Luka Malisa

According to our database1, Luka Malisa authored at least 14 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Deniable Upload and Download via Passive Participation.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

2018
Teaching Authentication as a Life Skill.
IEEE Secur. Priv., 2018

2017
Security of User Interfaces: Attacks and Countermeasures.
PhD thesis, 2017

CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks.
IACR Cryptol. ePrint Arch., 2017

Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks.
IACR Cryptol. ePrint Arch., 2017

Using hover to compromise the confidentiality of user input on Android.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Teaching Authentication in High Schools: Challenges and Lessons Learned.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

2016
Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android.
CoRR, 2016

Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals.
CoRR, 2016

Mobile Application Impersonation Detection Using Dynamic User Interface Extraction.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception.
IACR Cryptol. ePrint Arch., 2015

2014
Enforcing Location and Time-Based Access Control on Cloud-Stored Data.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2013
On Limitations of Friendly Jamming for Confidentiality.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2009
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009


  Loading...