Skip to main content

Showing 1–9 of 9 results for author: Shirvanian, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.04664  [pdf, other

    cs.CR cs.LG

    Compact: Approximating Complex Activation Functions for Secure Computation

    Authors: Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian

    Abstract: Secure multi-party computation (MPC) techniques can be used to provide data privacy when users query deep neural network (DNN) models hosted on a public cloud. State-of-the-art MPC techniques can be directly leveraged for DNN models that use simple activation functions such as ReLU. However, these techniques are ineffective and/or inefficient for the complex and highly non-linear activation functi… ▽ More

    Submitted 17 March, 2024; v1 submitted 8 September, 2023; originally announced September 2023.

    Comments: Accepted to Proceedings on Privacy Enhancing Technologies (PoPETs)

  2. arXiv:2303.11575  [pdf, other

    cs.CR cs.HC

    How Interactions Influence Users' Security Perception of Virtual Reality Authentication?

    Authors: Jingjie Li, Sunpreet Singh Arora, Kassem Fawaz, Younghyun Kim, Can Liu, Sebastian Meiser, Mohsen Minaei, Maliheh Shirvanian, Kim Wagner

    Abstract: Users readily embrace the rapid advancements in virtual reality (VR) technology within various everyday contexts, such as gaming, social interactions, shopping, and commerce. In order to facilitate transactions and payments, VR systems require access to sensitive user data and assets, which consequently necessitates user authentication. However, there exists a limited understanding regarding how u… ▽ More

    Submitted 3 June, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  3. arXiv:2212.01905  [pdf, other

    cs.CR

    "Tell me, how do you know it's me?" Expectations of security and personalization measures for smart speaker applications

    Authors: Maliheh Shirvanian, Sebastian Meiser

    Abstract: Voice-controlled smart speaker devices have gained a foothold in many modern households. Their prevalence combined with their intrusion into core private spheres of life has motivated research on security and privacy intrusions, especially those performed by third-party applications used on such devices. In this work, we take a closer look at such third-party applications from a less pessimistic a… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

  4. arXiv:2211.13195  [pdf, other

    cs.CR

    Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors

    Authors: Mihai Christodorescu, Maliheh Shirvanian, Shams Zawoad

    Abstract: Application authentication is typically performed using some form of secret credentials such as cryptographic keys, passwords, or API keys. Since clients are responsible for securely storing and managing the keys, this approach is vulnerable to attacks on clients. Similarly a centrally managed key store is also susceptible to various attacks and if compromised, can leak credentials. To resolve suc… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

  5. arXiv:2110.15872  [pdf, other

    cs.CR

    2D-2FA: A New Dimension in Two-Factor Authentication

    Authors: Maliheh Shirvanian, Shashank Agrawal

    Abstract: We propose a two-factor authentication (2FA) mechanism called 2D-2FA to address security and usability issues in existing methods. 2D-2FA has three distinguishing features: First, after a user enters a username and password on a login terminal, a unique $\textit{identifier}$ is displayed to her. She $\textit{inputs}$ the same identifier on her registered 2FA device, which ensures appropriate engag… ▽ More

    Submitted 29 October, 2021; originally announced October 2021.

    Comments: In the proceedings of Annual Computer Security Applications Conference (ACSAC) 2021

  6. arXiv:2102.13607  [pdf, other

    cs.CR

    PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency

    Authors: Kiavash Satvat, Maliheh Shirvanian, Nitesh Saxena

    Abstract: In this paper, we introduce PASSAT, a practical system to boost the security assurance delivered by the current cloud architecture without requiring any changes or cooperation from the cloud service providers. PASSAT is an application transparent to the cloud servers that allows users to securely and efficiently store and access their files stored on public cloud storage based on a single master p… ▽ More

    Submitted 26 February, 2021; originally announced February 2021.

  7. arXiv:2101.04773  [pdf, other

    cs.SD cs.AI cs.CR eess.AS

    Practical Speech Re-use Prevention in Voice-driven Services

    Authors: Yangyong Zhang, Maliheh Shirvanian, Sunpreet S. Arora, Jianwei Huang, Guofei Gu

    Abstract: Voice-driven services (VDS) are being used in a variety of applications ranging from smart home control to payments using digital assistants. The input to such services is often captured via an open voice channel, e.g., using a microphone, in an unsupervised setting. One of the key operational security requirements in such setting is the freshness of the input speech. We present AEOLUS, a security… ▽ More

    Submitted 12 January, 2021; originally announced January 2021.

  8. arXiv:1809.04112  [pdf

    cs.CR

    Camouflaged with Size: A Case Study of Espionage using Acquirable Single-Board Computers

    Authors: Kiavash Satvat, Mahshid Hosseini, Maliheh Shirvanian

    Abstract: Single-Board Computers (SBC) refer to pocket-sized computers built on a single circuit board. A number of studies have explored the use of these highly popular devices in a variety of domains, including military, agriculture, healthcare, and more. However, no attempt was made to signify possible security risks that misuse of these devices may bring to organizations. In this study, we perform a ser… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: accepted in netcom 2018

  9. arXiv:1707.05285  [pdf, other

    cs.CR

    On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification

    Authors: Maliheh Shirvanian, Nitesh Saxena, Jesvin James George

    Abstract: Many widely used Internet messaging and calling apps, such as WhatsApp, Viber, Telegram, and Signal, have deployed an end-to-end encryption functionality. To defeat potential MITM attackers against the key exchange protocol, the approach relies on users to perform a code verification task whereby each user must compare the code (a fingerprint of the cryptographic keys) computed by her app with the… ▽ More

    Submitted 17 July, 2017; originally announced July 2017.