Follow
Daniele Lain
Daniele Lain
PhD Student, ETH Zurich
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
D Lain, K Kostiainen, S Capkun
2022 IEEE Symposium on Security and Privacy (SP), 2021
1142021
Don't skype & type! acoustic eavesdropping in voice-over-ip
A Compagno, M Conti, D Lain, G Tsudik
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
862017
It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features
M Conti, D Lain, R Lazzeretti, G Lovisotto, W Quattrociocchi
2017 IEEE Workshop on Information Forensics and Security (WIFS), 1-6, 2017
452017
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
A Biondo, M Conti, D Lain
Ndss, 2018
322018
2FA-PP: 2nd factor phishing prevention
E Ulqinaku, D Lain, S Capkun
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
282019
Skype & Type: Keyboard Eavesdropping in Voice-over-IP
S Cecconello, A Compagno, M Conti, D Lain, G Tsudik
ACM Transactions on Privacy and Security (TOPS), 2019
232019
Boten ELISA: A novel approach for botnet C&C in online social networks
A Compagno, M Conti, D Lain, G Lovisotto, LV Mancini
2015 IEEE Conference on Communications and Network Security (CNS), 74-82, 2015
232015
SILK-TV: Secret Information Leakage from Keystroke Timing Videos
KS Balagani, M Conti, P Gasti, M Georgiev, T Gurtler, D Lain, C Miller, ...
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
21*2018
Pilot: Password and pin information leakage from obfuscated typing videos
K Balagani, M Cardaioli, M Conti, P Gasti, M Georgiev, T Gurtler, D Lain, ...
Journal of Computer Security 27 (4), 405-425, 2019
142019
Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici
R Baldoni, R De Nicola, PE Prinetto, CF Anglano, L Aniello, A Antinori, ...
Consorzio Interuniversitario Nazionale per l'Informatica-CINI, 2018
7*2018
A roaming-based denial of service attack on LTE networks: poster
M Ambrosin, S Cecconello, M Conti, D Lain
Proceedings of the 10th ACM conference on security and privacy in wireless …, 2017
72017
On (The Lack Of) code confidentiality in trusted execution environments
I Puddu, M Schneider, D Lain, S Boschetto, S Čapkun
2024 IEEE Symposium on Security and Privacy (SP), 4125-4142, 2024
62024
Teevil: Identity lease via trusted execution environments
I Puddu, D Lain, M Schneider, E Tretiakova, S Matetic, S Capkun
arXiv preprint arXiv:1903.00449, 2019
42019
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients
I Sluganovic, E Ulqinaku, A Dhar, D Lain, S Capkun, I Martinovic
arXiv preprint arXiv:2011.13979, 2020
22020
Breaking Bad: How Compilers Break Constant-Time~ Implementations
M Schneider, D Lain, I Puddu, N Dutly, S Capkun
arXiv preprint arXiv:2410.13489, 2024
12024
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training
D Lain, T Jost, S Matetic, K Kostiainen, S Capkun
arXiv preprint arXiv:2409.01378, 2024
12024
2FE: Two-Factor Encryption for Cloud Storage
A Dalskov, D Lain, E Ulqinaku, K Kostiainen, S Capkun
arXiv preprint arXiv:2010.14417, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–17