Riccardo Spolaor
Riccardo Spolaor
Department of Computer Science at University of Oxford
Verified email at cs.ox.ac.uk - Homepage
TitleCited byYear
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
1132015
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
VF Taylor, R Spolaor, M Conti, I Martinovic
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016
872016
Robust smartphone app identification via encrypted network traffic analysis
VF Taylor, R Spolaor, M Conti, I Martinovic
IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017
652017
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis
M Conti, LV Mancini, R Spolaor, NV Verde
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
592015
On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks
VD Stanciu, R Spolaor, M Conti, C Giuffrida
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
262016
The Dark Side (-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
M Conti, QQ Li, A Maragno, R Spolaor
IEEE Communications Surveys & Tutorials 20 (4), 2018
182018
No free charge theorem: A covert channel via usb charging cable on mobile devices
R Spolaor, L Abudahi, V Moonsamy, M Conti, R Poovendran
International Conference on Applied Cryptography and Network Security, 83-102, 2017
142017
CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery
M Conti, C Guarisco, R Spolaor
International Conference on Applied Cryptography and Network Security, 611-628, 2016
142016
Covert lie detection using keyboard dynamics
M Monaro, C Galante, R Spolaor, QQ Li, L Gamberini, M Conti, G Sartori
Scientific reports 8 (1), 1976, 2018
122018
Mind the plug! Laptop-user recognition through power consumption
M Conti, M Nati, E Rotundo, R Spolaor
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and …, 2016
122016
Biometric Authentication Methods on Smartphones: A Survey.
R Spolaor, QQ Li, M Monaro, M Conti, L Gamberini, G Sartori
PsychNology Journal 14 (2), 2016
92016
Mirage: Toward a stealthier and modular malware analysis sandbox for android
L Bordoni, M Conti, R Spolaor
European Symposium on Research in Computer Security, 278-296, 2017
82017
Type me the truth!: detecting deceitful users via keystroke dynamics
M Monaro, R Spolaor, QQ Li, M Conti, L Gamberini, G Sartori
Proceedings of the 12th International Conference on Availability …, 2017
72017
DELTA: Data Extraction and Logging Tool for Android
R Spolaor, E Dal Santo, M Conti
IEEE Transactions on Mobile Computing 17 (6), 1289-1302, 2018
5*2018
MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features
M Piskozub, R Spolaor, I Martinovic
ACM SIGMETRICS Performance Evaluation Review 46 (3), 151-154, 2019
32019
The online identity detection via keyboard dynamics
M Monaro, M Businaro, R Spolaor, QQ Li, M Conti, L Gamberini, G Sartori
Proceedings of the Future Technologies Conference, 342-357, 2018
22018
You are how you play: Authenticating mobile users via game playing
R Spolaor, M Monaro, P Capuozzo, M Baesso, M Conti, L Gamberini, ...
International Worskhop on Communication Security, 79-96, 2017
22017
Lexical Mining of Malicious URLs for Classifying Android Malware
S Wang, Q Yan, Z Chen, L Wang, R Spolaor, B Yang, M Conti
International Conference on Security and Privacy in Communication Systems …, 2018
12018
You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMC
M Favaretto, R Spolaor, M Conti, M Ferrante
International Conference on Green, Pervasive, and Cloud Computing, 426-440, 2017
12017
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks
M Piskozub, R Spolaor, M Conti, I Martinovic
Proceedings of the 6th ACM Workshop on Moving Target Defense, 1-12, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20