Robust smartphone app identification via encrypted network traffic analysis VF Taylor, R Spolaor, M Conti, I Martinovic IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017 | 378 | 2017 |
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic VF Taylor, R Spolaor, M Conti, I Martinovic 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016 | 354 | 2016 |
Analyzing android encrypted network traffic to identify user actions M Conti, LV Mancini, R Spolaor, NV Verde IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015 | 298 | 2015 |
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis M Conti, LV Mancini, R Spolaor, NV Verde Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 144 | 2015 |
The Dark Side (-Channel) of Mobile Devices: A Survey on Network Traffic Analysis M Conti, QQ Li, A Maragno, R Spolaor IEEE Communications Surveys & Tutorials 20 (4), 2018 | 118 | 2018 |
On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks VD Stanciu, R Spolaor, M Conti, C Giuffrida proceedings of the sixth ACM conference on data and application security and …, 2016 | 61 | 2016 |
Covert lie detection using keyboard dynamics M Monaro, C Galante, R Spolaor, QQ Li, L Gamberini, M Conti, G Sartori Scientific reports 8 (1), 1976, 2018 | 51 | 2018 |
No free charge theorem: A covert channel via usb charging cable on mobile devices R Spolaor, L Abudahi, V Moonsamy, M Conti, R Poovendran Applied Cryptography and Network Security: 15th International Conference …, 2017 | 48 | 2017 |
Survivalism: Systematic analysis of windows malware living-off-the-land F Barr-Smith, X Ugarte-Pedrero, M Graziano, R Spolaor, I Martinovic 2021 IEEE Symposium on Security and Privacy (SP), 1557-1574, 2021 | 47 | 2021 |
Biometric authentication methods on smartphones: A survey. R Spolaor, QQ Li, M Monaro, M Conti, L Gamberini, G Sartori PsychNology Journal, 2016 | 43 | 2016 |
Mind the plug! Laptop-user recognition through power consumption M Conti, M Nati, E Rotundo, R Spolaor Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and …, 2016 | 40 | 2016 |
Malalert: Detecting malware in large-scale network traffic using statistical features M Piskozub, R Spolaor, I Martinovic ACM SIGMETRICS Performance Evaluation Review 46 (3), 151-154, 2019 | 36 | 2019 |
CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery M Conti, C Guarisco, R Spolaor Applied Cryptography and Network Security: 14th International Conference …, 2016 | 35 | 2016 |
Accear: Accelerometer acoustic eavesdropping with unconstrained vocabulary P Hu, H Zhuang, PS Santhalingam, R Spolaor, P Pathak, G Zhang, ... 2022 IEEE Symposium on Security and Privacy (SP), 1757-1773, 2022 | 27 | 2022 |
DELTA: Data Extraction and Logging Tool for Android R Spolaor, E Dal Santo, M Conti IEEE Transactions on Mobile Computing 17 (6), 1289-1302, 2018 | 23 | 2018 |
BOTection: Bot detection by building Markov Chain models of bots network behavior BA Alahmadi, E Mariconti, R Spolaor, G Stringhini, I Martinovic Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 20 | 2020 |
Type me the truth! detecting deceitful users via keystroke dynamics M Monaro, R Spolaor, QQ Li, M Conti, L Gamberini, G Sartori Proceedings of the 12th international conference on availability …, 2017 | 19 | 2017 |
Mirage: Toward a stealthier and modular malware analysis sandbox for android L Bordoni, M Conti, R Spolaor Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 19 | 2017 |
Dart: Detecting unseen malware variants using adaptation regularization transfer learning H Li, Z Chen, R Spolaor, Q Yan, C Zhao, B Yang ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 17 | 2019 |
mmEcho: A mmWave-based Acoustic Eavesdropping Method P Hu, W Li, R Spolaor, X Cheng 2023 IEEE Symposium on Security and Privacy (S&P), 1840-1856, 2023 | 16 | 2023 |