Claudio Marforio

According to our database1, Claudio Marforio authored at least 14 papers between 2011 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Smartphone Security: New Applications and Challenges.
PhD thesis, 2016

Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms.
CoRR, 2015

Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound.
Proceedings of the 24th USENIX Security Symposium, 2015

Logical Partitions on Many-Core Platforms.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Isolated Execution on Many-core Architectures.
IACR Cryptol. ePrint Arch., 2014

Smartphones as Practical and Secure Location Verification Tokens for Payments.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
An architecture for concurrent execution of secure environments in clouds.
Proceedings of the CCSW'13, 2013

Secure enrollment and practical migration for mobile trusted execution environments.
Proceedings of the SPSM'13, 2013

2012
User-level secure deletion on log-structured file systems.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Enabling trusted scheduling in embedded systems.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Analysis of the communication between colluding applications on modern smartphones.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Secure Deletion on Log-structured File Systems
CoRR, 2011


  Loading...