Follow
Luka Malisa
Luka Malisa
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
On limitations of friendly jamming for confidentiality
NO Tippenhauer, L Malisa, A Ranganathan, S Capkun
2013 IEEE symposium on security and privacy, 160-173, 2013
1112013
Detecting mobile application spoofing attacks by leveraging user visual similarity perception
L Malisa, K Kostiainen, S Capkun
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
622017
Mobile application impersonation detection using dynamic user interface extraction
L Malisa, K Kostiainen, M Och, S Capkun
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
322016
Enforcing location and time-based access control on cloud-stored data
E Androulaki, C Soriente, L Malisa, S Capkun
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
312014
Multichannel protocols for user-friendly and scalable initialization of sensor networks
T Perković, I Stančić, L Mališa, M Čagalj
Security and Privacy in Communication Networks: 5th International ICST …, 2009
82009
Using hover to compromise the confidentiality of user input on android
E Ulqinaku, L Malisa, J Stefa, A Mei, S Čapkun
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
52017
Teaching Authentication in High Schools: Challenges and Lessons Learned
E Stobert, E Cavar, L Malisa, D Sommer
2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017
52017
Deniable upload and download via passive participation
D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019
22019
Security of User Interfaces: Attacks and Countermeasures
L Malisa
ETH Zurich, 2017
22017
Hacking in the blind:(almost) invisible runtime user interface attacks
L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
22017
CoverUp: Privacy Through" Forced" Participation in Anonymous Communication Networks
D Sommer, A Dhar, L Malisa, E Mohammadi, D Ronzani, S Capkun
Cryptology ePrint Archive, 2017
22017
Technical Report: Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
L Malisa
22015
Teaching authentication as a life skill
E Stobert, E Cavar, L Malisa, D Sommer
IEEE Security & Privacy 16 (5), 82-85, 2018
12018
Hacking in the blind:(almost) invisible runtime ui attacks on safety-critical terminals
L Malisa, K Kostiainen, T Knell, D Sommer, S Capkun
arXiv preprint arXiv:1604.04723, 2016
12016
Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android.
E Ulqinaku, L Malisa, J Stefa, A Mei, S Capkun
CoRR, 2016
2016
Hacking in the Blind
L Malisa
The system can't perform the operation now. Try again later.
Articles 1–16