I got the impression that the research was about in store only zero-confirmation transactions, and Finney attack is impractical in those settings.
…
No, you misunderstand the Finney attack.
The finney attack is:
(1) I mine a block with a containing a spend of one of my coins to myself, but I don't instantly announce it.
(2) Instantly after that I hand you a unconfirmed transaction spending the same coin.
(3) You do all the network sniffing and probing and checking with miners you like, seeing no double-spends you give up the goods.
(4) I announce the block. You lose. (probably) And if lose you don't know I tried, so I'll just get you next time.
In other words, I make the zero conf you accepted invalid by being absolutely sure that the conflicting txn will win— on account of already having it mined at my expense/risk.
The value I lose depends on how long I delay the block. Modest delays don't cost much— and this cost, in terms of bitcoin at least, will soon be halving.
Sniffing, checking, double spend propagation, and whatever can't avoid this... and it can be scaled by attacking many vulnerable things in parallel.
Of course, zero-confirmation transactions are unsafe absent a finney attack too; as the attacker can announce conflicts to miners and roll the dice on which version will get confirmed. Various somewhat complicated things can be done to reduce the risk in the non-Finney case by noticing a double spend (and one way of making propagated double spend alerts not be a huge DOS vulnerability
was posted to bitcoin-dev about a year ago), but because they don't do anything for the Finney case, I'm skeptical that they're really worth implementing: Even with them the advice really needs to be that you should not accept zero confirmation transactions when you don't have any bitcoin external recourse or assurance, or you're at least rate limited in a way that you can't be robbed blind. For digital goods transactions this is a bit unfortunate... but in a some other cases you have some other recourse and even if it's limited it's probably enough to mitigate.