Social Networks
