Analysis of the communication between colluding applications on modern smartphones C Marforio, H Ritzdorf, A Francillon, S Capkun Proceedings of the 28th Annual Computer Security Applications Conference, 51-60, 2012 | 193 | 2012 |
Sound-proof: Usable two-factor authentication based on ambient sound N Karapanos, C Marforio, C Soriente, S Capkun 24th {USENIX} Security Symposium ({USENIX} Security 15), 483-498, 2015 | 148 | 2015 |
Application collusion attack on the permission-based security model and its implications for modern smartphone systems C Marforio, A Francillon, S Capkun ETH Zurich, 2011 | 103 | 2011 |
Smartphones as Practical and Secure Location Verification Tokens for Payments C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun The Network and Distributed System Security Symposium (NDSS), 2014 | 79 | 2014 |
Personalized security indicators to detect application phishing attacks in mobile platforms C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun arXiv preprint arXiv:1502.06824, 2015 | 36 | 2015 |
Secure enrollment and practical migration for mobile trusted execution environments C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013 | 29 | 2013 |
User-level secure deletion on log-structured file systems J Reardon, C Marforio, S Capkun, D Basin Proceedings of the 7th ACM symposium on information, computer and …, 2012 | 25 | 2012 |
An architecture for concurrent execution of secure environments in clouds R Jayaram Masti, C Marforio, S Capkun Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 11-22, 2013 | 20 | 2013 |
Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications C Marforio, R Jayaram Masti, C Soriente, K Kostiainen, S Čapkun Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016 | 18 | 2016 |
SwissPeaks–Mobile augmented reality to identify mountains S Karpischek, C Marforio, M Godenzi, S Heuel, F Michahelles Workshop at the International Symposium on Mixed and Augmented Reality 2009 …, 2009 | 14 | 2009 |
Hardened setup of personalized security indicators to counter phishing attacks in mobile banking C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016 | 13 | 2016 |
Secure deletion on log-structured file systems J Reardon, C Marforio, S Capkun, D Basin arXiv preprint arXiv:1106.0917, 2011 | 12 | 2011 |
Enabling trusted scheduling in embedded systems RJ Masti, C Marforio, A Ranganathan, A Francillon, S Capkun Proceedings of the 28th Annual Computer Security Applications Conference, 61-70, 2012 | 11 | 2012 |
Isolated Execution on Many-core Architectures. RJ Masti, D Rai, C Marforio, S Capkun IACR Cryptol. ePrint Arch. 2014, 136, 2014 | 10 | 2014 |
Logical partitions on many-core platforms RJ Masti, C Marforio, K Kostiainen, C Soriente, S Capkun Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 3 | 2015 |
Smartphone Security: New Applications and Challenges C Marforio ETH Zurich, 2016 | 1 | 2016 |
METHOD AND DEVICES FOR SECURE DELETION OF DATA IN A LOG STRUCTURED FILE SYSTEM S CAPKUN, D BASIN, J REARDON, C MARFORIO WO Patent 2,012,167,392, 2012 | | 2012 |
Timed data deletion on mobile communication devices C Marforio Swiss Federal Institute of Technology, Department of Computer Science …, 2010 | | 2010 |
Isolation on Many-core Architectures RJ Masti, D Rai, C Marforio, S Čapkun | | |