Hidden Voice Commands N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ... 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, 2016 | 778 | 2016 |
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition T Vaidya, M Zhang, Yuankai, Sherr, C Shields 9th USENIX Workshop on Offensive Technologies (WOOT'15), 2015 | 253 | 2015 |
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor R Jansen, T Vaidya, M Sherr 28th USENIX Security Symposium (USENIX Security '19), Santa Clara, CA, 2019 | 52 | 2019 |
Does Being Verified Make You More Credible? Account Verification’s Effect on Tweet Credibility T Vaidya, D Votipka, ML Mazurek, M Sherr ACM Conference on Human Factors in Computing Systems (CHI), 2019 | 48 | 2019 |
You Talk Too Much: Limiting Privacy Exposure via Voice Input T Vaidya, M Sherr 2019 International Workshop on Privacy Engineering - IWPE'19, 2019 | 27 | 2019 |
Dispersing Asymmetric DDoS Attacks with SplitStack A Chen, A Sriraman, T Vaidya, Y Zhang, A Haeberlen, BT Loo, LTX Phan, ... Proceedings of the 15th ACM Workshop on Hot Topics in Networks (HotNets'16), 2016 | 24 | 2016 |
An Extensive Evaluation of the Internet's Open Proxies A Mani*, T Vaidya*, D Dworken, M Sherr Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 23 | 2018 |
2001-2013: Survey and Analysis of Major Cyberattacks T Vaidya arXiv preprint arXiv:1507.06673, 2015 | 23 | 2015 |
DeDoS: Defusing DoS with Dispersion Oriented Software HM Demoulin*, T Vaidya*, I Pedisich, B DiMaiolo, J Qian, C Shah, ... Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 13 | 2018 |
Ephemeral exit bridges for tor Z Zhang, T Vaidya, K Subramanian, W Zhou, M Sherr 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 7 | 2020 |
Mind Your s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion) T Vaidya, M Sherr Cambridge International Workshop on Security Protocols, 91-104, 2015 | 6 | 2015 |
Whisper: A unilateral defense against voip traffic re-identification attacks T Vaidya, T Walsh, M Sherr Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 5 | 2019 |
A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers HM Demoulin*, T Vaidya*, I Pedisich, N Sultana, B Wang, J Qian, Y Zhang, ... Proceedings of the SIGCOMM Posters and Demos, 71-73, 2017 | 4 | 2017 |
Helping users understand their web footprints L Singh, H Yang, M Sherr, Y Wei, A Hian-Cheong, K Tian, J Zhu, S Zhang, ... Proceedings of the 24th International Conference on World Wide Web, 117-118, 2015 | 4 | 2015 |
Where art thou, Eve? Experiences laying traps for Internet eavesdroppers T Vaidya, E Burger, M Sherr, C Shields 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017 | 3 | 2017 |
Two Factor Authentication Using Audio Communication Between Machines with and without Human Interaction T Vaidya, M Sherr US Patent App. 16/564,386, 2020 | 2 | 2020 |
Exploiting and Harnessing the Processes and Differences of Speech Understanding in Humans and Machines T Vaidya Georgetown University, 2019 | | 2019 |
Hidden voice commands 25th USENIX Security Symposium (USENIX Security 16) N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ... Austin, TX, 1-20, 2016 | | 2016 |
Poster: Studying the Pervasiveness of Internet Interception with Honey{POP,SMTP,Telnet} T Vaidya, E Burger, M Sherr, C Shields 24th USENIX Security Symposium (USENIX Security'15), Washington, D.C., 2015 | | 2015 |