On limitations of friendly jamming for confidentiality NO Tippenhauer, L Malisa, A Ranganathan, S Capkun 2013 IEEE symposium on security and privacy, 160-173, 2013 | 111 | 2013 |
Detecting mobile application spoofing attacks by leveraging user visual similarity perception L Malisa, K Kostiainen, S Capkun Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 66 | 2017 |
Mobile application impersonation detection using dynamic user interface extraction L Malisa, K Kostiainen, M Och, S Capkun Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 32 | 2016 |
Enforcing location and time-based access control on cloud-stored data E Androulaki, C Soriente, L Malisa, S Capkun 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 31 | 2014 |
Multichannel protocols for user-friendly and scalable initialization of sensor networks T Perković, I Stančić, L Mališa, M Čagalj Security and Privacy in Communication Networks: 5th International ICST …, 2009 | 8 | 2009 |
Using hover to compromise the confidentiality of user input on android E Ulqinaku, L Malisa, J Stefa, A Mei, S Čapkun Proceedings of the 10th acm conference on security and privacy in wireless …, 2017 | 6 | 2017 |
Teaching Authentication in High Schools: Challenges and Lessons Learned E Stobert, E Cavar, L Malisa, D Sommer 2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017 | 6 | 2017 |
Security of User Interfaces: Attacks and Countermeasures L Malisa ETH Zurich, 2017 | 3 | 2017 |
Deniable upload and download via passive participation D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019 | 2 | 2019 |
Hacking in the blind:(almost) invisible runtime user interface attacks L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 2 | 2017 |
CoverUp: Privacy Through" Forced" Participation in Anonymous Communication Networks D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun Cryptology ePrint Archive, 2017 | 2 | 2017 |
Technical Report: Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception L Malisa | 2 | 2015 |
Teaching authentication as a life skill E Stobert, E Cavar, L Malisa, D Sommer IEEE Security & Privacy 16 (5), 82-85, 2018 | 1 | 2018 |
Hacking in the blind:(almost) invisible runtime ui attacks on safety-critical terminals L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun arXiv preprint arXiv:1604.04723, 2016 | 1 | 2016 |
Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android. E Ulqinaku, L Malisa, J Stefa, A Mei, S Capkun CoRR, 2016 | | 2016 |
Hacking in the Blind L Malisa | | |