Nitesh Saxena

Nitesh Saxena. Professor
University Hall 4145
(205) 975-3432

Research and Teaching Interests: All Aspects of Information Assurance with Emphasis on: Computer and Network Security, Wireless and Mobile Device Security, Usable Security, Privacy, and Applied Cryptography

Office Hours: By appointment


  • B.S., Indian Institute of Technology (IIT), Kharagpur, India, Mathematics and Computing
  • M.S., University of California, Santa Barbara, Computer Science
  • Ph.D., University of California, Irvine, Information and Computer Science

Personal Website

Nitesh Saxena is the founding director of the Security and Privacy in Emerging Systems (SPIES) group/lab. He works in the broad areas of computer and network security, and applied cryptography, with a keen interest in wireless and mobile device security, and the emerging field of usable security.

Saxena’s current research has been externally supported by multiple grants from NSF, and by gifts/awards/donations from the industry, including Google (2 Google Faculty Research awards), Cisco, Comcast, Intel, Nokia and Research in Motion. He has published over 90 journal, conference, and workshop papers, many at top-tier venues in Computer Science, including: IEEE Transactions, ISOC NDSS, ACM CCS, ACM WiSec, ACM CHI, ACM Ubicomp, IEEE Percom, IEEE ICME and IEEE S&P. His work has won the Distinguished Paper Award at NDSS 2014.

On the educational/service front, Saxena currently serves as a co-director of the MS program in Computer Forensics and Security Management. He was also the principal architect and a co-director of the M.S. program in Cyber-Security at the Polytechnic Institute of New York University (NYU-Poly). Saxena has instructed over a dozen core fundamental courses in Computer Science, including Computer Security, Network Security, Modern Cryptography, and Discrete Structures. Saxena has also advised and graduated numerous graduate (Ph.D. and M.S.) and undergraduate students as well as a few high school students. He is serving as an Associate Editor for flagship security journals, IEEE Transactions on Information Forensics and Security (TIFS), and Springer’s International Journal of Information Security (IJIS). Saxena’s work has received extensive media coverage, for example, at NBC, MSN, Fox, Discovery, ABC, Bloomberg, ZDNet, ACM TechNews, Yahoo! Finance, Communications of ACM, Yahoo News, CNBC, Slashdot, Computer World, Science Daily, and Motherboard.

Before joining UAB, Saxena was an Assistant Professor in the Department of Computer Science and Engineering at NYU-Poly. He has also previously worked at Nokia Research Center, Finland, and at INRIA Rhone-Alpes, France.

Download CV

All aspects of information assurance with emphasis on computer and network security, mobile and wireless device security, usable security, privacy, and applied cryptography.
  • O. Huhta, P. Shrestha, S. Udar, M. Juuti, N. Saxena, and N. Asokan. February 2016. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. In the Network and Distributed System Security Symposium (NDSS).
  • A. Neupane, Md. Lutfor Rahman, Nitesh Saxena, and Leanne Hirshfield. 2015. A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings. In ACM Conference on Computer and Communications Security (CCS).
  • M. Shirvanian and N. Saxena. 2014. Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones. In ACM Conference on Computer and Communications Security (CCS).
  • A. Neupane, N. Saxena, K. Kuruvilla, M. Georgescu, and R. Kana. 2014. Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings. In the Network and Distributed System Security Symposium (NDSS).
  • M. Shirvanian, S. Jarecki, N. Saxena, and N. Nathan. 2014. Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices. In the Network and Distributed System Security Symposium (NDSS).
  • A. Bagherzandi, S. Jarecki, N. Saxena, and Y. Liu. 2011. Password-Protected Secret Sharing. In ACM Conference on Computer and Communications Security (CCS), 433-444.
  • T. Halevi and N. Saxena. 2010. On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels: The Case of Acoustic Eavesdropping. ACM Conference on Computer and Communications Security (CCS), 97-108.
  • N. Saxena, J. Ekberg, K. Kostiainen, and N. Asokan. 2006. Secure Device Pairing based on Visual Channel. In IEEE Symposium on Security and Privacy (S&P), Oakland, 306-13.
  • Distinguished Paper Award at NDSS 2014, the Network and Distributed System Security Symposium
  • Comcast Tech Research and Development Award, 2014
  • Google Faculty Research Award, 2013
  • The Kevin and Jo Ann Reilly Endowed Award (UAB, CIS), 2012. The award recognizes an outstanding member of the faculty in the department
  • Google Faculty Research Award, 2011
  • Best Student Paper Award, Applied Cryptography and Network Security Conference (ACNS), 2006