What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mauro Conti
Google Scholar
ORCID:
0000-0002-3612-1934
160
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection.
Ying Yuan
Giovanni Apruzzese
Mauro Conti
2025
journals/istr
Through the static: Demystifying malware visualization via explainability.
Matteo Brosolo
Vinod P.
Mauro Conti
2025
journals/istr
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning.
Jiaxin Li
Marco Arazzi
Antonino Nocera
Mauro Conti
2025
journals/istr
DroidTTP: Mapping android applications with TTP for Cyber Threat Intelligence.
Dincy R. Arikkat
P. Vinod
Rafidha Rehiman K. A.
Serena Nicolazzo
Marco Arazzi
Antonino Nocera
Mauro Conti
2025
journals/popets
Topology-Based Reconstruction Prevention for Decentralised Learning.
Florine W. Dekker
Zekeriya Erkin
Mauro Conti
2025
conf/acns
CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations.
Denis Donadel
Kavya Balasubramanian
Alessandro Brighente
Bhaskar Ramasubramanian
Mauro Conti
Radha Poovendran
2025
conf/acns
Opening Pandora's Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing.
Enrico Bassetti
Edoardo Di Paolo
Francesco Drago
Mauro Conti
Angelo Spognardi
2025
conf/acns
The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach.
Giacomo Benedetti
Serena Cofano
Alessandro Brighente
Mauro Conti
2025
conf/ndss
Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead.
Yizhong Liu
Andi Liu
Yuan Lu
Zhuocheng Pan
Yinuo Li
Jianwei Liu
Song Bian
Mauro Conti
2025
conf/ndss
Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors.
Derin Cayir
Reham Mohamed Aburas
Riccardo Lazzeretti
Marco Angelini
Abbas Acar
Mauro Conti
Z. Berkay Celik
A. Selcuk Uluagac
2025
conf/dsn
ATTAQ: Adversarial Robustness of Quantum Machine Learning.
Francesco Marchiori
Mauro Conti
2025
conf/dsn
Leaving No Blind Spots: Toward Automotive Cybersecurity.
Francesco Marchiori
Mauro Conti
2025
conf/eurosp
O'MINE: A Novel Collaborative DDoS Detection Mechanism for Programmable Data-Planes.
Enkeleda Bardhi
Chenxing Ji
Ali Imran
Muhammad Shahbaz
Riccardo Lazzeretti
Mauro Conti
Fernando Kuipers
2025
conf/eurosp
Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data.
Tommaso Bianchi
Alessandro Brighente
Mauro Conti
Andrea Valori
2025
conf/eurosp
Endless Subscriptions: Open RAN is Open to RIC E2 Subscription Denial of Service Attacks.
Felix Klement
Alessandro Brighente
Anup Kiran Bhattacharjee
Stefano Cecconello
Fernando Kuipers
Georgios Smaragdakis
Mauro Conti
Stefan Katzenbeisser
2025
conf/eurosp
Are You Sure That is Secure? Assessing Organizations Security Readiness Via a Devsecops Maturity Model.
Alessandro Brighente
Elisa Burato
Mauro Conti
2025
journals/tifs
Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing.
Meng Li
Hanni Ding
Yifei Chen
Yan Qiao
Zijian Zhang
Liehuang Zhu
Mauro Conti
2025
conf/asiaccs
AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks.
Tannishtha Devgun
Gulshan Kumar
Rahul Saha
Alessandro Brighente
Mauro Conti
2025
conf/esorics
GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness Through Tailored Conditional GAN Augmentation.
Jiali Xu
Shuo Wang
Valeria Loscrì
Alessandro Brighente
Mauro Conti
Romain Rouvoy
2025
conf/esorics
KeTS: Kernel-Based Trust Segmentation Against Model Poisoning Attacks.
Ankit Gangwal
Mauro Conti
Tommaso Pauselli
2025
conf/esorics
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?
Francesco Marchiori
Marco Alecci
Luca Pajola
Mauro Conti
2025
conf/esorics
The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment.
Eduard Marin
Jinwoo Kim
Alessio Pavoni
Mauro Conti
Roberto Di Pietro
2025
conf/esorics
Membership Privacy Evaluation in Deep Spiking Neural Networks.
Jiaxin Li
Gorka Abad
Stjepan Picek
Mauro Conti
2025
conf/icics
Artemis: Decentralized, Secure, and Efficient Safety Monitoring with Dynamic Trajectories.
Meng Li
Zhuangwei Li
Yifei Chen
Yan Qiao
Mauro Conti
2025
conf/uss
Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV.
Jelle Vos
Mauro Conti
Zekeriya Erkin
2025
journals/tifs
Trust in a Decentralized World: Data Governance From Faithful, Private, Verifiable, and Traceable Data Feeds.
Meng Li
Yifei Chen
Yan Qiao
Guixin Ye
Zijian Zhang
Liehuang Zhu
Mauro Conti
2025
journals/tifs
Channel-Robust RF Fingerprint Identification for Multi-Antenna 5G User Equipments.
Hongyi Luo
Guyue Li
Alessandro Brighente
Mauro Conti
Yuexiu Xing
Aiqun Hu
Xianbin Wang
2024
journals/compsec
OSTIS: A novel Organization-Specific Threat Intelligence System.
Dincy R. Arikkat
P. Vinod
Rafidha Rehiman K. A.
Serena Nicolazzo
Antonino Nocera
Georgiana Timpau
Mauro Conti
2024
conf/uss
Privacy-Preserving Data Aggregation with Public Verifiability Against Internal Adversaries.
Marco Palazzo
Florine W. Dekker
Alessandro Brighente
Mauro Conti
Zekeriya Erkin
2024
conf/uss
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors.
Qingying Hao
Nirav Diwan
Ying Yuan
Giovanni Apruzzese
Mauro Conti
Gang Wang
2024
conf/acisp
Threshold Signatures with Private Accountability via Secretly Designated Witnesses.
Meng Li
Hanni Ding
Qing Wang
Zijian Zhang
Mauro Conti
2024
conf/sp
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model.
Jelle Vos
Mauro Conti
Zekeriya Erkin
2024
conf/acns
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices.
Edoardo Liberati
Alessandro Visintin
Riccardo Lazzeretti
Mauro Conti
A. Selcuk Uluagac
2024
conf/acns
One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection.
Alessandro Brighente
Mauro Conti
Sitora Salaeva
Federico Turrin
2024
conf/eurosp
Hyperloop: A Cybersecurity Perspective.
Alessandro Brighente
Mauro Conti
Denis Donadel
Federico Turrin
2024
conf/eurosp
Work-in-Progress: Crash Course: Can (Under Attack) Autonomous Driving Beat Human Drivers?
Francesco Marchiori
Alessandro Brighente
Mauro Conti
2024
conf/esorics
RedactBuster: Entity Type Recognition from Redacted Documents.
Mirco Beltrame
Mauro Conti
Pierpaolo Guglielmin
Francesco Marchiori
Gabriele Orazi
2024
conf/esorics
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction.
Emad Efatinasab
Alessandro Brighente
Mirco Rampazzo
Nahal Azadi
Mauro Conti
2024
conf/wisec
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles.
Tommaso Bianchi
Alessandro Brighente
Mauro Conti
2024
conf/wisec
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems.
Francesco Marchiori
Mauro Conti
2024
conf/wisec
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models.
Coen Schoof
Stefanos Koffas
Mauro Conti
Stjepan Picek
2024
conf/wisec
Backdoors on Manifold Learning.
Christina Kreza
Stefanos Koffas
Behrad Tajalli
Mauro Conti
Stjepan Picek
2023
journals/compsec
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things.
PLS Jayalaxmi
Rahul Saha
Gulshan Kumar
Mamoun Alazab
Mauro Conti
Xiaochun Cheng
2023
journals/popets
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning.
Mohamad Mansouri
Melek Önen
Wafa Ben Jaballah
Mauro Conti
2023
conf/ccs
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication.
Francesco Marchiori
Mauro Conti
2023
conf/ccs
Turning Privacy-preserving Mechanisms against Federated Learning.
Marco Arazzi
Mauro Conti
Antonino Nocera
Stjepan Picek
2023
conf/acns
If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps.
Federico Carboni
Mauro Conti
Denis Donadel
Mariano Sciacco
2023
conf/acns
Social Honeypot for Humans: Luring People Through Self-managed Instagram Pages.
Sara Bardi
Mauro Conti
Luca Pajola
Pier Paolo Tricomi
2023
conf/eurosp
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks.
Andrea Agiollo
Enkeleda Bardhi
Mauro Conti
Riccardo Lazzeretti
Eleonora Losiouk
Andrea Omicini
2023
conf/esorics
HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments.
Massimiliano Baldo
Tommaso Bianchi
Mauro Conti
Alessio Trevisan
Federico Turrin
2023
conf/esorics
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network.
Victoria Bull
Niclas Finne
Andrea Agiollo
Pallavi Kaliyar
Luca Pajola
Thiemo Voigt
Mauro Conti
2023
conf/wisec
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.
Alessandro Lotto
Vaibhav Singh
Bhaskar Ramasubramanian
Alessandro Brighente
Mauro Conti
Radha Poovendran
2023
conf/wisec
E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem.
Marco Casagrande
Riccardo Cestaro
Eleonora Losiouk
Mauro Conti
Daniele Antonioli
2022
journals/tches
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem.
Marco Casagrande
Eleonora Losiouk
Mauro Conti
Mathias Payer
Daniele Antonioli
2022
journals/compsec
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents.
Vasilios Koutsokostas
Nikolaos Lykousas
Theodoros Apostolopoulos
Gabriele Orazi
Amrita Ghosal
Fran Casino
Mauro Conti
Constantinos Patsakis
2022
journals/compsec
A few-shot malware classification approach for unknown family recognition using malware feature visualization.
Mauro Conti
Shubham Khandhar
Vinod P.
2022
journals/compsec
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
Ankur O. Bang
Udai Pratap Rao
Andrea Visconti
Alessandro Brighente
Mauro Conti
2022
journals/istr
Obfuscation detection in Android applications using deep learning.
Mauro Conti
P. Vinod
Alessio Vitella
2022
journals/istr
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
Milad Taleby Ahvanooey
Mark Xuefang Zhu
Wojciech Mazurczyk
Qianmu Li
Max Kilger
Kim-Kwang Raymond Choo
Mauro Conti
2022
conf/ccs
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks.
Mauro Conti
Jiaxin Li
Stjepan Picek
Jing Xu
2022
conf/uss
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand.
Matteo Cardaioli
Stefano Cecconello
Mauro Conti
Simone Milani
Stjepan Picek
Eugen Saraci
2022
conf/sp
Face Recognition Systems: Are you sure they only consider your face?
Pavan Srihari Darbha
Mauro Conti
Eleonora Losiouk
Rajib Ranjan Maiti
2022
conf/acns
HolA: Holistic and Autonomous Attestation for IoT Networks.
Alessandro Visintin
Flavio Toffalini
Eleonora Losiouk
Mauro Conti
Jianying Zhou
2022
conf/esorics
EVExchange: A Relay Attack on Electric Vehicle Charging System.
Mauro Conti
Denis Donadel
Radha Poovendran
Federico Turrin
2022
conf/esorics
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection.
Matteo Cardaioli
Mauro Conti
Arpita Ravindranath
2022
conf/esorics
Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions.
Adriaan de Vos
Alessandro Brighente
Mauro Conti
2022
conf/esorics
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads.
Kiran S. Balagani
Matteo Cardaioli
Stefano Cecconello
Mauro Conti
Gene Tsudik
2022
conf/ndss
Building Embedded Systems Like It's 1996.
Ruotong Yu
Francesca Del Nin
Yuchen Zhang
Shan Huang
Pallavi Kaliyar
Sarah Zakto
Mauro Conti
Georgios Portokalidis
Jun Xu
2022
conf/ndss
EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation.
Jinwoo Kim
Eduard Marin
Mauro Conti
Seungwon Shin
2022
conf/icics
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud.
Meng Li
Mingwei Zhang
Jianbo Gao
Chhagan Lal
Mauro Conti
Mamoun Alazab
2022
conf/acsac
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning.
Giovanni Apruzzese
Mauro Conti
Ying Yuan
2022
conf/wisec
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers.
Stefanos Koffas
Jing Xu
Mauro Conti
Stjepan Picek
2022
conf/cans
Analyzing Price Deviations in DeFi Oracles.
Ankit Gangwal
Rahul Valluri
Mauro Conti
2021
journals/compsec
Vulnerabilities in Android webview objects: Still not the end!
Mohamed A. El-Zawawy
Eleonora Losiouk
Mauro Conti
2021
conf/sp
Improving Password Guessing via Representation Learning.
Dario Pasquini
Ankit Gangwal
Giuseppe Ateniese
Massimo Bernaschi
Mauro Conti
2021
conf/acns
SnakeGX: A Sneaky Attack Against SGX Enclaves.
Flavio Toffalini
Mariano Graziano
Mauro Conti
Jianying Zhou
2021
conf/eurosp
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack.
Luca Pajola
Mauro Conti
2021
conf/esorics
The Rise of ICS Malware: A Comparative Analysis.
Yassine Mekdad
Giuseppe Bernieri
Mauro Conti
Abdeslam El Fergougui
2021
conf/esorics
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand.
Alessandro Brighente
Mauro Conti
Izza Sadaf
2021
conf/esorics
Secure Static Content Delivery for CDN Using Blockchain Technology.
Mauro Conti
P. Vinod
Pier Paolo Tricomi
2021
conf/acsac
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization.
Antonio Ruggia
Eleonora Losiouk
Luca Verderame
Mauro Conti
Alessio Merlo
2021
conf/wisec
FADIA: fairness-driven collaborative remote attestation.
Mohamad Mansouri
Wafa Ben Jaballah
Melek Önen
Md Masoom Rabbani
Mauro Conti
2020
journals/compsec
Context-based Co-presence detection techniques: A survey.
Mauro Conti
Chhagan Lal
2020
journals/compsec
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks.
Pallavi Kaliyar
Wafa Ben Jaballah
Mauro Conti
Chhagan Lal
2020
journals/tifs
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.
Neetesh Saxena
Mauro Conti
Kim-Kwang Raymond Choo
Narendra S. Chaudhari
2020
journals/tifs
SARA: Secure Asynchronous Remote Attestation for IoT Systems.
Edlira Dushku
Md Masoom Rabbani
Mauro Conti
Luigi V. Mancini
Silvio Ranise
2020
journals/tifs
Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel.
Ankit Gangwal
Mauro Conti
2020
journals/tifs
PermPair: Android Malware Detection Using Permission Pairs.
Anshul Arora
Sateesh Kumar Peddoju
Mauro Conti
2020
conf/ccs
A Statistical Analysis Framework for ICS Process Datasets.
Federico Turrin
Alessandro Erba
Nils Ole Tippenhauer
Mauro Conti
2020
conf/esorics
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage.
Matteo Cardaioli
Mauro Conti
Kiran S. Balagani
Paolo Gasti
2020
conf/esorics
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems.
Fabio Aiolli
Mauro Conti
Stjepan Picek
Mirko Polato
2020
conf/esorics
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon.
Mauro Conti
Pier Paolo Tricomi
Gene Tsudik
2020
conf/cns
Eathentication: A Chewing-based Authentication Method.
Mattia Carlucci
Stefano Cecconello
Mauro Conti
Piero Romare
2020
conf/icics
One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud.
Yifei Chen
Meng Li
Shuli Zheng
Donghui Hu
Chhagan Lal
Mauro Conti
2020
conf/wisec
Peek-a-boo: i see your smart home activities, even encrypted!
Abbas Acar
Hossein Fereidooni
Tigist Abera
Amit Kumar Sikder
Markus Miettinen
Hidayet Aksu
Mauro Conti
Ahmad-Reza Sadeghi
A. Selcuk Uluagac
2020
conf/cans
Detecting Covert Cryptomining Using HPC.
Ankit Gangwal
Samuele Giuliano Piazzetta
Gianluca Lain
Mauro Conti
2019
journals/compsec
Efficient privacy preserving device authentication in WBANs for industrial e-health applications.
Vanga Odelu
Sourav Saha
Rajendra Prasath
Lakshminarayana Sadineni
Mauro Conti
Minho Jo
2019
journals/istr
AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones.
Attaullah Buriro
Bruno Crispo
Mauro Conti
2019
conf/ccs
An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures.
Eduard Marin
Nicola Bucciol
Mauro Conti
2019
conf/ccs
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks.
Michal Piskozub
Riccardo Spolaor
Mauro Conti
Ivan Martinovic
2019
conf/eurosp
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities.
Stefano Calzavara
Mauro Conti
Riccardo Focardi
Alvise Rabitti
Gabriele Tolomei
2019
conf/cns
Detecting ADS-B Spoofing Attacks Using Deep Neural Networks.
Xuhang Ying
Joanna Mazer
Giuseppe Bernieri
Mauro Conti
Linda Bushnell
Radha Poovendran
2019
conf/wisec
Threat is in the Air: Machine Learning for Wireless Network Applications.
Luca Pajola
Luca Pasa
Mauro Conti
2018
journals/compsec
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective.
Mauro Conti
Ankit Gangwal
Sushmita Ruj
2018
journals/tifs
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.
Po-Yen Lee
Chia-Mu Yu
Tooska Dargahi
Mauro Conti
Giuseppe Bianchi
2018
journals/tifs
Detecting Android Malware Leveraging Text Semantics of Network Flows.
Shanshan Wang
Qiben Yan
Zhenxiang Chen
Bo Yang
Chuan Zhao
Mauro Conti
2018
journals/tifs
Robust Smartphone App Identification via Encrypted Network Traffic Analysis.
Vincent F. Taylor
Riccardo Spolaor
Mauro Conti
Ivan Martinovic
2018
conf/ccs
All You Need is: Evading Hate Speech Detection.
Tommi Gröndahl
Luca Pajola
Mika Juuti
Mauro Conti
N. Asokan
2018
conf/ccs
Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around).
Mauro Conti
2018
conf/uss
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
Andrea Biondo
Mauro Conti
Lucas Davi
Tommaso Frassetto
Ahmad-Reza Sadeghi
2018
conf/esorics
SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Kiran S. Balagani
Mauro Conti
Paolo Gasti
Martin Georgiev
Tristan Gurtler
Daniele Lain
Charissa Miller
Kendall Molas
Nikita Samarin
Eugen Saraci
Gene Tsudik
Lynn Wu
2018
conf/esorics
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices.
Moreno Ambrosin
Mauro Conti
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Matthias Schunter
2018
conf/cns
Emergency Access Control Management Via Attribute Based Encrypted QR Codes.
Sana Belguith
Sarada Prasad Gochhayat
Mauro Conti
Giovanni Russello
2018
conf/cns
Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing Effortlessly.
Mauro Conti
Ankit Gangwal
Sarada Prasad Gochhayat
Gabriele Tolomei
2018
conf/ndss
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
Andrea Biondo
Mauro Conti
Daniele Lain
2017
journals/compsec
PIndroid: A novel Android malware detection system using ensemble learning methods.
Fauzia Idrees
Muttukrishnan Rajarajan
Mauro Conti
Thomas M. Chen
Yogachandran Rahulamathavan
2017
journals/compsec
Android inter-app communication threats and detection techniques.
Shweta Bhandari
Wafa Ben Jaballah
Vineeta Jain
Vijay Laxmi
Akka Zemmari
Manoj Singh Gaur
Mohamed Mosbah
Mauro Conti
2017
conf/ccs
Detection of Information Leaks via Reflection in Android Apps.
Jyoti Gajrani
Li Li
Vijay Laxmi
Meenakshi Tripathi
Manoj Singh Gaur
Mauro Conti
2017
conf/ccs
Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP.
Alberto Compagno
Mauro Conti
Daniele Lain
Gene Tsudik
2017
conf/acns
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Riccardo Spolaor
Laila Abudahi
Veelasha Moonsamy
Mauro Conti
Radha Poovendran
2017
conf/esorics
Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android.
Lorenzo Bordoni
Mauro Conti
Riccardo Spolaor
2017
conf/wisec
A roaming-based denial of service attack on LTE networks: poster.
Moreno Ambrosin
Stefano Cecconello
Mauro Conti
Daniele Lain
2017
conf/wisec
Toward secure and efficient attestation for highly dynamic swarms: poster.
Moreno Ambrosin
Mauro Conti
Riccardo Lazzeretti
Md Masoom Rabbani
Silvio Ranise
2016
journals/compsec
Colluding browser extension attack on user privacy and its implication for web browsers.
Anil Saini
Manoj Singh Gaur
Vijay Laxmi
Mauro Conti
2016
journals/tifs
Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks.
Alberto Giaretta
Sasitharan Balasubramaniam
Mauro Conti
2016
journals/tifs
Analyzing Android Encrypted Network Traffic to Identify User Actions.
Mauro Conti
Luigi Vincenzo Mancini
Riccardo Spolaor
Nino Vincenzo Verde
2016
journals/tifs
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols.
Alberto Compagno
Mauro Conti
Antonio Alberto D'Amico
Gianluca Dini
Pericle Perazzo
Lorenzo Taponecco
2016
journals/popets
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Mauro Conti
Stephen Crane
Tommaso Frassetto
Andrei Homescu
Georg Koppen
Per Larsen
Christopher Liebchen
Mike Perry
Ahmad-Reza Sadeghi
2016
conf/ccs
Mind The Plug! Laptop-User Recognition Through Power Consumption.
Mauro Conti
Michele Nati
Enrico Rotundo
Riccardo Spolaor
2016
conf/ccs
SANA: Secure and Scalable Aggregate Network Attestation.
Moreno Ambrosin
Mauro Conti
Ahmad Ibrahim
Gregory Neven
Ahmad-Reza Sadeghi
Matthias Schunter
2016
conf/uss
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
Earlence Fernandes
Justin Paupore
Amir Rahmati
Daniel Simionato
Mauro Conti
Atul Prakash
2016
conf/acns
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
Mauro Conti
Claudio Guarisco
Riccardo Spolaor
2016
conf/eurosp
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic.
Vincent F. Taylor
Riccardo Spolaor
Mauro Conti
Ivan Martinovic
2016
conf/cns
Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters.
Moreno Ambrosin
Hossein Hosseini
Kalikinkar Mandal
Mauro Conti
Radha Poovendran
2016
conf/dsn
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Parvez Faruki
Akka Zemmari
Manoj Singh Gaur
Vijay Laxmi
Mauro Conti
2016
conf/wisec
POSTER: Toward a Secure and Scalable Attestation.
Moreno Ambrosin
Mauro Conti
Ahmad Ibrahim
Gregory Neven
Ahmad-Reza Sadeghi
Matthias Schunter
2015
journals/tifs
Employing Program Semantics for Malware Detection.
Smita Naval
Vijay Laxmi
Muttukrishnan Rajarajan
Manoj Singh Gaur
Mauro Conti
2015
conf/ccs
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
Moreno Ambrosin
Mauro Conti
Fabio De Gaspari
Radha Poovendran
2015
conf/ccs
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Mauro Conti
Stephen Crane
Lucas Davi
Michael Franz
Per Larsen
Marco Negro
Christopher Liebchen
Mohaned Qunaibit
Ahmad-Reza Sadeghi
2015
conf/acns
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Alberto Compagno
Mauro Conti
Paolo Gasti
Luigi Vincenzo Mancini
Gene Tsudik
2015
conf/cns
CaT: Evaluating cloud-aided TLS for smartphone energy efficiency.
Kanishka Ariyapala
Mauro Conti
Cristina M. Pinotti
2015
conf/cns
Verifiable and privacy-preserving fine-grained data-collection for smart metering.
Moreno Ambrosin
Hossein Hosseini
Kalikinkar Mandal
Mauro Conti
Radha Poovendran
2015
conf/cns
Brain-Computer Interface applications: Security and privacy challenges.
QianQian Li
Ding Ding
Mauro Conti
2015
conf/cns
Boten ELISA: A novel approach for botnet C&C in Online Social Networks.
Alberto Compagno
Mauro Conti
Daniele Lain
Giulio Lovisotto
Luigi Vincenzo Mancini
2014
journals/tifs
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
Sankardas Roy
Mauro Conti
Sanjeev Setia
Sushil Jajodia
2014
conf/ccs
Covert ephemeral communication in named data networking.
Moreno Ambrosin
Mauro Conti
Paolo Gasti
Gene Tsudik
2014
conf/ccs
OASIS: Operational Access Sandboxes for Information Security.
Mauro Conti
Earlence Fernandes
Justin Paupore
Atul Prakash
Daniel Simionato
2014
conf/iciss
Privacy Leakage Attacks in Browsers by Colluding Extensions.
Anil Saini
Manoj Singh Gaur
Vijay Laxmi
Tushar Singhal
Mauro Conti
2014
conf/esorics
Environment-Reactive Malware Behavior: Detection and Categorization.
Smita Naval
Vijay Laxmi
Manoj Singh Gaur
Sachin Raja
Muttukrishnan Rajarajan
Mauro Conti
2014
conf/esorics
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Moreno Ambrosin
Christoph Busold
Mauro Conti
Ahmad-Reza Sadeghi
Matthias Schunter
2014
conf/esorics
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
Guillermo Suarez-Tangil
Mauro Conti
Juan E. Tapiador
Pedro Peris-Lopez
2014
conf/cns
VirtualFriendship: Hiding interactions on Online Social Networks.
Filipe Beato
Mauro Conti
Bart Preneel
Dario Vettore
2013
journals/tifs
Hybrid Static-Runtime Information Flow and Declassification Enforcement.
Bruno P. S. Rocha
Mauro Conti
Sandro Etalle
Bruno Crispo
2013
journals/tifs
FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
Earlence Fernandes
Bruno Crispo
Mauro Conti
2012
journals/tifs
Secure Data Aggregation in Wireless Sensor Networks.
Sankardas Roy
Mauro Conti
Sanjeev Setia
Sushil Jajodia
2012
journals/tifs
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android.
Mauro Conti
Bruno Crispo
Earlence Fernandes
Yury Zhauniarovich
2012
conf/ccs
Demonstrating the effectiveness of MOSES for separation of execution modes.
Giovanni Russello
Mauro Conti
Bruno Crispo
Earlence Fernandes
Yury Zhauniarovich
2011
conf/ccs
Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.
Mauro Conti
Irina Zachia-Zlatea
Bruno Crispo
2010
conf/icics
Time Warp: How Time Affects Privacy in LBSs.
Luciana Marconi
Roberto Di Pietro
Bruno Crispo
Mauro Conti
2008
conf/wisec
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks.
Mauro Conti
Roberto Di Pietro
Luigi V. Mancini
Alessandro Mei
Coauthors
A. Selcuk Uluagac
(3)
Abbas Acar
(2)
Abdeslam El Fergougui
(1)
Adriaan de Vos
(1)
Ahmad Ibrahim
(3)
Ahmad-Reza Sadeghi
(8)
Aiqun Hu
(1)
Akka Zemmari
(2)
Alberto Compagno
(4)
Alberto Giaretta
(1)
Alessandro Brighente
(18)
Alessandro Erba
(1)
Alessandro Lotto
(1)
Alessandro Mei
(1)
Alessandro Visintin
(2)
Alessio Merlo
(1)
Alessio Pavoni
(1)
Alessio Trevisan
(1)
Alessio Vitella
(1)
Ali Imran
(1)
Alvise Rabitti
(1)
Amir Rahmati
(1)
Amit Kumar Sikder
(1)
Amrita Ghosal
(1)
Andi Liu
(1)
Andrea Agiollo
(2)
Andrea Biondo
(2)
Andrea Omicini
(1)
Andrea Valori
(1)
Andrea Visconti
(1)
Andrei Homescu
(1)
Angelo Spognardi
(1)
Anil Saini
(2)
Ankit Gangwal
(7)
Ankur O. Bang
(1)
Anshul Arora
(1)
Antonino Nocera
(4)
Antonio Alberto D'Amico
(1)
Antonio Ruggia
(1)
Anup Kiran Bhattacharjee
(1)
Arpita Ravindranath
(1)
Attaullah Buriro
(1)
Atul Prakash
(2)
Bart Preneel
(1)
Behrad Tajalli
(1)
Bhaskar Ramasubramanian
(2)
Bo Yang
(1)
Bruno Crispo
(7)
Bruno P. S. Rocha
(1)
Charissa Miller
(1)
Chenxing Ji
(1)
Chhagan Lal
(4)
Chia-Mu Yu
(1)
Christina Kreza
(1)
Christoph Busold
(1)
Christopher Liebchen
(2)
Chuan Zhao
(1)
Claudio Guarisco
(1)
Coen Schoof
(1)
Constantinos Patsakis
(1)
Cristina M. Pinotti
(1)
Daniel Simionato
(2)
Daniele Antonioli
(2)
Daniele Lain
(5)
Dario Pasquini
(1)
Dario Vettore
(1)
Denis Donadel
(4)
Derin Cayir
(1)
Dincy R. Arikkat
(2)
Ding Ding
(1)
Donghui Hu
(1)
Earlence Fernandes
(5)
Edlira Dushku
(1)
Edoardo Di Paolo
(1)
Edoardo Liberati
(1)
Eduard Marin
(3)
Eleonora Losiouk
(7)
Elisa Burato
(1)
Emad Efatinasab
(1)
Enkeleda Bardhi
(2)
Enrico Bassetti
(1)
Enrico Rotundo
(1)
Eugen Saraci
(2)
Fabio Aiolli
(1)
Fabio De Gaspari
(1)
Fauzia Idrees
(1)
Federico Carboni
(1)
Federico Turrin
(5)
Felix Klement
(1)
Fernando Kuipers
(2)
Filipe Beato
(1)
Flavio Toffalini
(2)
Florine W. Dekker
(2)
Fran Casino
(1)
Francesca Del Nin
(1)
Francesco Drago
(1)
Francesco Marchiori
(7)
Gabriele Orazi
(2)
Gabriele Tolomei
(2)
Gang Wang
(1)
Gene Tsudik
(6)
Georg Koppen
(1)
Georgiana Timpau
(1)
Georgios Portokalidis
(1)
Georgios Smaragdakis
(1)
Giacomo Benedetti
(1)
Gianluca Dini
(1)
Gianluca Lain
(1)
Giovanni Apruzzese
(3)
Giovanni Russello
(2)
Giulio Lovisotto
(1)
Giuseppe Ateniese
(1)
Giuseppe Bernieri
(2)
Giuseppe Bianchi
(1)
Gorka Abad
(1)
Gregory Neven
(2)
Guillermo Suarez-Tangil
(1)
Guixin Ye
(1)
Gulshan Kumar
(2)
Guyue Li
(1)
Hanni Ding
(2)
Hidayet Aksu
(1)
Hongyi Luo
(1)
Hossein Fereidooni
(1)
Hossein Hosseini
(2)
Irina Zachia-Zlatea
(1)
Ivan Martinovic
(3)
Izza Sadaf
(1)
Jelle Vos
(2)
Jiali Xu
(1)
Jianbo Gao
(1)
Jianwei Liu
(1)
Jianying Zhou
(2)
Jiaxin Li
(3)
Jing Xu
(2)
Jinwoo Kim
(2)
Joanna Mazer
(1)
Juan E. Tapiador
(1)
Jun Xu
(1)
Justin Paupore
(2)
Jyoti Gajrani
(1)
Kalikinkar Mandal
(2)
Kanishka Ariyapala
(1)
Kavya Balasubramanian
(1)
Kendall Molas
(1)
Kim-Kwang Raymond Choo
(2)
Kiran S. Balagani
(3)
Laila Abudahi
(1)
Lakshminarayana Sadineni
(1)
Li Li
(1)
Liehuang Zhu
(2)
Linda Bushnell
(1)
Lorenzo Bordoni
(1)
Lorenzo Taponecco
(1)
Luca Pajola
(6)
Luca Pasa
(1)
Luca Verderame
(1)
Lucas Davi
(2)
Luciana Marconi
(1)
Luigi V. Mancini
(2)
Luigi Vincenzo Mancini
(3)
Lynn Wu
(1)
Mamoun Alazab
(2)
Manoj Singh Gaur
(7)
Marco Alecci
(1)
Marco Angelini
(1)
Marco Arazzi
(3)
Marco Casagrande
(2)
Marco Negro
(1)
Marco Palazzo
(1)
Mariano Graziano
(1)
Mariano Sciacco
(1)
Mark Xuefang Zhu
(1)
Markus Miettinen
(1)
Martin Georgiev
(1)
Massimiliano Baldo
(1)
Massimo Bernaschi
(1)
Mathias Payer
(1)
Matteo Brosolo
(1)
Matteo Cardaioli
(4)
Matthias Schunter
(4)
Mattia Carlucci
(1)
Mauro Conti
(160)
Max Kilger
(1)
Md Masoom Rabbani
(3)
Meenakshi Tripathi
(1)
Melek Önen
(2)
Meng Li
(6)
Michael Franz
(1)
Michal Piskozub
(1)
Michele Nati
(1)
Mika Juuti
(1)
Mike Perry
(1)
Milad Taleby Ahvanooey
(1)
Mingwei Zhang
(1)
Minho Jo
(1)
Mirco Beltrame
(1)
Mirco Rampazzo
(1)
Mirko Polato
(1)
Mohamad Mansouri
(2)
Mohamed A. El-Zawawy
(1)
Mohamed Mosbah
(1)
Mohaned Qunaibit
(1)
Moreno Ambrosin
(10)
Muhammad Shahbaz
(1)
Muttukrishnan Rajarajan
(3)
N. Asokan
(1)
Nahal Azadi
(1)
Narendra S. Chaudhari
(1)
Neetesh Saxena
(1)
Niclas Finne
(1)
Nicola Bucciol
(1)
Nikita Samarin
(1)
Nikolaos Lykousas
(1)
Nils Ole Tippenhauer
(1)
Nino Vincenzo Verde
(1)
Nirav Diwan
(1)
P. Vinod
(4)
Pallavi Kaliyar
(3)
Paolo Gasti
(4)
Parvez Faruki
(1)
Pavan Srihari Darbha
(1)
Pedro Peris-Lopez
(1)
Per Larsen
(2)
Pericle Perazzo
(1)
Pier Paolo Tricomi
(3)
Piero Romare
(1)
Pierpaolo Guglielmin
(1)
PLS Jayalaxmi
(1)
Po-Yen Lee
(1)
Qianmu Li
(1)
QianQian Li
(1)
Qiben Yan
(1)
Qing Wang
(1)
Qingying Hao
(1)
Radha Poovendran
(8)
Rafidha Rehiman K. A.
(2)
Rahul Saha
(2)
Rahul Valluri
(1)
Rajendra Prasath
(1)
Rajib Ranjan Maiti
(1)
Reham Mohamed Aburas
(1)
Riccardo Cestaro
(1)
Riccardo Focardi
(1)
Riccardo Lazzeretti
(5)
Riccardo Spolaor
(8)
Roberto Di Pietro
(3)
Romain Rouvoy
(1)
Ruotong Yu
(1)
Sachin Raja
(1)
Samuele Giuliano Piazzetta
(1)
Sana Belguith
(1)
Sandro Etalle
(1)
Sanjeev Setia
(2)
Sankardas Roy
(2)
Sara Bardi
(1)
Sarada Prasad Gochhayat
(2)
Sarah Zakto
(1)
Sasitharan Balasubramaniam
(1)
Sateesh Kumar Peddoju
(1)
Serena Cofano
(1)
Serena Nicolazzo
(2)
Seungwon Shin
(1)
Shan Huang
(1)
Shanshan Wang
(1)
Shubham Khandhar
(1)
Shuli Zheng
(1)
Shuo Wang
(1)
Shweta Bhandari
(1)
Silvio Ranise
(2)
Simone Milani
(1)
Sitora Salaeva
(1)
Smita Naval
(2)
Song Bian
(1)
Sourav Saha
(1)
Stefan Katzenbeisser
(1)
Stefano Calzavara
(1)
Stefano Cecconello
(5)
Stefanos Koffas
(3)
Stephen Crane
(2)
Stjepan Picek
(8)
Sushil Jajodia
(2)
Sushmita Ruj
(1)
Tannishtha Devgun
(1)
Theodoros Apostolopoulos
(1)
Thiemo Voigt
(1)
Thomas M. Chen
(1)
Tigist Abera
(1)
Tommaso Bianchi
(3)
Tommaso Frassetto
(2)
Tommaso Pauselli
(1)
Tommi Gröndahl
(1)
Tooska Dargahi
(1)
Tristan Gurtler
(1)
Tushar Singhal
(1)
Udai Pratap Rao
(1)
Vaibhav Singh
(1)
Valeria Loscrì
(1)
Vanga Odelu
(1)
Vasilios Koutsokostas
(1)
Veelasha Moonsamy
(1)
Victoria Bull
(1)
Vijay Laxmi
(7)
Vincent F. Taylor
(2)
Vineeta Jain
(1)
Vinod P.
(2)
Wafa Ben Jaballah
(4)
Wojciech Mazurczyk
(1)
Xianbin Wang
(1)
Xiaochun Cheng
(1)
Xuhang Ying
(1)
Yan Qiao
(1)
Yan Qiao
(2)
Yassine Mekdad
(1)
Yifei Chen
(2)
Yifei Chen
(2)
Ying Yuan
(3)
Yinuo Li
(1)
Yizhong Liu
(1)
Yogachandran Rahulamathavan
(1)
Yuan Lu
(1)
Yuchen Zhang
(1)
Yuexiu Xing
(1)
Yury Zhauniarovich
(2)
Z. Berkay Celik
(1)
Zekeriya Erkin
(4)
Zhenxiang Chen
(1)
Zhuangwei Li
(1)
Zhuocheng Pan
(1)
Zijian Zhang
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to