{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound N Karapanos, C Marforio, C Soriente, S Capkun 24th USENIX security symposium (USENIX security 15), 483-498, 2015 | 508* | 2015 |
Analysis of the communication between colluding applications on modern smartphones C Marforio, H Ritzdorf, A Francillon, S Capkun Proceedings of the 28th Annual Computer Security Applications Conference, 51-60, 2012 | 231 | 2012 |
Application collusion attack on the permission-based security model and its implications for modern smartphone systems C Marforio, A Francillon, S Capkun ETH Zurich, 2011 | 121 | 2011 |
Smartphones as Practical and Secure Location Verification Tokens for Payments C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun The Network and Distributed System Security Symposium (NDSS), 2014 | 99 | 2014 |
Personalized security indicators to detect application phishing attacks in mobile platforms C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun arXiv preprint arXiv:1502.06824, 2015 | 41 | 2015 |
Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications C Marforio, R Jayaram Masti, C Soriente, K Kostiainen, S Čapkun Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016 | 37 | 2016 |
User-level secure deletion on log-structured file systems J Reardon, C Marforio, S Capkun, D Basin Proceedings of the 7th ACM symposium on information, computer and …, 2012 | 35 | 2012 |
Secure enrollment and practical migration for mobile trusted execution environments C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013 | 32 | 2013 |
An architecture for concurrent execution of secure environments in clouds R Jayaram Masti, C Marforio, S Capkun Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 11-22, 2013 | 26 | 2013 |
Hardened setup of personalized security indicators to counter phishing attacks in mobile banking C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016 | 25 | 2016 |
Enabling trusted scheduling in embedded systems RJ Masti, C Marforio, A Ranganathan, A Francillon, S Capkun Proceedings of the 28th Annual Computer Security Applications Conference, 61-70, 2012 | 18 | 2012 |
SwissPeaks–Mobile augmented reality to identify mountains S Karpischek, C Marforio, M Godenzi, S Heuel, F Michahelles Workshop at the International Symposium on Mixed and Augmented Reality 2009 …, 2009 | 14 | 2009 |
Secure deletion on log-structured file systems J Reardon, C Marforio, S Capkun, D Basin arXiv preprint arXiv:1106.0917, 2011 | 13 | 2011 |
Isolated execution on many-core architectures RJ Masti, D Rai, C Marforio, S Capkun Cryptology ePrint Archive, 2014 | 11 | 2014 |
Logical partitions on many-core platforms RJ Masti, C Marforio, K Kostiainen, C Soriente, S Capkun Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 3 | 2015 |
Smartphone Security: New Applications and Challenges C Marforio ETH Zurich, 2016 | 1 | 2016 |
METHOD AND DEVICES FOR SECURE DELETION OF DATA IN A LOG STRUCTURED FILE SYSTEM S CAPKUN, D BASIN, J REARDON, C MARFORIO WO Patent 2,012,167,392, 2012 | | 2012 |
Timed data deletion on mobile communication devices C Marforio Swiss Federal Institute of Technology, Department of Computer Science …, 2010 | | 2010 |
Isolation on Many-core Architectures RJ Masti, D Rai, C Marforio, S Čapkun | | |