Skip to main content

Showing 1–11 of 11 results for author: Lain, D

.
  1. arXiv:2502.20234  [pdf, other

    cs.CR

    URL Inspection Tasks: Helping Users Detect Phishing Links in Emails

    Authors: Daniele Lain, Yoshimichi Nakatsuka, Kari Kostiainen, Gene Tsudik, Srdjan Capkun

    Abstract: The most widespread type of phishing attack involves email messages with links pointing to malicious content. Despite user training and the use of detection techniques, these attacks are still highly effective. Recent studies show that it is user inattentiveness, rather than lack of education, that is one of the key factors in successful phishing attacks. To this end, we develop a novel phishing d… ▽ More

    Submitted 27 February, 2025; originally announced February 2025.

    Comments: To appear in USENIX Security 2025

  2. arXiv:2410.13489  [pdf, other

    cs.CR

    Breaking Bad: How Compilers Break Constant-Time~Implementations

    Authors: Moritz Schneider, Daniele Lain, Ivan Puddu, Nicolas Dutly, Srdjan Capkun

    Abstract: The implementations of most hardened cryptographic libraries use defensive programming techniques for side-channel resistance. These techniques are usually specified as guidelines to developers on specific code patterns to use or avoid. Examples include performing arithmetic operations to choose between two variables instead of executing a secret-dependent branch. However, such techniques are only… ▽ More

    Submitted 17 October, 2024; originally announced October 2024.

  3. Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training

    Authors: Daniele Lain, Tarek Jost, Sinisa Matetic, Kari Kostiainen, Srdjan Capkun

    Abstract: A common form of phishing training in organizations is the use of simulated phishing emails to test employees' susceptibility to phishing attacks, and the immediate delivery of training material to those who fail the test. This widespread practice is dubbed embedded training; however, its effectiveness in decreasing the likelihood of employees falling for phishing again in the future is questioned… ▽ More

    Submitted 2 September, 2024; originally announced September 2024.

    Comments: Extended version of the paper appearing in ACM CCS'24

  4. arXiv:2212.07899  [pdf, other

    cs.CR

    On (the Lack of) Code Confidentiality in Trusted Execution Environments

    Authors: Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Čapkun

    Abstract: Trusted Execution Environments (TEEs) have been proposed as a solution to protect code confidentiality in scenarios where computation is outsourced to an untrusted operator. We study the resilience of such solutions to side-channel attacks in two commonly deployed scenarios: when a confidential code is a native binary that is shipped and executed within a TEE and when the confidential code is an i… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

  5. arXiv:2112.07498  [pdf, other

    cs.CR cs.HC

    Phishing in Organizations: Findings from a Large-Scale and Long-Term Study

    Authors: Daniele Lain, Kari Kostiainen, Srdjan Capkun

    Abstract: In this paper, we present findings from a large-scale and long-term phishing experiment that we conducted in collaboration with a partner company. Our experiment ran for 15 months during which time more than 14,000 study participants (employees of the company) received different simulated phishing emails in their normal working context. We also deployed a reporting button to the company's email cl… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

    Comments: To appear in IEEE S&P 2022

  6. arXiv:2011.13979  [pdf, other

    cs.CR cs.HC

    IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients

    Authors: Ivo Sluganovic, Enis Ulqinaku, Aritra Dhar, Daniele Lain, Srdjan Capkun, Ivan Martinovic

    Abstract: Remote services and applications that users access via their local clients (laptops or desktops) usually assume that, following a successful user authentication at the beginning of the session, all subsequent communication reflects the user's intent. However, this is not true if the adversary gains control of the client and can therefore manipulate what the user sees and what is sent to the remote… ▽ More

    Submitted 27 November, 2020; originally announced November 2020.

  7. arXiv:2010.14417  [pdf, other

    cs.CR

    2FE: Two-Factor Encryption for Cloud Storage

    Authors: Anders Dalskov, Daniele Lain, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun

    Abstract: Encrypted cloud storage services are steadily increasing in popularity, with many commercial solutions currently available. In such solutions, the cloud storage is trusted for data availability, but not for confidentiality. Additionally, the user's device is considered secure, and the user is expected to behave correctly. We argue that such assumptions are not met in reality: e.g., users routine… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: 18 pages, 7 figures

  8. arXiv:1904.00188  [pdf, other

    cs.CR

    PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos

    Authors: Kiran Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu

    Abstract: This paper studies leakage of user passwords and PINs based on observations of typing feedback on screens or from projectors in the form of masked characters that indicate keystrokes. To this end, we developed an attack called Password and Pin Information Leakage from Obfuscated Typing Videos (PILOT). Our attack extracts inter-keystroke timing information from videos of password masking characters… ▽ More

    Submitted 9 April, 2019; v1 submitted 30 March, 2019; originally announced April 2019.

    ACM Class: K.6.5

  9. arXiv:1903.00449  [pdf, other

    cs.CR

    TEEvil: Identity Lease via Trusted Execution Environments

    Authors: Ivan Puddu, Daniele Lain, Moritz Schneider, Elizaveta Tretiakova, Sinisa Matetic, Srdjan Capkun

    Abstract: We investigate identity lease, a new type of service in which users lease their identities to third parties by providing them with full or restricted access to their online accounts or credentials. We discuss how identity lease could be abused to subvert the digital society, facilitating the spread of fake news and subverting electronic voting by enabling the sale of votes. We show that the emerge… ▽ More

    Submitted 9 May, 2019; v1 submitted 1 March, 2019; originally announced March 2019.

    Comments: 21 pages, 5 figures

  10. arXiv:1701.04221  [pdf, other

    cs.SI physics.soc-ph

    It's Always April Fools' Day! On the Difficulty of Social Network Misinformation Classification via Propagation Features

    Authors: Mauro Conti, Daniele Lain, Riccardo Lazzeretti, Giulio Lovisotto, Walter Quattrociocchi

    Abstract: Given the huge impact that Online Social Networks (OSN) had in the way people get informed and form their opinion, they became an attractive playground for malicious entities that want to spread misinformation, and leverage their effect. In fact, misinformation easily spreads on OSN and is a huge threat for modern society, possibly influencing also the outcome of elections, or even putting people'… ▽ More

    Submitted 16 January, 2017; originally announced January 2017.

    Comments: 10 pages, 5 figures

  11. arXiv:1609.09359  [pdf, other

    cs.CR

    Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP

    Authors: Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik

    Abstract: Acoustic emanations of computer keyboards represent a serious privacy issue. As demonstrated in prior work, physical properties of keystroke sounds might reveal what a user is typing. However, previous attacks assumed relatively strong adversary models that are not very practical in many real-world settings. Such strong models assume: (i) adversary's physical proximity to the victim, (ii) precise… ▽ More

    Submitted 11 March, 2017; v1 submitted 29 September, 2016; originally announced September 2016.

    Comments: To appear in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017. 13 pages, 17 figures