Zum Hauptinhalt springen

Showing 1–8 of 8 results for author: Stefa, J

Searching in archive cs. Search in all archives.
.
  1. The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations

    Authors: Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa

    Abstract: Cryptocurrencies are increasingly popular. Even people who are not experts have started to invest in these assets, and nowadays, cryptocurrency exchanges process transactions for over 100 billion US dollars per month. Despite this, many cryptocurrencies have low liquidity and are highly prone to market manipulation. This paper performs an in-depth analysis of two market manipulations organized by… ▽ More

    Submitted 2 September, 2024; v1 submitted 3 May, 2021; originally announced May 2021.

    Comments: Extended journal extension of arXiv:2005.06610

    Journal ref: ACM Transactions on Internet Technology 23, 1, Article 11 (February 2023), 28 pages

  2. arXiv:2005.06610  [pdf, ps, other

    cs.CY cs.CR cs.LG q-fin.ST

    Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations

    Authors: Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa

    Abstract: In the last years, cryptocurrencies are increasingly popular. Even people who are not experts have started to invest in these securities and nowadays cryptocurrency exchanges process transactions for over 100 billion US dollars per month. However, many cryptocurrencies have low liquidity and therefore they are highly prone to market manipulation schemes. In this paper, we perform an in-depth analy… ▽ More

    Submitted 2 September, 2024; v1 submitted 4 May, 2020; originally announced May 2020.

    Comments: Accepted for publication at The 29th International Conference on Computer Communications and Networks (ICCCN 2020)

  3. GDPR: When the Right to Access Personal Data Becomes a Threat

    Authors: Luca Bufalieri, Massimo La Morgia, Alessandro Mei, Julinda Stefa

    Abstract: After one year since the entry into force of the GDPR, all web sites and data controllers have updated their procedures to store users' data. The GDPR does not only cover how and what data should be saved by the service providers, but it also guarantees an easy way to know what data are collected and the freedom to export them. In this paper, we carry out a comprehensive study on the right to ac… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: Accepted for publication at IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS) 2020

  4. arXiv:1905.10141  [pdf, other

    cs.CR cs.HC cs.OS

    Scan-and-Pay on Android is Dangerous

    Authors: Enis Ulqinaku, Julinda Stefa, Alessandro Mei

    Abstract: Mobile payments have increased significantly in the recent years and one-to-one money transfers are offered by a wide variety of smartphone applications. These applications usually support scan-and-pay -- a technique that allows a payer to easily scan the destination address of the payment directly from the payee's smartphone screen. This technique is pervasive because it does not require any part… ▽ More

    Submitted 24 May, 2019; originally announced May 2019.

    Comments: Published in Infocom MobiSec Workshop 2019, Paris, France

  5. arXiv:1611.01477  [pdf, other

    cs.CR

    Using Hover to Compromise the Confidentiality of User Input on Android

    Authors: Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun

    Abstract: We show that the new hover (floating touch) technology, available in a number of today's smartphone models, can be abused by any Android application running with a common SYSTEM_ALERT_WINDOW permission to record all touchscreen input into other applications. Leveraging this attack, a malicious application running on the system is therefore able to profile user's behavior, capture sensitive input s… ▽ More

    Submitted 2 August, 2017; v1 submitted 4 November, 2016; originally announced November 2016.

    Comments: 11 pages

  6. arXiv:1007.5240  [pdf, ps, other

    cs.NI

    Social-Aware Forwarding Improves Routing Performance in Pocket Switched Networks

    Authors: Josep Diaz, Alberto Marchetti-Spaccamela, Dieter Mitsche, Paolo Santi, Julinda Stefa

    Abstract: Several social-aware forwarding strategies have been recently introduced in opportunistic networks, and proved effective in considerably in- creasing routing performance through extensive simulation studies based on real-world data. However, this performance improvement comes at the expense of storing a considerable amount of state information (e.g, history of past encounters) at the nodes. Hence,… ▽ More

    Submitted 17 February, 2012; v1 submitted 28 July, 2010; originally announced July 2010.

  7. arXiv:0809.2730  [pdf, ps, other

    cs.DC cs.NI

    SWIM: A Simple Model to Generate Small Mobile Worlds

    Authors: Alessandro Mei, Julinda Stefa

    Abstract: This paper presents small world in motion (SWIM), a new mobility model for ad-hoc networking. SWIM is relatively simple, is easily tuned by setting just a few parameters, and generates traces that look real--synthetic traces have the same statistical properties of real traces. SWIM shows experimentally and theoretically the presence of the power law and exponential decay dichotomy of inter-conta… ▽ More

    Submitted 22 January, 2009; v1 submitted 16 September, 2008; originally announced September 2008.

    Comments: Accepted for publication in IEEE INFOCOM 09, Rio de Janeiro, Brazil, April 2009

    ACM Class: C.2; C.2.1; C.2.2; C.4

  8. arXiv:0711.0892  [pdf, other

    cs.NI

    Routing in Outer Space: Improved Security and Energy-Efficiency in Multi-Hop Wireless Networks

    Authors: Alessandro Mei, Julinda Stefa

    Abstract: In this paper we consider security-related and energy-efficiency issues in multi-hop wireless networks. We start our work from the observation, known in the literature, that shortest path routing creates congested areas in multi-hop wireless networks. These areas are critical--they generate both security and energy efficiency issues. We attack these problems and set out routing in outer space, a… ▽ More

    Submitted 6 November, 2007; originally announced November 2007.

    Comments: Short version invited to INFOCOM 2008 mini-conference

    ACM Class: C.2.2