Daniele Perito
Daniele Perito
Geverifieerd e-mailadres voor eecs.berkeley.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Smart: Secure and minimal architecture for (establishing dynamic) root of trust
K El Defrawy, DP AurAl’lien Francillon, G Tsudik
Proceedings of the Network & Distributed System Security Symposium (NDSS …, 2012
2832012
How unique and traceable are usernames?
D Perito, C Castelluccia, MA Kaafar, P Manils
International Symposium on Privacy Enhancing Technologies Symposium, 1-17, 2011
2262011
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2032009
Adaptive Password-Strength Meters from Markov Models.
C Castelluccia, M Dürmuth, D Perito
NDSS, 2012
1662012
On the feasibility of side-channel attacks with brain-computer interfaces
I Martinovic, D Davies, M Frank, D Perito, T Ros, D Song
Presented as part of the 21st {USENIX} security symposium ({USENIX} Security …, 2012
1222012
Defending embedded systems against control flow attacks
A Francillon, D Perito, C Castelluccia
Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009
1102009
Secure code update for embedded devices via proofs of secure erasure
D Perito, G Tsudik
European Symposium on Research in Computer Security, 643-662, 2010
1072010
The failure of noise-based non-continuous audio captchas
E Bursztein, R Beauxis, H Paskov, D Perito, C Fabry, J Mitchell
2011 IEEE symposium on security and privacy, 19-31, 2011
952011
OMEN: Faster password guessing using an ordered markov enumerator
M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane
International Symposium on Engineering Secure Software and Systems, 119-132, 2015
622015
Private information disclosure from web searches
C Castelluccia, E De Cristofaro, D Perito
International Symposium on Privacy Enhancing Technologies Symposium, 38-55, 2010
472010
Large-scale correlation of accounts across social networks
O Goga, D Perito, H Lei, R Teixeira, R Sommer
University of California at Berkeley, Berkeley, California, Tech. Rep. TR-13-002, 2013
442013
When privacy meets security: Leveraging personal information for password cracking
C Castelluccia, A Chaabane, M Dürmuth, D Perito
arXiv preprint arXiv:1304.6584, 2013
412013
Geolocalization of proxied services and its application to fast-flux hidden servers
C Castelluccia, MA Kaafar, P Manils, D Perito
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement, 184-189, 2009
262009
Preventing unraveling in social networks gets harder
RH Chitnis, FV Fomin, PA Golovach
Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013
232013
When privacy meets security: Leveraging personal information for password cracking
M Dürmuth, A Chaabane, D Perito, C Castelluccia
CoRR abs/1304.6584, 2013
142013
Subliminal probing for private information via EEG-based BCI devices
M Frank, T Hwu, S Jain, R Knight, I Martinovic, P Mittal, D Perito, D Song
arXiv preprint arXiv:1312.6052, 2013
122013
Using EEG-based BCI devices to subliminally probe for private information
M Frank, T Hwu, S Jain, RT Knight, I Martinovic, P Mittal, D Perito, ...
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society …, 2017
112017
Dependability concepts, models, and analysis of networking mechanisms for WSANs
L Buttyan, G Acs, P Schaffer, K Farkas, B Bencsath, TV Thong, A Laszka, ...
2009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–18