Daniele Lain

Orcid: 0000-0001-6101-7306

According to our database1, Daniele Lain authored at least 20 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
URL Inspection Tasks: Helping Users Detect Phishing Links in Emails.
Proceedings of the 34th USENIX Security Symposium, 2025

Phishing Attacks against Password Manager Browser Extensions.
Proceedings of the 34th USENIX Security Symposium, 2025

CyberQuest: An Interactive Web-Based Cybersecurity Platform.
Proceedings of the 30th ACM Conference on Innovation and Technology in Computer Science Education V. 2, 2025

Breaking Bad: How Compilers Break Constant-Time Implementations.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
(Click Here For) Improvements and Challenges of User-Centric Phishing Prevention.
PhD thesis, 2024

On (the Lack of) Code Confidentiality in Trusted Execution Environments.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2022
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2020
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients.
CoRR, 2020

2FE: Two-Factor Encryption for Cloud Storage.
CoRR, 2020

2019
Skype & Type: Keyboard Eavesdropping in Voice-over-IP.
ACM Trans. Priv. Secur., 2019

PILOT: Password and PIN information leakage from obfuscated typing videos.
J. Comput. Secur., 2019

TEEvil: Identity Lease via Trusted Execution Environments.
CoRR, 2019

2FA-PP: 2nd factor phishing prevention.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

2018
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Proceedings of the Computer Security, 2018

2017
A roaming-based denial of service attack on LTE networks: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2015
Boten ELISA: A novel approach for botnet C&C in Online Social Networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015


  Loading...