Luka Malisa
Luka Malisa
Geverifieerd e-mailadres voor inf.ethz.ch - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
On limitations of friendly jamming for confidentiality
NO Tippenhauer, L Malisa, A Ranganathan, S Capkun
2013 IEEE Symposium on Security and Privacy, 160-173, 2013
752013
Detecting mobile application spoofing attacks by leveraging user visual similarity perception
L Malisa, K Kostiainen, S Capkun
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
312017
Enforcing location and time-based access control on cloud-stored data
E Androulaki, C Soriente, L Malisa, S Capkun
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
222014
Mobile application impersonation detection using dynamic user interface extraction
L Malisa, K Kostiainen, M Och, S Capkun
European Symposium on Research in Computer Security, 217-237, 2016
172016
Multichannel protocols for user-friendly and scalable initialization of sensor networks
T Perković, I Stančić, L Mališa, M Čagalj
International Conference on Security and Privacy in Communication Systems …, 2009
92009
Many-to-many beam alignment in millimeter wave networks
S Jog, J Wang, J Guan, T Moon, H Hassanieh, RR Choudhury
16th {USENIX} Symposium on Networked Systems Design and Implementation …, 2019
62019
Teaching Authentication in High Schools: Challenges and Lessons Learned
E Stobert, E Cavar, L Malisa, D Sommer
2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17), 2017
42017
Using hover to compromise the confidentiality of user input on Android
E Ulqinaku, L Malisa, J Stefa, A Mei, S Čapkun
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
22017
CoverUp: Privacy Through" Forced" Participation in Anonymous Communication Networks.
D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
IACR Cryptology ePrint Archive 2017, 191, 2017
22017
Technical Report: Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
L Malisa, K Kostiainen, S Capkun
22015
Teaching authentication as a life skill
E Stobert, E Cavar, L Malisa, D Sommer
IEEE Security & Privacy 16 (5), 82-85, 2018
12018
Hacking in the blind:(almost) invisible runtime ui attacks on safety-critical terminals
L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun
arXiv preprint arXiv:1604.04723, 2016
12016
Deniable upload and download via passive participation
D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
16th {USENIX} Symposium on Networked Systems Design and Implementation …, 2019
2019
Hacking in the Blind:(Almost) Invisible Runtime User Interface Attacks
L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun
International Conference on Cryptographic Hardware and Embedded Systems, 468-489, 2017
2017
Security of User Interfaces: Attacks and Countermeasures
L Malisa
ETH Zurich, 2017
2017
Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android.
E Ulqinaku, L Malisa, J Stefa, A Mei, S Capkun
CoRR, 2016
2016
Hacking in the Blind
L Malisa
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–17