Follow
Claudio Marforio
Claudio Marforio
Institute of Information Security, ETH Zurich
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
N Karapanos, C Marforio, C Soriente, S Capkun
24th USENIX security symposium (USENIX security 15), 483-498, 2015
504*2015
Analysis of the communication between colluding applications on modern smartphones
C Marforio, H Ritzdorf, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 51-60, 2012
2312012
Application collusion attack on the permission-based security model and its implications for modern smartphone systems
C Marforio, A Francillon, S Capkun
ETH Zurich, 2011
1212011
Smartphones as Practical and Secure Location Verification Tokens for Payments
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
The Network and Distributed System Security Symposium (NDSS), 2014
992014
Personalized security indicators to detect application phishing attacks in mobile platforms
C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun
arXiv preprint arXiv:1502.06824, 2015
412015
Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications
C Marforio, R Jayaram Masti, C Soriente, K Kostiainen, S Čapkun
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
372016
User-level secure deletion on log-structured file systems
J Reardon, C Marforio, S Capkun, D Basin
Proceedings of the 7th ACM symposium on information, computer and …, 2012
352012
Secure enrollment and practical migration for mobile trusted execution environments
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013
322013
An architecture for concurrent execution of secure environments in clouds
R Jayaram Masti, C Marforio, S Capkun
Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 11-22, 2013
262013
Hardened setup of personalized security indicators to counter phishing attacks in mobile banking
C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016
242016
Enabling trusted scheduling in embedded systems
RJ Masti, C Marforio, A Ranganathan, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 61-70, 2012
182012
SwissPeaks–Mobile augmented reality to identify mountains
S Karpischek, C Marforio, M Godenzi, S Heuel, F Michahelles
Workshop at the International Symposium on Mixed and Augmented Reality 2009 …, 2009
142009
Secure deletion on log-structured file systems
J Reardon, C Marforio, S Capkun, D Basin
arXiv preprint arXiv:1106.0917, 2011
132011
Isolated execution on many-core architectures
RJ Masti, D Rai, C Marforio, S Capkun
Cryptology ePrint Archive, 2014
112014
Logical partitions on many-core platforms
RJ Masti, C Marforio, K Kostiainen, C Soriente, S Capkun
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
32015
Smartphone Security: New Applications and Challenges
C Marforio
ETH Zurich, 2016
12016
METHOD AND DEVICES FOR SECURE DELETION OF DATA IN A LOG STRUCTURED FILE SYSTEM
S CAPKUN, D BASIN, J REARDON, C MARFORIO
WO Patent 2,012,167,392, 2012
2012
Timed data deletion on mobile communication devices
C Marforio
Swiss Federal Institute of Technology, Department of Computer Science …, 2010
2010
Isolation on Many-core Architectures
RJ Masti, D Rai, C Marforio, S Čapkun
The system can't perform the operation now. Try again later.
Articles 1–19