selected publications academicarticle Shi, C., Wang, Y., Chen, Y. J., & Saxena, N. (2021). Authentication of Voice Commands by Leveraging Vibrations in Wearables. IEEE Security and Privacy. 19(6), 83-92. Gao, S., Mohamed, M., Saxena, N., & Zhang, C. (2019). Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures. IEEE Transactions on Dependable and Secure Computing. 16(6), 1040-1053. Shirvanian, M., Saxena, N., Jarecki, S., & Krawczyk, H. (2019). Building and Studying a Password Store that Perfectly Hides Passwords from Itself. IEEE Transactions on Dependable and Secure Computing. 16(5), 770-782. Anand, S. A., & Saxena, N. (2019). Noisy Vibrational Pairing of IoT Devices. 16(3), 530-545. Shrestha, B., Saxena, N., Truong, H., & Asokan, N. (2019). Sensor-Based Proximity Detection in the Face of Active Adversaries. IEEE Transactions on Mobile Computing. 18(2), 444-457. Mohamed, M., Shrestha, B., & Saxena, N. (2017). SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. IEEE Transactions on Information Forensics and Security. 12(4), 901-913. Neupane, A., Saxena, N., Maximo, J. O., & Kana, R. (2016). Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings. IEEE Transactions on Information Forensics and Security. 11(9), 1970-1983. Shrestha, B., Ma, D. i., Zhu, Y., Li, H., & Saxena, N. (2015). Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. IEEE Transactions on Information Forensics and Security. 10(11), 2270-2283. Halevi, T., Li, H., Ma, D. i., Saxena, N., Voris, J., & Xiang, T. (2013). Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks. IEEE Transactions on Emerging Topics in Computing. 1(2), 307-318. Halevi, T., & Saxena, N. (2013). Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing. IEEE Transactions on Information Forensics and Security. 8(3), 563-577. Ma, D. i., Saxena, N., Xiang, T., & Zhu, Y. (2013). Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing. IEEE Transactions on Dependable and Secure Computing. 10(2), 57-69. Perkovic, T., Cagalj, M., Mastelic, T., Saxena, N., & Begusic, D. (2012). Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User. 11(2), 337-351. Saxena, N., Ekberg, J., Kostiainen, K., & Asokan, N. (2011). Secure Device Pairing Based on a Visual Channel: Design and Usability Study. IEEE Transactions on Information Forensics and Security. 6(1), 28-38. Jarecki, S., & Saxena, N. (2010). On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol. 5(4), 739-749. Saxena, N., & Yi, J. H. (2009). Noninteractive Self-Certification for Long-Lived Mobile Ad Hoc Networks. IEEE Transactions on Information Forensics and Security. 4(4), 946-955. Saxena, N., Tsudik, G., & Yi, J. H. (2009). Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. 20(2), 158-170. conference paper Prakash, J., Yu, C., Thombre, T. R., Bytes, A., Jubur, M., Saxena, N., ... Quek, T. (2021). Countering Concurrent Login Attacks in Just Tap Push-based Authentication: A Redesign and Usability Evaluations. 21-36. Shrestha, P., Saxena, N., Shukla, D., & Phoha, V. V. (2021). Press ${@}{$}{@}{$}$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures. 71-87. Neupane, A., Satvat, K., Hosseini, M., & Saxena, N. (2019). Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information. 2019 17th International Conference on Privacy, Security and Trust (PST). 1-10. Anand, S. A., Walker, P., & Saxena, N. (2019). Compromising Speech Privacy under Continuous Masking in Personal Spaces. 2019 17th International Conference on Privacy, Security and Trust (PST). 1-10. Shirvanian, M., Vo, S., & Saxena, N. (2019). Quantifying the Breakability of Voice Assistants. 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom. 1-11. Shirvanian, M., & Saxena, N. (2019). Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations. 2019 17th International Conference on Privacy, Security and Trust (PST). 1-10. Shrestha, B., Mohamed, M., & Saxena, N. (2019). ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics. 2019 17th International Conference on Privacy, Security and Trust (PST). 1-10. Neupane, A., Saxena, N., Hirshfield, L., & Bratt, S. E. (2019). The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection Shrestha, P., Shrestha, B., & Saxena, N. (2018). Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity. 1-9. Anand, S. A., & Saxena, N. (2018). Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors. 1000-1017. Shirvanian, M., Jarecki, S., Krawczyk, H., & Saxena, N. (2017). SPHINX: A Password Store that Perfectly Hides Passwords from Itself. Distributed Computing Systems. 1094-1104. Shrestha, B., Mohamed, M., Borg, A., Saxena, N., & Tamrakar, S. (2015). Curbing Mobile Malware Based on User-Transparent Hand Movements. 221-229. Truong, H., Gao, X., Shrestha, B., Saxena, N., Asokan, N., & Nurmi, P. (2014). Comparing and Fusing Different Sensor Modalities for Relay Attack Resistance in Zero-Interaction Authentication. 163-171. Gao, S., Mohamed, M., Saxena, N., & Zhang, C. (2014). Gaming the Game: Defeating a Game Captcha with Efficient and Robust Hybrid Attacks. Proceedings / IEEE International Conference on Multimedia and Expo. IEEE International Conference on Multimedia and Expo. 1-6. Dey, R., Tang, C., Ross, K., & Saxena, N. (2012). Estimating Age Privacy Leakage in Online Social Networks. IEEE Infocom. Proceedings. 2836-2840. Halevi, T., Lin, S., Ma, D. i., Prasad, A. K., Saxena, N., Voris, J., & Xiang, T. (2012). Sensing-Enabled Defenses to RFID Unauthorized Reading and Relay Attacks without Changing the Usage Model. 227-234. Gallego, A., Saxena, N., & Voris, J. (2011). Playful Security: A Computer Game for Secure Wireless Device Pairing. 177-184. Saxena, N., Uddin, M. B., Voris, J., & Asokan, N. (2011). Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags. 181-188. Wu, D. i., Tang, C., Dhungel, P., Saxena, N., & Ross, K. W. (2010). On the Privacy of Peer-Assisted Distribution of Security Patches. 1-10. A. Kumar, .., N. Saxena, .., G. Tsudik, .., & E. Uzun. (2009). Caveat eptor: A comparative study of secure device pairing methods. 1-10. Karole, A., & Saxena, N. (2009). Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison. 2009 International Conference on Network-Based Information Systems. 273-278. Saxena, N., & Voris, J. (2008). Pairing Devices with Good Quality Output Interfaces. 2008 The 28th International Conference on Distributed Computing Systems Workshops. 382-387. Saxena, N., Ekberg, J., Kostiainen, K., & Asokan, N. (2006). Secure Device Pairing based on a Visual Channel (Short Paper)**Full version of this paper is available at [5]. 1-6. Saxena, N., Tsudik, G., & Yi, J. H. (2004). Access Control in Ad Hoc Groups. 2-7.
teaching activities CSCE465 Comp & Net Security Instructor CSCE491 Hnr-research Instructor CSCE491 Hnr-research Instructor CSCE685 Directed Studies Instructor CSCE689 Sptp: Network Security Instructor CSCE691 Research Instructor CSCE765 Network Security Instructor
education and training Ph.D. in Information and Computer Science, University of California, Irvine - (Irvine, California, United States) 2006