Luka Malisa
Luka Malisa
Email verificata su inf.ethz.ch - Home page
Titolo
Citata da
Citata da
Anno
On limitations of friendly jamming for confidentiality
NO Tippenhauer, L Malisa, A Ranganathan, S Capkun
2013 IEEE symposium on security and privacy, 160-173, 2013
892013
Detecting mobile application spoofing attacks by leveraging user visual similarity perception
L Malisa, K Kostiainen, S Capkun
Proceedings of the Seventh ACM on Conference on Data and Applicationá…, 2017
362017
Mobile application impersonation detection using dynamic user interface extraction
L Malisa, K Kostiainen, M Och, S Capkun
European Symposium on Research in Computer Security, 217-237, 2016
252016
Enforcing location and time-based access control on cloud-stored data
E Androulaki, C Soriente, L Malisa, S Capkun
2014 IEEE 34th International Conference on Distributed Computing Systemsá…, 2014
252014
Multichannel protocols for user-friendly and scalable initialization of sensor networks
T Perković, I Stančić, L Mališa, M Čagalj
International Conference on Security and Privacy in Communication Systemsá…, 2009
92009
Teaching Authentication in High Schools: Challenges and Lessons Learned
E Stobert, E Cavar, L Malisa, D Sommer
2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17), 2017
42017
Using hover to compromise the confidentiality of user input on Android
E Ulqinaku, L Malisa, J Stefa, A Mei, S Čapkun
Proceedings of the 10th ACM Conference on Security and Privacy in Wirelessá…, 2017
32017
CoverUp: Privacy Through" Forced" Participation in Anonymous Communication Networks.
DM Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
IACR Cryptol. ePrint Arch. 2017, 191, 2017
22017
Technical Report: Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
L Malisa, K Kostiainen, S Capkun
22015
Teaching authentication as a life skill
E Stobert, E Cavar, L Malisa, D Sommer
IEEE Security & Privacy 16 (5), 82-85, 2018
12018
Security of User Interfaces: Attacks and Countermeasures
L Malisa
ETH Zurich, 2017
12017
Hacking in the blind:(almost) invisible runtime ui attacks on safety-critical terminals
L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun
arXiv preprint arXiv:1604.04723, 2016
12016
Deniable upload and download via passive participation
D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
16th {USENIX} Symposium on Networked Systems Design and Implementationá…, 2019
2019
Hacking in the Blind:(Almost) Invisible Runtime User Interface Attacks
L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun
International Conference on Cryptographic Hardware and Embedded Systems, 468-489, 2017
2017
Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android.
E Ulqinaku, L Malisa, J Stefa, A Mei, S Capkun
CoRR, 2016
2016
Hacking in the Blind
L Malisa
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–16