Daniele Perito

According to our database1, Daniele Perito authored at least 16 papers between 2009 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Using EEG-Based BCI Devices to Subliminally Probe for Private Information.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

2015
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2013
When Privacy meets Security: Leveraging personal information for password cracking
CoRR, 2013

Subliminal Probing for Private Information via EEG-Based BCI Devices.
CoRR, 2013

2012
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Adaptive Password-Strength Meters from Markov Models.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Exécution sécurisée de code sur systèmes embarqués. (Trustworthy code execution on embedded devices).
PhD thesis, 2011

The Failure of Noise-Based Non-continuous Audio Captchas.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

How Unique and Traceable Are Usernames?
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

2010
Secure Code Update for Embedded Devices via Proofs of Secure Erasure.
IACR Cryptol. ePrint Arch., 2010

Private Information Disclosure from Web Searches. (The case of Google Web History)
CoRR, 2010

Private Information Disclosure from Web Searches.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2009
Geolocalization of proxied services and its application to fast-flux hidden servers.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Defending embedded systems against control flow attacks.
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009

On the difficulty of software-based attestation of embedded devices.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009


  Loading...