Mauro Conti [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Peek-a-Boo: I see your smart home activities, even encrypted! ACMConference-2020 - Virtual, Virtual
ScaRR: Scalable Runtime Remote Attestation for Complex Systems RAID2019-2019 - Beijing, China
Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages ARES-2019 - Canterbury, UK
Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities IEEEEuroS&P-2019 - Stockholm, Sweden
No Free Charge Theorem 2.0: How to Steal Private Information from a Mobile Device Using a Powerbank blackhatEurope-2018 - London, United Kingdom
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets. NDSS-2018 - san diego,usa
SKYPE and TYPE: KEYSTROKE LEAKAGE OVER VOIP blackhat-2017 - las vegas,usa
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks USENIX-2016 - austin,usa
Selfrando: Securing the Tor Browser against De-anonymization Exploits PETS-2016 - darmstadt,germany
Toward a Secure and Scalable Attestation WiSec-2016 - darmstadt,germany
Can’t you hear me knocking: Identification of user actions on Android apps via traffic analysis codapspy-2015 - San Antonio,USA
VirtualFriendship: Hiding interactions on Online Social Networks CNS-2014 - san francisco,usa
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation TrustCOM-2014 - bejing,china
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks CRiSIS-2014 - trento,italy
I Sensed It Was You: Authenticating Mobile Users with Sensor-enhanced Keystroke Dynamics Dimva-2014 - London,UK
Covert Ephemeral Communication in Named Data Networking asiaccs-2014 - kyoto,japan