Login / Signup
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones.
Maliheh Shirvanian
Nitesh Saxena
Published in:
CCS (2014)
Keyphrases
</>
security protocols
mobile phone
countermeasures
security mechanisms
traffic analysis
advanced encryption standard
reinforcement learning
malicious attacks
malicious users
computer security
digital signature
text to speech
terrorist attacks
security threats
cryptographic algorithms
chosen plaintext