Payas Gupta
Payas Gupta
Senior Research Scientist at Pindrop
Verified email at pindrop.com - Homepage
Title
Cited by
Cited by
Year
I Can Be You: Questioning the Use of Keystroke Dynamics as Biometrics
CM Tey, P Gupta, D GAO
The 20th Annual Network & Distributed System, 2013
672013
Phoneypot: Data-driven Understanding of Telephony Threats
P Gupta, B Srinivasan, V Balasubramaniyan, M Ahamad
Proceedings of the 20th Annual Network & Distributed System Security …, 2015
562015
Call authentication using call forwarding
P GUPTA, D Dewey
US Patent App. 10/375,248, 2019
42*2019
Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon
Computers & Security, 2016
422016
SoK: Fraud in Telephony Networks
M Sahin, A Francillon, P Gupta, M Ahamad
Security and Privacy (EuroS&P), 2017 IEEE European Symposium on, 235-250, 2017
382017
MobiPot: Understanding Mobile Telephony Threats with Honeycards
M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
252016
Fighting coercion attacks in key generation using skin conductance
P Gupta, D Gao
Proceedings of the 19th USENIX conference on Security, 30-30, 2010
222010
Your love is public now: questioning the use of personal information in authentication
P Gupta, S Gottipati, J Jiang, D Gao
Proceedings of the 8th ACM symposium on Information, computer and …, 2013
182013
OTO: Online Trust Oracle for User-Centric Trust Establishment.
THJ KIM, P GUPTA, J HAN, E Owusu, J Hong, A Perrig, D GAO
Proceedings of the 19th ACM Conference on Computer and Communications …, 2012
142012
HuMan: Creating Memorable Fingerprints of Mobile Users
P Gupta, TK Wee, N Ramasubbu, D Lo, D Gao, RK Balan
142012
Fortifying Android Patterns using Persuasive Security Framework
H Siadati, P Gupta, S Smith, N Memon, M Ahamad
UBICOMM 2015, 81, 2015
132015
Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks
S Gupta, P Gupta, M Ahamad, P Kumaraguru
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016
102016
Call authentication using call forwarding
P GUPTA, D Dewey
US Patent App. 10/027,816, 2018
9*2018
Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam
P Gupta, R Perdisci, M Ahamad
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
92018
Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks
S Gupta, P Gupta, M Ahamad, P Kumaraguru
arXiv preprint arXiv:1512.07330, 2015
92015
M3AAWG telephony honeypots: benefits and deployment options
P Gupta, M Ahamad, J Curtis, V Balasubramaniyan, A Bobotek
Technical report, 2014
92014
Keystroke Timing Analysis of on-the-fly Web Apps.
CM Tey, P Gupta, D GAO, Y Zhang
11th International Conference on Applied Cryptography and Network Security …, 2013
82013
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
B Srinivasan, P Gupta, M Antonakakis, M Ahamad
European Symposium on Research in Computer Security, 3-26, 2016
72016
Towards Measuring the Effectiveness of Telephony Blacklists
S Pandit, R Perdisci, M Ahamad, P Gupta
7*
Coercion Resistance in Authentication Responsibility Shifting
P Gupta, X Ding, D Gao
62012
The system can't perform the operation now. Try again later.
Articles 1–20