Skip to main content

Showing 1–4 of 4 results for author: Ulqinaku, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2011.13979  [pdf, other

    cs.CR cs.HC

    IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients

    Authors: Ivo Sluganovic, Enis Ulqinaku, Aritra Dhar, Daniele Lain, Srdjan Capkun, Ivan Martinovic

    Abstract: Remote services and applications that users access via their local clients (laptops or desktops) usually assume that, following a successful user authentication at the beginning of the session, all subsequent communication reflects the user's intent. However, this is not true if the adversary gains control of the client and can therefore manipulate what the user sees and what is sent to the remote… ▽ More

    Submitted 27 November, 2020; originally announced November 2020.

  2. arXiv:2010.14417  [pdf, other

    cs.CR

    2FE: Two-Factor Encryption for Cloud Storage

    Authors: Anders Dalskov, Daniele Lain, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun

    Abstract: Encrypted cloud storage services are steadily increasing in popularity, with many commercial solutions currently available. In such solutions, the cloud storage is trusted for data availability, but not for confidentiality. Additionally, the user's device is considered secure, and the user is expected to behave correctly. We argue that such assumptions are not met in reality: e.g., users routine… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: 18 pages, 7 figures

  3. arXiv:1905.10141  [pdf, other

    cs.CR cs.HC cs.OS

    Scan-and-Pay on Android is Dangerous

    Authors: Enis Ulqinaku, Julinda Stefa, Alessandro Mei

    Abstract: Mobile payments have increased significantly in the recent years and one-to-one money transfers are offered by a wide variety of smartphone applications. These applications usually support scan-and-pay -- a technique that allows a payer to easily scan the destination address of the payment directly from the payee's smartphone screen. This technique is pervasive because it does not require any part… ▽ More

    Submitted 24 May, 2019; originally announced May 2019.

    Comments: Published in Infocom MobiSec Workshop 2019, Paris, France

  4. arXiv:1611.01477  [pdf, other

    cs.CR

    Using Hover to Compromise the Confidentiality of User Input on Android

    Authors: Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun

    Abstract: We show that the new hover (floating touch) technology, available in a number of today's smartphone models, can be abused by any Android application running with a common SYSTEM_ALERT_WINDOW permission to record all touchscreen input into other applications. Leveraging this attack, a malicious application running on the system is therefore able to profile user's behavior, capture sensitive input s… ▽ More

    Submitted 2 August, 2017; v1 submitted 4 November, 2016; originally announced November 2016.

    Comments: 11 pages