Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their
combined citations
are counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar. The ones marked
*
may be different from the article in the profile.
Add co-authors
Co-authors
Follow
New articles by this author
New citations to this author
New articles related to this author's research
Email address for updates
Done
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Get my own profile
Cited by
View all
All
Since 2020
Citations
1268
467
h-index
13
10
i10-index
14
10
0
180
90
45
135
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
20
25
53
84
124
161
169
138
106
121
90
78
67
5
Public access
View all
View all
1 article
0 articles
available
not available
Based on funding mandates
Follow
Claudio Marforio
Institute of Information Security,
ETH Zurich
Verified email at inf.ethz.ch -
Homepage
System Security
Information Security
Articles
Cited by
Public access
Title
Sort
Sort by citations
Sort by year
Sort by title
Cited by
Cited by
Year
{Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
N Karapanos, C Marforio, C Soriente, S Capkun
24th USENIX security symposium (USENIX security 15), 483-498
, 2015
534
*
2015
Analysis of the communication between colluding applications on modern smartphones
C Marforio, H Ritzdorf, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 51-60
, 2012
234
2012
Application collusion attack on the permission-based security model and its implications for modern smartphone systems
C Marforio, A Francillon, S Capkun
ETH Zurich
, 2011
121
2011
Smartphones as Practical and Secure Location Verification Tokens for Payments
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
The Network and Distributed System Security Symposium (NDSS)
, 2014
106
2014
Personalized security indicators to detect application phishing attacks in mobile platforms
C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun
arXiv preprint arXiv:1502.06824
, 2015
46
2015
Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications
C Marforio, R Jayaram Masti, C Soriente, K Kostiainen, S Čapkun
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …
, 2016
42
2016
User-level secure deletion on log-structured file systems
J Reardon, C Marforio, S Capkun, D Basin
Proceedings of the 7th ACM symposium on information, computer and …
, 2012
35
2012
Secure enrollment and practical migration for mobile trusted execution environments
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
Proceedings of the Third ACM workshop on Security and privacy in smartphones …
, 2013
32
2013
Hardened setup of personalized security indicators to counter phishing attacks in mobile banking
C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …
, 2016
27
2016
An architecture for concurrent execution of secure environments in clouds
R Jayaram Masti, C Marforio, S Capkun
Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 11-22
, 2013
26
2013
Enabling trusted scheduling in embedded systems
RJ Masti, C Marforio, A Ranganathan, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 61-70
, 2012
23
2012
Secure deletion on log-structured file systems
J Reardon, C Marforio, S Capkun, D Basin
arXiv preprint arXiv:1106.0917
, 2011
14
2011
SwissPeaks–Mobile augmented reality to identify mountains
S Karpischek, C Marforio, M Godenzi, S Heuel, F Michahelles
Workshop at the International Symposium on Mixed and Augmented Reality 2009 …
, 2009
14
2009
Isolated execution on many-core architectures
RJ Masti, D Rai, C Marforio, S Capkun
Cryptology ePrint Archive
, 2014
10
2014
Logical partitions on many-core platforms
RJ Masti, C Marforio, K Kostiainen, C Soriente, S Capkun
Proceedings of the 31st Annual Computer Security Applications Conference …
, 2015
3
2015
Smartphone Security: New Applications and Challenges
C Marforio
ETH Zurich
, 2016
1
2016
Logical Partitions on Many-Core Platforms
S Capkun, C Soriente, C Marforio, K Kostiainen, RJ Masti
Proceedings of the 31st Annual Computer Security Applications Conference
, 2015
2015
METHOD AND DEVICES FOR SECURE DELETION OF DATA IN A LOG STRUCTURED FILE SYSTEM
S CAPKUN, D BASIN, J REARDON, C MARFORIO
WO Patent 2,012,167,392
, 2012
2012
Timed data deletion on mobile communication devices
C Marforio
Swiss Federal Institute of Technology, Department of Computer Science …
, 2010
2010
Isolation on Many-core Architectures
RJ Masti, D Rai, C Marforio, S Čapkun
The system can't perform the operation now. Try again later.
Articles 1–20
Show more
Privacy
Terms
Help
About Scholar
Search help