Daniele Lain
Daniele Lain
PhD Student, ETH Zurich
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP
A Compagno, M Conti, D Lain, G Tsudik
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
272017
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features
M Conti, D Lain, R Lazzeretti, G Lovisotto, W Quattrociocchi
2017 IEEE Workshop on Information Forensics and Security (WIFS), 1-6, 2017
202017
Boten ELISA: A novel approach for botnet C&C in online social networks
A Compagno, M Conti, D Lain, G Lovisotto, LV Mancini
2015 IEEE Conference on Communications and Network Security (CNS), 74-82, 2015
122015
SILK-TV: Secret Information Leakage from Keystroke Timing Videos
KS Balagani, M Conti, P Gasti, M Georgiev, T Gurtler, D Lain, C Miller, ...
European Symposium on Research in Computer Security, 263-280, 2018
102018
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
A Biondo, M Conti, D Lain
NDSS, 2018
92018
2FA-PP: 2nd factor phishing prevention
E Ulqinaku, D Lain, S Capkun
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
22019
PILOT: Password and PIN information leakage from obfuscated typing videos
K Balagani, M Cardaioli, M Conti, P Gasti, M Georgiev, T Gurtler, D Lain, ...
Journal of Computer Security 27 (4), 405-425, 2019
22019
A roaming-based denial of service attack on LTE networks: poster
M Ambrosin, S Cecconello, M Conti, D Lain
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
22017
Skype & Type: Keyboard Eavesdropping in Voice-over-IP
S Cecconello, A Compagno, M Conti, D Lain, G Tsudik
ACM Transactions on Privacy and Security (TOPS), 2019
12019
TEEvil: Identity Lease via Trusted Execution Environments
I Puddu, D Lain, M Schneider, E Tretiakova, S Matetic, S Capkun
arXiv preprint arXiv:1903.00449, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–10