


Остановите войну!
for scientists:


default search action
Riccardo Spolaor
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j7]Mauro Conti, Eleonora Losiouk
, Radha Poovendran, Riccardo Spolaor:
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems. Comput. Networks 207: 108858 (2022) - [c18]Ankit Gangwal
, Shubham Singh, Riccardo Spolaor, Abhijeet Srivastava:
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration. ESORICS (1) 2022: 698-717 - [c17]Pengfei Hu
, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth H. Pathak, Guoming Zhang, Xiuzhen Cheng:
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary. IEEE Symposium on Security and Privacy 2022: 1757-1773 - [i8]Ankit Gangwal, Shubham Singh, Riccardo Spolaor, Abhijeet Srivastava:
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration. CoRR abs/2204.08042 (2022) - [i7]Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth Pathak, Guoming Zhang, Xiuzhen Cheng:
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary. CoRR abs/2212.01042 (2022) - 2021
- [c16]Frederick Barr-Smith, Xabier Ugarte-Pedrero, Mariano Graziano, Riccardo Spolaor, Ivan Martinovic:
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land. IEEE Symposium on Security and Privacy 2021: 1557-1574 - 2020
- [c15]Bushra A. AlAhmadi, Enrico Mariconti
, Riccardo Spolaor, Gianluca Stringhini, Ivan Martinovic:
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior. AsiaCCS 2020: 652-664 - [c14]Anli Yan, Zhenxiang Chen, Riccardo Spolaor, Shuaishuai Tan, Chuan Zhao, Lizhi Peng, Bo Yang:
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update. IWQoS 2020: 1-10
2010 – 2019
- 2019
- [c13]Michal Piskozub, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks. MTD@CCS 2019: 1-12 - [c12]Hao Li, Zhenxiang Chen, Riccardo Spolaor, Qiben Yan
, Chuan Zhao, Bo Yang:
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning. ICC 2019: 1-6 - [c11]Michal Piskozub, Riccardo Spolaor, Ivan Martinovic:
CompactFlow: A Hybrid Binary Format for Network Flow Data. WISTP 2019: 185-201 - 2018
- [j6]Mauro Conti
, QianQian Li, Alberto Maragno
, Riccardo Spolaor
:
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis. IEEE Commun. Surv. Tutorials 20(4): 2658-2713 (2018) - [j5]Michal Piskozub, Riccardo Spolaor, Ivan Martinovic:
MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features. SIGMETRICS Perform. Evaluation Rev. 46(3): 151-154 (2018) - [j4]Vincent F. Taylor
, Riccardo Spolaor
, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. IEEE Trans. Inf. Forensics Secur. 13(1): 63-78 (2018) - [j3]Riccardo Spolaor
, Elia Dal Santo, Mauro Conti
:
DELTA: Data Extraction and Logging Tool for Android. IEEE Trans. Mob. Comput. 17(6): 1289-1302 (2018) - [c10]Shanshan Wang, Qiben Yan
, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. SecureComm (1) 2018: 248-263 - 2017
- [c9]Merylin Monaro, Riccardo Spolaor, QianQian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori:
Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics. ARES 2017: 60:1-60:6 - [c8]Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran:
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices. ACNS 2017: 83-102 - [c7]Lorenzo Bordoni, Mauro Conti, Riccardo Spolaor:
Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android. ESORICS (1) 2017: 278-296 - [c6]Maddalena Favaretto, Riccardo Spolaor, Mauro Conti, Marco Ferrante
:
You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMC. GPC 2017: 426-440 - [i6]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis. CoRR abs/1704.06099 (2017) - [i5]Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor:
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis. CoRR abs/1708.03766 (2017) - 2016
- [j2]Riccardo Spolaor, QianQian Li, Merylin Monaro, Mauro Conti, Luciano Gamberini, Giuseppe Sartori:
Biometric Authentication Methods on Smartphones: A Survey. PsychNology J. 14(2-3): 87-98 (2016) - [j1]Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Analyzing Android Encrypted Network Traffic to Identify User Actions. IEEE Trans. Inf. Forensics Secur. 11(1): 114-125 (2016) - [c5]Mauro Conti, Claudio Guarisco, Riccardo Spolaor:
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery. ACNS 2016: 611-628 - [c4]Mauro Conti, Michele Nati
, Enrico Rotundo, Riccardo Spolaor:
Mind The Plug! Laptop-User Recognition Through Power Consumption. IoTPTS@AsiaCCS 2016: 37-44 - [c3]Valeriu Daniel Stanciu, Riccardo Spolaor, Mauro Conti, Cristiano Giuffrida
:
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks. CODASPY 2016: 105-112 - [c2]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. EuroS&P 2016: 439-454 - [i4]Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran:
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices. CoRR abs/1609.02750 (2016) - [i3]Mauro Conti, Elia Dal Santo, Riccardo Spolaor:
DELTA: Data Extraction and Logging Tool for Android. CoRR abs/1609.02769 (2016) - 2015
- [c1]Mauro Conti
, Luigi V. Mancini
, Riccardo Spolaor, Nino Vincenzo Verde:
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis. CODASPY 2015: 297-304 - [i2]Mauro Conti, Claudio Guarisco, Riccardo Spolaor:
CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery. CoRR abs/1503.00561 (2015) - 2014
- [i1]Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis. CoRR abs/1407.7844 (2014)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-22 22:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint