フォロー
Riccardo Spolaor
Riccardo Spolaor
School of Computer Science and Technology, Shandong University, Qingdao campus
確認したメール アドレス: sdu.edu.cn - ホームページ
タイトル
引用先
引用先
Robust smartphone app identification via encrypted network traffic analysis
VF Taylor, R Spolaor, M Conti, I Martinovic
IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017
4162017
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
VF Taylor, R Spolaor, M Conti, I Martinovic
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016
3852016
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
3102015
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis
M Conti, LV Mancini, R Spolaor, NV Verde
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
1542015
The Dark Side (-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
M Conti, QQ Li, A Maragno, R Spolaor
IEEE Communications Surveys & Tutorials 20 (4), 2018
1252018
On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks
VD Stanciu, R Spolaor, M Conti, C Giuffrida
proceedings of the sixth ACM conference on data and application security and …, 2016
642016
Covert lie detection using keyboard dynamics
M Monaro, C Galante, R Spolaor, QQ Li, L Gamberini, M Conti, G Sartori
Scientific reports 8 (1), 1976, 2018
542018
Survivalism: Systematic analysis of windows malware living-off-the-land
F Barr-Smith, X Ugarte-Pedrero, M Graziano, R Spolaor, I Martinovic
2021 IEEE Symposium on Security and Privacy (SP), 1557-1574, 2021
532021
No free charge theorem: A covert channel via usb charging cable on mobile devices
R Spolaor, L Abudahi, V Moonsamy, M Conti, R Poovendran
Applied Cryptography and Network Security: 15th International Conference …, 2017
502017
Biometric authentication methods on smartphones: A survey.
R Spolaor, QQ Li, M Monaro, M Conti, L Gamberini, G Sartori
PsychNology Journal, 2016
462016
Mind the plug! Laptop-user recognition through power consumption
M Conti, M Nati, E Rotundo, R Spolaor
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and …, 2016
452016
Accear: Accelerometer acoustic eavesdropping with unconstrained vocabulary
P Hu, H Zhuang, PS Santhalingam, R Spolaor, P Pathak, G Zhang, ...
2022 IEEE Symposium on Security and Privacy (SP), 1757-1773, 2022
382022
Malalert: Detecting malware in large-scale network traffic using statistical features
M Piskozub, R Spolaor, I Martinovic
ACM SIGMETRICS Performance Evaluation Review 46 (3), 151-154, 2019
372019
CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery
M Conti, C Guarisco, R Spolaor
Applied Cryptography and Network Security: 14th International Conference …, 2016
372016
BOTection: Bot detection by building Markov Chain models of bots network behavior
BA Alahmadi, E Mariconti, R Spolaor, G Stringhini, I Martinovic
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
252020
mmEcho: A mmWave-based Acoustic Eavesdropping Method
P Hu, W Li, R Spolaor, X Cheng
2023 IEEE Symposium on Security and Privacy (S&P), 1840-1856, 2023
242023
DELTA: Data Extraction and Logging Tool for Android
R Spolaor, E Dal Santo, M Conti
IEEE Transactions on Mobile Computing 17 (6), 1289-1302, 2018
232018
USB powered devices: A survey of side-channel threats and countermeasures
H Liu, R Spolaor, F Turrin, R Bonafede, M Conti
High-Confidence Computing 1 (1), 100007, 2021
212021
Type me the truth! detecting deceitful users via keystroke dynamics
M Monaro, R Spolaor, QQ Li, M Conti, L Gamberini, G Sartori
Proceedings of the 12th international conference on availability …, 2017
212017
Mirage: Toward a stealthier and modular malware analysis sandbox for android
L Bordoni, M Conti, R Spolaor
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
212017
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20