Riccardo Spolaor

Orcid: 0000-0002-3878-7940

According to our database1, Riccardo Spolaor authored at least 29 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
Dataset, May, 2023

Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel.
Proceedings of the IEEE INFOCOM 2023, 2023

HiPo: Detecting Fake News via Historical and Multi-Modal Analyses of Social Media Posts.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

mmEcho: A mmWave-based Acoustic Eavesdropping Method.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems.
Comput. Networks, 2022

AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
CompactFlow: A Hybrid Binary Format for Network Flow Data.
Proceedings of the Information Security Theory and Practice, 2019

DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019

2018
DELTA: Data Extraction and Logging Tool for Android.
IEEE Trans. Mob. Comput., 2018

Robust Smartphone App Identification via Encrypted Network Traffic Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features.
SIGMETRICS Perform. Evaluation Rev., 2018

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis.
IEEE Commun. Surv. Tutorials, 2018

Lexical Mining of Malicious URLs for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMC.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android.
Proceedings of the Computer Security - ESORICS 2017, 2017

No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Proceedings of the Applied Cryptography and Network Security, 2017

Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Analyzing Android Encrypted Network Traffic to Identify User Actions.
IEEE Trans. Inf. Forensics Secur., 2016

Biometric Authentication Methods on Smartphones: A Survey.
PsychNology J., 2016

AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Mind The Plug! Laptop-User Recognition Through Power Consumption.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015


  Loading...