Riccardo Spolaor
Riccardo Spolaor
Department of Computer Science at University of Oxford
Verified email at cs.ox.ac.uk - Homepage
TitleCited byYear
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
1022015
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
VF Taylor, R Spolaor, M Conti, I Martinovic
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016
742016
Robust smartphone app identification via encrypted network traffic analysis
VF Taylor, R Spolaor, M Conti, I Martinovic
IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017
552017
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis
M Conti, LV Mancini, R Spolaor, NV Verde
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
552015
On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks
VD Stanciu, R Spolaor, M Conti, C Giuffrida
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
222016
No free charge theorem: A covert channel via usb charging cable on mobile devices
R Spolaor, L Abudahi, V Moonsamy, M Conti, R Poovendran
International Conference on Applied Cryptography and Network Security, 83-102, 2017
142017
The Dark Side (-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
M Conti, QQ Li, A Maragno, R Spolaor
IEEE Communications Surveys & Tutorials 20 (4), 2018
132018
CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery
M Conti, C Guarisco, R Spolaor
International Conference on Applied Cryptography and Network Security, 611-628, 2016
132016
Mind the plug! Laptop-user recognition through power consumption
M Conti, M Nati, E Rotundo, R Spolaor
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and …, 2016
122016
Covert lie detection using keyboard dynamics
M Monaro, C Galante, R Spolaor, QQ Li, L Gamberini, M Conti, G Sartori
Scientific reports 8 (1), 1976, 2018
102018
Mirage: Toward a stealthier and modular malware analysis sandbox for android
L Bordoni, M Conti, R Spolaor
European Symposium on Research in Computer Security, 278-296, 2017
82017
Biometric Authentication Methods on Smartphones: A Survey.
R Spolaor, QQ Li, M Monaro, M Conti, L Gamberini, G Sartori
PsychNology Journal 14 (2), 2016
82016
Type me the truth!: detecting deceitful users via keystroke dynamics
M Monaro, R Spolaor, QQ Li, M Conti, L Gamberini, G Sartori
Proceedings of the 12th International Conference on Availability …, 2017
62017
DELTA: Data Extraction and Logging Tool for Android
R Spolaor, E Dal Santo, M Conti
IEEE Transactions on Mobile Computing 17 (6), 1289-1302, 2018
5*2018
The online identity detection via keyboard dynamics
M Monaro, M Businaro, R Spolaor, QQ Li, M Conti, L Gamberini, G Sartori
Proceedings of the Future Technologies Conference, 342-357, 2018
22018
You are how you play: Authenticating mobile users via game playing
R Spolaor, M Monaro, P Capuozzo, M Baesso, M Conti, L Gamberini, ...
International Worskhop on Communication Security, 79-96, 2017
22017
MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features
M Piskozub, R Spolaor, I Martinovic
ACM SIGMETRICS Performance Evaluation Review 46 (3), 151-154, 2019
12019
Lexical Mining of Malicious URLs for Classifying Android Malware
S Wang, Q Yan, Z Chen, L Wang, R Spolaor, B Yang, M Conti
International Conference on Security and Privacy in Communication Systems …, 2018
12018
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning
H Li, Z Chen, R Spolaor, Q Yan, C Zhao, B Yang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
2019
Security and Privacy Threats on Mobile Devices through Side-Channels Analysis
R Spolaor
University of Padua, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20