For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (27. : 2022 : Kopenhagen; Online) Computer security - ESORICS 2022 ; Part 3
1. Verfasser: Cardaioli, Matteo (VerfasserIn)
Weitere Verfasser: Conti, Mauro (VerfasserIn), Ravindranath, Arpita (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Formal Analysis of the FIDO2 Protocols 2022 Guan, Jingjing
Unlinkable Delegation of WebAuthn Credentials 2022 Frymann, Nick
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations 2022 Reynolds, Joshua
Protocols for a Two-Tiered Trusted Computing Base 2022 Moreira, José
SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference 2022 Zhu, Wenxing
Using Memristor Arrays as Physical Unclonable Functions 2022 Frank, Florian
From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks 2022 Amro, Ahmed
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection 2022 Cardaioli, Matteo
MixCT: Mixing Confidential Transactions from Homomorphic Commitment 2022 Du, Jiajun
Efficient Proofs of Knowledge for Threshold Relations 2022 Avitabile, Gennaro
Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names 2022 Liu, Mingxuan
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations 2022 Blass, Erik-Oliver
Long-Short History of Gradients Is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning 2022 Gupta, Ashish
Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems 2022 Fung, Clement
Towards Efficient Auditing for Real-Time Systems 2022 Bansal, Ayoosh
Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks 2022 Rasoamanana, Aina Toky
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks 2022 Groza, Bogdan
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps 2022 Borzacchiello, Luca
Extensible Virtual Call Integrity 2022 Jiang, Yuancheng
The Devil Is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models 2022 Rawat, Ambrish
Alle Artikel auflisten