Smart: Secure and minimal architecture for (establishing dynamic) root of trust K El Defrawy, DP AurAl’lien Francillon, G Tsudik Proceedings of the Network & Distributed System Security Symposium (NDSS …, 2012 | 433 | 2012 |
How unique and traceable are usernames? D Perito, C Castelluccia, MA Kaafar, P Manils Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011 | 308 | 2011 |
On the difficulty of software-based attestation of embedded devices C Castelluccia, A Francillon, D Perito, C Soriente Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 265 | 2009 |
Adaptive password-strength meters from markov models. C Castelluccia, M Dürmuth, D Perito NDSS, 2012 | 237 | 2012 |
On the Feasibility of Side− channel Attacks with Brain− computer Interfaces I Martinovic, D Davies, M Frank, D Perito, T Ros, D Song USENIX Association, 2012 | 188 | 2012 |
Secure code update for embedded devices via proofs of secure erasure D Perito, G Tsudik Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 150 | 2010 |
Defending embedded systems against control flow attacks A Francillon, D Perito, C Castelluccia Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009 | 134 | 2009 |
OMEN: Faster password guessing using an ordered markov enumerator M Dürmuth, F Angelstorf, C Castelluccia, D Perito, A Chaabane Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015 | 115 | 2015 |
The failure of noise-based non-continuous audio captchas E Bursztein, R Beauxis, H Paskov, D Perito, C Fabry, J Mitchell 2011 IEEE symposium on security and privacy, 19-31, 2011 | 115 | 2011 |
When privacy meets security: Leveraging personal information for password cracking C Castelluccia, A Chaabane, M Dürmuth, D Perito arXiv preprint arXiv:1304.6584, 2013 | 61 | 2013 |
Large-scale correlation of accounts across social networks O Goga, D Perito, H Lei, R Teixeira, R Sommer University of California at Berkeley, Berkeley, California, Tech. Rep. TR-13-002, 2013 | 60 | 2013 |
Private information disclosure from web searches C Castelluccia, E De Cristofaro, D Perito Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010 | 56 | 2010 |
Geolocalization of proxied services and its application to fast-flux hidden servers C Castelluccia, MA Kaafar, P Manils, D Perito Proceedings of the 9th ACM SIGCOMM conference on Internet measurement, 184-189, 2009 | 30 | 2009 |
Using EEG-based BCI devices to subliminally probe for private information M Frank, T Hwu, S Jain, RT Knight, I Martinovic, P Mittal, D Perito, ... Proceedings of the 2017 on Workshop on Privacy in the Electronic Society …, 2017 | 28 | 2017 |
Subliminal probing for private information via EEG-based BCI devices M Frank, T Hwu, S Jain, R Knight, I Martinovic, P Mittal, D Perito, D Song arXiv preprint arXiv:1312.6052, 2013 | 19 | 2013 |
When privacy meets security: Leveraging personal information for password cracking M Dürmuth, A Chaabane, D Perito, C Castelluccia CoRR abs/1304.6584, 2013 | 16 | 2013 |
Dependability concepts, models, and analysis of networking mechanisms for WSANs L Buttyan, G Acs, P Schaffer, K Farkas, B Bencsath, TV Thong, A Laszka, ... | | 2009 |