Alberto Compagno
YOU?
Author Swipe
View article: Validation of a Novel Wearable Multistream Data Acquisition and Analysis System for Ergonomic Studies
Validation of a Novel Wearable Multistream Data Acquisition and Analysis System for Ergonomic Studies Open
Nowadays, the growing interest in gathering physiological data and human behavior in everyday life scenarios is paralleled by an increase in wireless devices recording brain and body signals. However, the technical issues that characterize…
View article: Secure Producer Mobility in Information-Centric Network
Secure Producer Mobility in Information-Centric Network Open
International audience
View article: Don't Skype & Type!
Don't Skype & Type! Open
Acoustic emanations of computer keyboards represent a serious privacy issue. As demonstrated in prior work, physical properties of keystroke sounds might reveal what a user is typing. However, previous attacks assumed relatively strong adv…
View article: Security and Privacy Analysis of NSF Future Internet Architectures
Security and Privacy Analysis of NSF Future Internet Architectures Open
The Internet Protocol (IP) is the lifeblood of the modern Internet. Its simplicity and universality have fueled the unprecedented and lasting global success of the current Internet. Nonetheless, some limitations of IP have been emerging in…
View article: Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP Open
Acoustic emanations of computer keyboards represent a serious privacy issue. As demonstrated in prior work, physical properties of keystroke sounds might reveal what a user is typing. However, previous attacks assumed relatively strong adv…
View article: Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP Open
Acoustic emanations of computer keyboards represent a serious privacy issue. As demonstrated in prior work, physical properties of keystroke sounds might reveal what a user is typing. However, previous attacks assumed relatively strong adv…
View article: Modeling Enlargement Attacks Against UWB Distance Bounding Protocols
Modeling Enlargement Attacks Against UWB Distance Bounding Protocols Open
Distance bounding protocols make it possible to determine a trusted upper bound on the distance between two devices. Their key property is to resist reduction attacks, i.e., attacks aimed at reducing the distance measured by the protocol. …
View article: Boten ELISA: A novel approach for botnet C&C in Online Social Networks
Boten ELISA: A novel approach for botnet C&C in Online Social Networks Open
The Command and Control (C&C;) channel of modern botnets is migrating from traditional centralized solutions (such as the ones based on Internet Relay Chat and Hyper Text Transfer Protocol), towards new decentralized approaches. Recent C&C…
View article: To NACK or Not to NACK? Negative Acknowledgments in Information-Centric Networking
To NACK or Not to NACK? Negative Acknowledgments in Information-Centric Networking Open
Information-Centric Networking (ICN) is an internetworking paradigm that\noffers an alternative to the current IP\\nobreakdash-based Internet\narchitecture. ICN's most distinguishing feature is its emphasis on information\n(content) instea…