Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017 | 231* | 2017 |
Identity and content authentication for phone calls PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton US Patent 10,764,043, 2020 | 197 | 2020 |
Hear" no evil", see" kenansville": Efficient and transferable black-box attacks on speech recognition and voice identification systems H Abdullah, MS Rahman, W Garcia, K Warren, AS Yadav, T Shrimpton, ... 2021 IEEE Symposium on Security and Privacy (SP), 712-729, 2021 | 123 | 2021 |
Hello, is it me you're looking for? differentiating between human and electronic speakers for voice interface security L Blue, L Vargas, P Traynor Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018 | 85 | 2018 |
Sending out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways B Reaves, N Scaife, D Tian, L Blue, P Traynor, KRB Butler 2016 IEEE Symposium on Security and Privacy (SP), 339-356, 2016 | 72 | 2016 |
2ma: Verifying voice commands via two microphone authentication L Blue, H Abdullah, L Vargas, P Traynor Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 56 | 2018 |
Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction L Blue, K Warren, H Abdullah, C Gibson, L Vargas, J O'Dell, K Butler, ... 31st USENIX Security Symposium (USENIX Security 22), 2691-2708, 2022 | 51 | 2022 |
{AuthentiCall}: Efficient Identity and Content Authentication for Phone Calls B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, T Shrimpton 26th USENIX Security Symposium (USENIX Security 17), 575-592, 2017 | 50 | 2017 |
Detecting SMS spam in the age of legitimate bulk messaging B Reaves, L Blue, D Tian, P Traynor, KRB Butler Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 34 | 2016 |
Characterizing the security of the SMS ecosystem with public gateways B Reaves, L Vargas, N Scaife, D Tian, L Blue, P Traynor, KRB Butler ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-31, 2018 | 17 | 2018 |
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System. L Vargas, L Blue, V Frost, C Patton, N Scaife, KRB Butler, P Traynor NDSS, 2019 | 8 | 2019 |
Attacks as defenses: Designing robust audio captchas using attacks on automatic speech recognition systems H Abdullah, A Karlekar, S Prasad, MS Rahman, L Blue, LA Bauer, ... arXiv preprint arXiv:2203.05408, 2022 | 6 | 2022 |
Method and apparatus for differentiating between human and electronic speaker for voice interface security PG Traynor, LE Blue, L Vargas US Patent 11,176,960, 2021 | 4 | 2021 |
Lux: Enabling ephemeral authorization for display-limited IoT devices L Blue, S Marchal, P Traynor, N Asokan Proceedings of the International Conference on Internet-of-Things Design and …, 2021 | 2 | 2021 |
Practical end-to-end cryptographic authentication for telephony over voice channels PG Traynor, BG Reaves, LE Blue US Patent 11,329,831, 2022 | 1 | 2022 |
Detecting deep-fake audio through vocal tract reconstruction PG Traynor, K Butler, LE Blue, L Vargas, KS Warren, H Abdullah, ... US Patent 11,694,694, 2023 | | 2023 |
Identifying Different Audio Sources Through Fluid Dynamic and Acoustic Evaluation of Their Source Mechanics L Blue University of Florida, 2023 | | 2023 |
Poster: AuthentiCall: Efficient Identity and Content Authentication for Phone Calls B Reaves, L Blue, H Abdullah, L Vargas, P Traynor, T Shrimpton | | 2017 |