default search action
Riccardo Spolaor
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Pengfei Hu, Wenhao Li, Riccardo Spolaor, Xiuzhen Cheng:
mmEcho: A mmWave-based Acoustic Eavesdropping Method. ACM TUR-C 2023: 138-140 - [c21]Tianshu Xiao, Sichang Guo, Jingcheng Huang, Riccardo Spolaor, Xiuzhen Cheng:
HiPo: Detecting Fake News via Historical and Multi-Modal Analyses of Social Media Posts. CIKM 2023: 2805-2815 - [c20]Riccardo Spolaor, Hao Liu, Federico Turrin, Mauro Conti, Xiuzhen Cheng:
Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. INFOCOM 2023: 1-10 - [c19]Pengfei Hu, Wenhao Li, Riccardo Spolaor, Xiuzhen Cheng:
mmEcho: A mmWave-based Acoustic Eavesdropping Method. SP 2023: 1840-1856 - [d1]Riccardo Spolaor, Hao Liu, Federico Turrin, Mauro Conti, Xiuzhen Cheng:
Dataset for the paper: Plug and Power: Fingerprinting USB Powered Peripherals via Power Side-channel. Zenodo, 2023 - 2022
- [j7]Mauro Conti, Eleonora Losiouk, Radha Poovendran, Riccardo Spolaor:
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems. Comput. Networks 207: 108858 (2022) - [c18]Ankit Gangwal, Shubham Singh, Riccardo Spolaor, Abhijeet Srivastava:
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration. ESORICS (1) 2022: 698-717 - [c17]Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth H. Pathak, Guoming Zhang, Xiuzhen Cheng:
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary. SP 2022: 1757-1773 - [i8]Ankit Gangwal, Shubham Singh, Riccardo Spolaor, Abhijeet Srivastava:
BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration. CoRR abs/2204.08042 (2022) - [i7]Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth Pathak, Guoming Zhang, Xiuzhen Cheng:
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary. CoRR abs/2212.01042 (2022) - 2021
- [c16]Frederick Barr-Smith, Xabier Ugarte-Pedrero, Mariano Graziano, Riccardo Spolaor, Ivan Martinovic:
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land. SP 2021: 1557-1574 - 2020
- [c15]Bushra A. AlAhmadi, Enrico Mariconti, Riccardo Spolaor, Gianluca Stringhini, Ivan Martinovic:
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior. AsiaCCS 2020: 652-664 - [c14]Anli Yan, Zhenxiang Chen, Riccardo Spolaor, Shuaishuai Tan, Chuan Zhao, Lizhi Peng, Bo Yang:
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update. IWQoS 2020: 1-10
2010 – 2019
- 2019
- [c13]Michal Piskozub, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks. MTD@CCS 2019: 1-12 - [c12]Hao Li, Zhenxiang Chen, Riccardo Spolaor, Qiben Yan, Chuan Zhao, Bo Yang:
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning. ICC 2019: 1-6 - [c11]Michal Piskozub, Riccardo Spolaor, Ivan Martinovic:
CompactFlow: A Hybrid Binary Format for Network Flow Data. WISTP 2019: 185-201 - 2018
- [j6]Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor:
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis. IEEE Commun. Surv. Tutorials 20(4): 2658-2713 (2018) - [j5]Michal Piskozub, Riccardo Spolaor, Ivan Martinovic:
MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features. SIGMETRICS Perform. Evaluation Rev. 46(3): 151-154 (2018) - [j4]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. IEEE Trans. Inf. Forensics Secur. 13(1): 63-78 (2018) - [j3]Riccardo Spolaor, Elia Dal Santo, Mauro Conti:
DELTA: Data Extraction and Logging Tool for Android. IEEE Trans. Mob. Comput. 17(6): 1289-1302 (2018) - [c10]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. SecureComm (1) 2018: 248-263 - 2017
- [c9]Merylin Monaro, Riccardo Spolaor, QianQian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori:
Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics. ARES 2017: 60:1-60:6 - [c8]Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran:
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices. ACNS 2017: 83-102 - [c7]Lorenzo Bordoni, Mauro Conti, Riccardo Spolaor:
Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android. ESORICS (1) 2017: 278-296 - [c6]Maddalena Favaretto, Riccardo Spolaor, Mauro Conti, Marco Ferrante:
You Surf so Strange Today: Anomaly Detection in Web Services via HMM and CTMC. GPC 2017: 426-440 - [i6]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis. CoRR abs/1704.06099 (2017) - [i5]Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor:
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis. CoRR abs/1708.03766 (2017) - 2016
- [j2]Riccardo Spolaor, QianQian Li, Merylin Monaro, Mauro Conti, Luciano Gamberini, Giuseppe Sartori:
Biometric Authentication Methods on Smartphones: A Survey. PsychNology J. 14(2-3): 87-98 (2016) - [j1]Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Analyzing Android Encrypted Network Traffic to Identify User Actions. IEEE Trans. Inf. Forensics Secur. 11(1): 114-125 (2016) - [c5]Mauro Conti, Claudio Guarisco, Riccardo Spolaor:
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery. ACNS 2016: 611-628 - [c4]Mauro Conti, Michele Nati, Enrico Rotundo, Riccardo Spolaor:
Mind The Plug! Laptop-User Recognition Through Power Consumption. IoTPTS@AsiaCCS 2016: 37-44 - [c3]Valeriu-Daniel Stanciu, Riccardo Spolaor, Mauro Conti, Cristiano Giuffrida:
On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks. CODASPY 2016: 105-112 - [c2]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. EuroS&P 2016: 439-454 - [i4]Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran:
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices. CoRR abs/1609.02750 (2016) - [i3]Mauro Conti, Elia Dal Santo, Riccardo Spolaor:
DELTA: Data Extraction and Logging Tool for Android. CoRR abs/1609.02769 (2016) - 2015
- [c1]Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis. CODASPY 2015: 297-304 - [i2]Mauro Conti, Claudio Guarisco, Riccardo Spolaor:
CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery. CoRR abs/1503.00561 (2015) - 2014
- [i1]Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino Vincenzo Verde:
Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis. CoRR abs/1407.7844 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint