Riccardo Spolaor
Riccardo Spolaor
School of Computer Science and Technology, Shandong University, Qingdao campus
Verified email at - Homepage
Cited by
Cited by
Robust smartphone app identification via encrypted network traffic analysis
VF Taylor, R Spolaor, M Conti, I Martinovic
IEEE Transactions on Information Forensics and Security 13 (1), 63-78, 2017
Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic
VF Taylor, R Spolaor, M Conti, I Martinovic
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 439-454, 2016
Analyzing android encrypted network traffic to identify user actions
M Conti, LV Mancini, R Spolaor, NV Verde
IEEE Transactions on Information Forensics and Security 11 (1), 114-125, 2015
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis
M Conti, LV Mancini, R Spolaor, NV Verde
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
The Dark Side (-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
M Conti, QQ Li, A Maragno, R Spolaor
IEEE Communications Surveys & Tutorials 20 (4), 2018
On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks
VD Stanciu, R Spolaor, M Conti, C Giuffrida
proceedings of the sixth ACM conference on data and application security and …, 2016
Covert lie detection using keyboard dynamics
M Monaro, C Galante, R Spolaor, QQ Li, L Gamberini, M Conti, G Sartori
Scientific reports 8 (1), 1-10, 2018
No free charge theorem: A covert channel via usb charging cable on mobile devices
R Spolaor, L Abudahi, V Moonsamy, M Conti, R Poovendran
Applied Cryptography and Network Security: 15th International Conference …, 2017
Biometric authentication methods on smartphones: A survey.
R Spolaor, QQ Li, M Monaro, M Conti, L Gamberini, G Sartori
PsychNology Journal 14 (2), 2016
CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery
M Conti, C Guarisco, R Spolaor
Applied Cryptography and Network Security: 14th International Conference …, 2016
Mind the plug! laptop-user recognition through power consumption
M Conti, M Nati, E Rotundo, R Spolaor
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and …, 2016
Malalert: Detecting malware in large-scale network traffic using statistical features
M Piskozub, R Spolaor, I Martinovic
ACM SIGMETRICS Performance Evaluation Review 46 (3), 151-154, 2019
DELTA: Data Extraction and Logging Tool for Android
R Spolaor, E Dal Santo, M Conti
IEEE Transactions on Mobile Computing 17 (6), 1289-1302, 2018
Type me the truth! detecting deceitful users via keystroke dynamics
M Monaro, R Spolaor, QQ Li, M Conti, L Gamberini, G Sartori
Proceedings of the 12th international conference on availability …, 2017
Mirage: Toward a stealthier and modular malware analysis sandbox for android
L Bordoni, M Conti, R Spolaor
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
BOTection: Bot detection by building Markov Chain models of bots network behavior
BA Alahmadi, E Mariconti, R Spolaor, G Stringhini, I Martinovic
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
Survivalism: Systematic analysis of windows malware living-off-the-land
F Barr-Smith, X Ugarte-Pedrero, M Graziano, R Spolaor, I Martinovic
2021 IEEE Symposium on Security and Privacy (SP), 1557-1574, 2021
Dart: Detecting unseen malware variants using adaptation regularization transfer learning
H Li, Z Chen, R Spolaor, Q Yan, C Zhao, B Yang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
Usb powered devices: A survey of side-channel threats and countermeasures
H Liu, R Spolaor, F Turrin, R Bonafede, M Conti
High-Confidence Computing 1 (1), 100007, 2021
The online identity detection via keyboard dynamics
M Monaro, M Businaro, R Spolaor, QQ Li, M Conti, L Gamberini, G Sartori
Proceedings of the Future Technologies Conference (FTC) 2018: Volume 2, 342-357, 2019
The system can't perform the operation now. Try again later.
Articles 1–20