ACM Computer and Communications Security, CCS 2014


Article Details
Title: Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones
Article URLs:
Alternative Article URLs:
Authors: Maliheh Shirvanian
  • University of Alabama at Birmingham
Nitesh Saxena
  • University of Alabama at Birmingham
Sharing: Unknown
Verification: Authors have not verified information
Artifact Evaluation Badge: none
Artifact URLs:
Artifact Correspondence Email Addresses:
NSF Award Numbers:
DBLP Key: conf/ccs/ShirvanianS14
Author Comments:

Discuss this paper and its artifacts below