Daniele Lain

Orcid: 0000-0001-6101-7306

According to our database1, Daniele Lain authored at least 16 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Breaking Bad: How Compilers Break Constant-Time~Implementations.
CoRR, 2024

On (the Lack of) Code Confidentiality in Trusted Execution Environments.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2022
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2020
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients.
CoRR, 2020

2FE: Two-Factor Encryption for Cloud Storage.
CoRR, 2020

2019
Skype & Type: Keyboard Eavesdropping in Voice-over-IP.
ACM Trans. Priv. Secur., 2019

PILOT: Password and PIN information leakage from obfuscated typing videos.
J. Comput. Secur., 2019

TEEvil: Identity Lease via Trusted Execution Environments.
CoRR, 2019

2FA-PP: 2nd factor phishing prevention.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

2018
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Proceedings of the Computer Security, 2018

2017
A roaming-based denial of service attack on LTE networks: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

It's always April fools' day!: On the difficulty of social network misinformation classification via propagation features.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2015
Boten ELISA: A novel approach for botnet C&C in Online Social Networks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015


  Loading...