Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nils Ole Tippenhauer
@article{DBLP:journals/corr/abs-2403-14963, author = {Taekkyung Oh and Sangwook Bae and Junho Ahn and Yonghwa Lee and Dinh{-}Tuan Hoang and Min Suk Kang and Nils Ole Tippenhauer and Yongdae Kim}, title = {Enabling Physical Localization of Uncooperative Cellular Devices}, journal = {CoRR}, volume = {abs/2403.14963}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.14963}, doi = {10.48550/ARXIV.2403.14963}, eprinttype = {arXiv}, eprint = {2403.14963}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-14963.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/BerardiTMPC23, author = {Davide Berardi and Nils Ole Tippenhauer and Andrea Melis and Marco Prandini and Franco Callegati}, title = {Time sensitive networking security: issues of precision time protocol and its implementation}, journal = {Cybersecur.}, volume = {6}, number = {1}, pages = {8}, year = {2023}, url = {https://doi.org/10.1186/s42400-023-00140-5}, doi = {10.1186/S42400-023-00140-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/BerardiTMPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchluterCHTN00R23, author = {Till Schl{\"{u}}ter and Amit Choudhari and Lorenz Hetterich and Leon Trampert and Hamed Nemati and Ahmad Ibrahim and Michael Schwarz and Christian Rossow and Nils Ole Tippenhauer}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {975--989}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623124}, doi = {10.1145/3576915.3623124}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchluterCHTN00R23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpss/Walita0CT23, author = {Tim Walita and Alessandro Erba and John Henry Castellanos and Nils Ole Tippenhauer}, editor = {Rodrigo Roman and Mujeeb Ahmed}, title = {Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks}, booktitle = {Proceedings of the 9th {ACM} Cyber-Physical System Security Workshop, {CPSS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {36--47}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3592538.3594271}, doi = {10.1145/3592538.3594271}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpss/Walita0CT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/0001T23, author = {Alessandro Erba and Nils Ole Tippenhauer}, editor = {Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati}, title = {White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, {DIMVA} 2023, Hamburg, Germany, July 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13959}, pages = {111--131}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35504-2\_6}, doi = {10.1007/978-3-031-35504-2\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/0001T23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/DingCHTMZ23, author = {Aolin Ding and Matthew Chan and Amin Hass and Nils Ole Tippenhauer and Shiqing Ma and Saman A. Zonouz}, title = {Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles}, booktitle = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023}, pages = {67--80}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSN58367.2023.00020}, doi = {10.1109/DSN58367.2023.00020}, timestamp = {Tue, 15 Aug 2023 11:43:57 +0200}, biburl = {https://dblp.org/rec/conf/dsn/DingCHTMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BytesRDM0T23, author = {Andrei Bytes and Prashant Hari Narayan Rajput and Constantine Doumanidis and Michail Maniatakos and Jianying Zhou and Nils Ole Tippenhauer}, title = {FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network}, booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18, 2023}, pages = {499--512}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607199.3607226}, doi = {10.1145/3607199.3607226}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BytesRDM0T23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2023, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482}, doi = {10.1145/3558482}, isbn = {978-1-4503-9859-6}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-13131, author = {Yi Han and Matthew Chan and Eric Wengrowski and Zhuohuan Li and Nils Ole Tippenhauer and Mani B. Srivastava and Saman A. Zonouz and Luis Garcia}, title = {Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations}, journal = {CoRR}, volume = {abs/2307.13131}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.13131}, doi = {10.48550/ARXIV.2307.13131}, eprinttype = {arXiv}, eprint = {2307.13131}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-13131.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/BreitenbacherHA22, author = {Dominik Breitenbacher and Ivan Homoliak and Yan Lin Aung and Yuval Elovici and Nils Ole Tippenhauer}, title = {HADES-IoT: {A} Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version)}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {12}, pages = {9640--9658}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3135789}, doi = {10.1109/JIOT.2021.3135789}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/BreitenbacherHA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangHRTO22, author = {Xueou Wang and Xiaolu Hou and Ruben Rios and Nils Ole Tippenhauer and Mart{\'{\i}}n Ochoa}, title = {Constrained Proximity Attacks on Mobile Targets}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {2}, pages = {10:1--10:29}, year = {2022}, url = {https://doi.org/10.1145/3498543}, doi = {10.1145/3498543}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WangHRTO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Esquivel-Vargas22, author = {Herson Esquivel{-}Vargas and John Henry Castellanos and Marco Caselli and Nils Ole Tippenhauer and Andreas Peter}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {170--192}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_9}, doi = {10.1007/978-3-031-09234-3\_9}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/Esquivel-Vargas22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ErbaT22, author = {Alessandro Erba and Nils Ole Tippenhauer}, title = {Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {412--426}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564633}, doi = {10.1145/3564625.3564633}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ErbaT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/AntonioliTRP22, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen and Mathias Payer}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {196--207}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3523258}, doi = {10.1145/3488932.3523258}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/AntonioliTRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ErbaMT22, author = {Alessandro Erba and Anne M{\"{u}}ller and Nils Ole Tippenhauer}, editor = {Earlence Fernandes and Cristina Alcaraz}, title = {Security Analysis of Vendor Implementations of the {OPC} {UA} Protocol for Industrial Control Systems}, booktitle = {Proceedings of the 4th Workshop on {CPS} {\&} IoT Security and Privacy, CPSIOTSEC@CCS 2022, Los Angeles, CA, USA, 7 November 2022}, pages = {1--13}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560826.3563380}, doi = {10.1145/3560826.3563380}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ErbaMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Tippenhauer22, author = {Nils Ole Tippenhauer}, editor = {Mark Yampolskiy and Moti Yung}, title = {D{\'{e}}j{\`{a}} Vu? Challenges and Opportunities for {AM} Security from an {ICS} perspective}, booktitle = {Proceedings of the 2022 {ACM} {CCS} Workshop on Additive Manufacturing {(3D} Printing) Security, Los Angeles, CA, USA, 11 November 2022}, pages = {1}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560833.3563556}, doi = {10.1145/3560833.3563556}, timestamp = {Fri, 11 Nov 2022 23:46:54 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Tippenhauer22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0002NSTR22, author = {Ahmad Ibrahim and Hamed Nemati and Till Schl{\"{u}}ter and Nils Ole Tippenhauer and Christian Rossow}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1489--1503}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560613}, doi = {10.1145/3548606.3560613}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0002NSTR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HanCATZ22, author = {Yi Han and Matthew Chan and Zahra Aref and Nils Ole Tippenhauer and Saman A. Zonouz}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {661--678}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/han}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/HanCATZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/GhaeiniT22, author = {Hamid Reza Ghaeini and Nils Ole Tippenhauer}, title = {Smooth Transition of Vehicles' Maximum Speed for Lane Detection based on Computer Vision}, booktitle = {96th Vehicular Technology Conference, {VTC} Fall 2022, London, United Kingdom, September 26-29, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTC2022-Fall57202.2022.10012739}, doi = {10.1109/VTC2022-FALL57202.2022.10012739}, timestamp = {Tue, 24 Jan 2023 16:39:10 +0100}, biburl = {https://dblp.org/rec/conf/vtc/GhaeiniT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-09106, author = {Herson Esquivel{-}Vargas and John Henry Castellanos and Marco Caselli and Nils Ole Tippenhauer and Andreas Peter}, title = {Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge}, journal = {CoRR}, volume = {abs/2204.09106}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.09106}, doi = {10.48550/ARXIV.2204.09106}, eprinttype = {arXiv}, eprint = {2204.09106}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-09106.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-13958, author = {Ahmad Ibrahim and Hamed Nemati and Till Schl{\"{u}}ter and Nils Ole Tippenhauer and Christian Rossow}, title = {Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels}, journal = {CoRR}, volume = {abs/2211.13958}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.13958}, doi = {10.48550/ARXIV.2211.13958}, eprinttype = {arXiv}, eprint = {2211.13958}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-13958.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TippenhauerCMN21, author = {Nils Ole Tippenhauer and Binbin Chen and Daisuke Mashima and David M. Nicol}, editor = {Michail Maniatakos and Cristina Alcaraz}, title = {vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation}, booktitle = {CPSIoTSec '21: Proceedings of the 2th Workshop on CPS{\&}IoT Security and Privacy, Virtual Event, Republic of Korea, 15 November 2021}, pages = {3--14}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3462633.3483983}, doi = {10.1145/3462633.3483983}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TippenhauerCMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/BarbieriCTT21, author = {Giovanni Barbieri and Mauro Conti and Nils Ole Tippenhauer and Federico Turrin}, title = {Assessing the Use of Insecure {ICS} Protocols via {IXP} Network Traffic Analysis}, booktitle = {30th International Conference on Computer Communications and Networks, {ICCCN} 2021, Athens, Greece, July 19-22, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCN52240.2021.9522219}, doi = {10.1109/ICCCN52240.2021.9522219}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/BarbieriCTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/AlsolimanRLPTC21, author = {Anas Alsoliman and Giulio Rigoni and Marco Levorato and Cristina M. Pinotti and Nils Ole Tippenhauer and Mauro Conti}, title = {{COTS} Drone Detection using Video Streaming Characteristics}, booktitle = {{ICDCN} '21: International Conference on Distributed Computing and Networking, Virtual Event, Nara, Japan, January 5-8, 2021}, pages = {166--175}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3427796.3428480}, doi = {10.1145/3427796.3428480}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/AlsolimanRLPTC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuWAPTXTB21, author = {Jianliang Wu and Ruoyu Wu and Daniele Antonioli and Mathias Payer and Nils Ole Tippenhauer and Dongyan Xu and Dave (Jing) Tian and Antonio Bianchi}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{LIGHTBLUE:} Automatic Profile-Aware Debloating of Bluetooth Stacks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {339--356}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wu-jianliang}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/WuWAPTXTB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2021-1, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12726}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78372-3}, doi = {10.1007/978-3-030-78372-3}, isbn = {978-3-030-78371-6}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2021-2, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12727}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78375-4}, doi = {10.1007/978-3-030-78375-4}, isbn = {978-3-030-78374-7}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cpss/2021, editor = {Jiannong Cao and Man Ho Au and Mauro Conti and Nils Ole Tippenhauer and Alessandro Brighente}, title = {Proceedings of the 7th {ACM} on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021}, publisher = {{ACM}}, year = {2021}, url = {https://dl.acm.org/doi/proceedings/10.1145/3457339}, doi = {10.1145/3457339}, isbn = {978-1-4503-8402-5}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpss/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-06051, author = {Alessandro Erba and Anne M{\"{u}}ller and Nils Ole Tippenhauer}, title = {Practical Pitfalls for Security in {OPC} {UA}}, journal = {CoRR}, volume = {abs/2104.06051}, year = {2021}, url = {https://arxiv.org/abs/2104.06051}, eprinttype = {arXiv}, eprint = {2104.06051}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-06051.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/TroncosoPHSLLSP20, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda Gurses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {36--66}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p36.pdf}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AntonioliTR20, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen}, title = {Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {3}, pages = {14:1--14:28}, year = {2020}, url = {https://doi.org/10.1145/3394497}, doi = {10.1145/3394497}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AntonioliTR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ErbaTGPCZT20, author = {Alessandro Erba and Riccardo Taormina and Stefano Galelli and Marcello Pogliani and Michele Carminati and Stefano Zanero and Nils Ole Tippenhauer}, title = {Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {480--495}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427660}, doi = {10.1145/3427228.3427660}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ErbaTGPCZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Tippenhauer20, author = {Nils Ole Tippenhauer}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Trust, But Verify? Perspectives On Industrial Device Security}, booktitle = {Proceedings of the 6th {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {1}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384941.3409593}, doi = {10.1145/3384941.3409593}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Tippenhauer20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TurrinETC20, author = {Federico Turrin and Alessandro Erba and Nils Ole Tippenhauer and Mauro Conti}, editor = {Michail Maniatakos and Yuqing Zhang}, title = {A Statistical Analysis Framework for {ICS} Process Datasets}, booktitle = {CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS{\&}IoT Security and Privacy, Virtual Event, USA, November 9, 2020}, pages = {25--30}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411498.3419961}, doi = {10.1145/3411498.3419961}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TurrinETC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AntonioliTR20, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen}, title = {{BIAS:} Bluetooth Impersonation AttackS}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {549--562}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00093}, doi = {10.1109/SP40000.2020.00093}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AntonioliTR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-12273, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Edouard Bugnion and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda F. G{\"{u}}rses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {CoRR}, volume = {abs/2005.12273}, year = {2020}, url = {https://arxiv.org/abs/2005.12273}, eprinttype = {arXiv}, eprint = {2005.12273}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-01114, author = {Giovanni Barbieri and Mauro Conti and Nils Ole Tippenhauer and Federico Turrin}, title = {Sorry, Shodan is not Enough! Assessing {ICS} Security via {IXP} Network Traffic Analysis}, journal = {CoRR}, volume = {abs/2007.01114}, year = {2020}, url = {https://arxiv.org/abs/2007.01114}, eprinttype = {arXiv}, eprint = {2007.01114}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-01114.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-11776, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen and Mathias Payer}, title = {BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy}, journal = {CoRR}, volume = {abs/2009.11776}, year = {2020}, url = {https://arxiv.org/abs/2009.11776}, eprinttype = {arXiv}, eprint = {2009.11776}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-11776.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-03586, author = {Alessandro Erba and Nils Ole Tippenhauer}, title = {No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems}, journal = {CoRR}, volume = {abs/2012.03586}, year = {2020}, url = {https://arxiv.org/abs/2012.03586}, eprinttype = {arXiv}, eprint = {2012.03586}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-03586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/envsoft/TaorminaGDTSO19, author = {Riccardo Taormina and Stefano Galelli and Hunter C. Douglas and Nils Ole Tippenhauer and Elad Salomons and Avi Ostfeld}, title = {A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems}, journal = {Environ. Model. Softw.}, volume = {112}, pages = {46--51}, year = {2019}, url = {https://doi.org/10.1016/j.envsoft.2018.11.008}, doi = {10.1016/J.ENVSOFT.2018.11.008}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/envsoft/TaorminaGDTSO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GhaeiniTZ19, author = {Hamid Reza Ghaeini and Nils Ole Tippenhauer and Jianying Zhou}, title = {Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {80:1--80:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340331}, doi = {10.1145/3339252.3340331}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/GhaeiniTZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GiraldoUCT19, author = {Jairo Giraldo and David I. Urbina and Alvaro A. C{\'{a}}rdenas and Nils Ole Tippenhauer}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {175--195}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_9}, doi = {10.1007/978-3-030-21568-2\_9}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/GiraldoUCT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BreitenbacherHA19, author = {Dominik Breitenbacher and Ivan Homoliak and Yan Lin Aung and Nils Ole Tippenhauer and Yuval Elovici}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {HADES-IoT: {A} Practical Host-Based Anomaly Detection System for IoT Devices}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {479--484}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329847}, doi = {10.1145/3321705.3329847}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BreitenbacherHA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TippenhauerW19, author = {Nils Ole Tippenhauer and Avishai Wool}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {{CPS-SPC} 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2695--2696}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3353549}, doi = {10.1145/3319535.3353549}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TippenhauerW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/TambeASOTSE19, author = {Amit Tambe and Yan Lin Aung and Ragav Sridharan and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Asaf Shabtai and Yuval Elovici}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {85--96}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300024}, doi = {10.1145/3292006.3300024}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/TambeASOTSE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AntonioliTR19, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Bonne Rasmussen}, title = {Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/nearby-threats-reversing-analyzing-and-attacking-googles-nearby-connections-on-android/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AntonioliTR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GhaeiniCBBG0STZ19, author = {Hamid Reza Ghaeini and Matthew Chan and Raad Bahmani and Ferdinand Brasser and Luis Garcia and Jianying Zhou and Ahmad{-}Reza Sadeghi and Nils Ole Tippenhauer and Saman A. Zonouz}, title = {PAtt: Physics-based Attestation of Control Systems}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {165--180}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/ghaeini}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GhaeiniCBBG0STZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AntonioliTR19, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Bonne Rasmussen}, editor = {Nadia Heninger and Patrick Traynor}, title = {The {KNOB} is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth {BR/EDR}}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1047--1061}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/AntonioliTR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/Tippenhauer19, author = {Nils Ole Tippenhauer}, editor = {Cristina Alcaraz}, title = {Design and Realization of Testbeds for Security Research in the Industrial Internet of Things}, booktitle = {Security and Privacy Trends in the Industrial Internet of Things}, pages = {287--310}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12330-7\_14}, doi = {10.1007/978-3-030-12330-7\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/Tippenhauer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-01027, author = {Dominik Breitenbacher and Ivan Homoliak and Yan Lin Aung and Nils Ole Tippenhauer and Yuval Elovici}, title = {HADES-IoT: {A} Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version)}, journal = {CoRR}, volume = {abs/1905.01027}, year = {2019}, url = {http://arxiv.org/abs/1905.01027}, eprinttype = {arXiv}, eprint = {1905.01027}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-01027.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10922, author = {Yael Mathov and Noga Agmon and Asaf Shabtai and Rami Puzis and Nils Ole Tippenhauer and Yuval Elovici}, title = {Challenges for Security Assessment of Enterprises in the IoT Era}, journal = {CoRR}, volume = {abs/1906.10922}, year = {2019}, url = {http://arxiv.org/abs/1906.10922}, eprinttype = {arXiv}, eprint = {1906.10922}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10922.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-07487, author = {Alessandro Erba and Riccardo Taormina and Stefano Galelli and Marcello Pogliani and Michele Carminati and Stefano Zanero and Nils Ole Tippenhauer}, title = {Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems}, journal = {CoRR}, volume = {abs/1907.07487}, year = {2019}, url = {http://arxiv.org/abs/1907.07487}, eprinttype = {arXiv}, eprint = {1907.07487}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-07487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AntonioliTR19, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen}, title = {Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {933}, year = {2019}, url = {https://eprint.iacr.org/2019/933}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AntonioliTR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/GiraldoUCVFRTSC18, author = {Jairo Giraldo and David I. Urbina and Alvaro A. C{\'{a}}rdenas and Junia Valente and Mustafa Amir Faisal and Justin Ruths and Nils Ole Tippenhauer and Henrik Sandberg and Richard Candell}, title = {A Survey of Physics-Based Attack Detection in Cyber-Physical Systems}, journal = {{ACM} Comput. Surv.}, volume = {51}, number = {4}, pages = {76:1--76:36}, year = {2018}, url = {https://doi.org/10.1145/3203245}, doi = {10.1145/3203245}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/GiraldoUCVFRTSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SiddiqiTMC18, author = {Ahnaf Siddiqi and Nils Ole Tippenhauer and Daisuke Mashima and Binbin Chen}, editor = {Dieter Gollmann and Jianying Zhou}, title = {On Practical Threat Scenario Testing in an Electric Power {ICS} Testbed}, booktitle = {Proceedings of the 4th {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {15--21}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3198458.3198461}, doi = {10.1145/3198458.3198461}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SiddiqiTMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RashidT18, author = {Awais Rashid and Nils Ole Tippenhauer}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {{CPS-SPC} 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2171--2172}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243874}, doi = {10.1145/3243734.3243874}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RashidT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangHRHTO18, author = {Xueou Wang and Xiaolu Hou and Ruben Rios and Per A. Hallgren and Nils Ole Tippenhauer and Mart{\'{\i}}n Ochoa}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {373--392}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_19}, doi = {10.1007/978-3-319-98989-1\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangHRHTO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/GhaeiniABST18, author = {Hamid Reza Ghaeini and Daniele Antonioli and Ferdinand Brasser and Ahmad{-}Reza Sadeghi and Nils Ole Tippenhauer}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {State-aware anomaly detection for industrial control systems}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {1620--1628}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167305}, doi = {10.1145/3167132.3167305}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/GhaeiniABST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SridharanMT18, author = {Ragav Sridharan and Rajib Ranjan Maiti and Nils Ole Tippenhauer}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {{WADAC:} Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {51--62}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212495}, doi = {10.1145/3212480.3212495}, timestamp = {Mon, 16 Sep 2019 13:25:53 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SridharanMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-00152, author = {Daniele Antonioli and Giuseppe Bernieri and Nils Ole Tippenhauer}, title = {Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot}, journal = {CoRR}, volume = {abs/1802.00152}, year = {2018}, url = {http://arxiv.org/abs/1802.00152}, eprinttype = {arXiv}, eprint = {1802.00152}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-00152.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CastellanosATO17, author = {John Henry Castellanos and Daniele Antonioli and Nils Ole Tippenhauer and Mart{\'{\i}}n Ochoa}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Legacy-Compliant Data Authentication for Industrial Control System Traffic}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {665--685}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_33}, doi = {10.1007/978-3-319-61204-1\_33}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CastellanosATO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AntonioliST17, author = {Daniele Antonioli and Sandra Siby and Nils Ole Tippenhauer}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {Practical Evaluation of Passive {COTS} Eavesdropping in 802.11b/n/ac {WLAN}}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {415--435}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_19}, doi = {10.1007/978-3-030-02641-7\_19}, timestamp = {Wed, 25 Sep 2019 18:04:17 +0200}, biburl = {https://dblp.org/rec/conf/cans/AntonioliST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SibyMT17, author = {Sandra Siby and Rajib Ranjan Maiti and Nils Ole Tippenhauer}, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {IoTScanner: Detecting Privacy Threats in IoT Neighborhoods}, booktitle = {Proceedings of the 3rd {ACM} International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {23--30}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055245.3055253}, doi = {10.1145/3055245.3055253}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SibyMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuarnizoTBOTSE17, author = {Juan David Guarnizo and Amit Tambe and Suman Sankar Bhunia and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Asaf Shabtai and Yuval Elovici}, editor = {Jianying Zhou and Ernesto Damiani}, title = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {57--68}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055186.3055192}, doi = {10.1145/3055186.3055192}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuarnizoTBOTSE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AntonioliGAOT17, author = {Daniele Antonioli and Hamid Reza Ghaeini and Sridhar Adepu and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer}, editor = {Bhavani Thuraisingham and Rakesh B. Bobba and Awais Rashid}, title = {Gamifying {ICS} Security Training and Research: Design, Implementation, and Results of {S3}}, booktitle = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017}, pages = {93--102}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140241.3140253}, doi = {10.1145/3140241.3140253}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AntonioliGAOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RocchettoT17, author = {Marco Rocchetto and Nils Ole Tippenhauer}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Towards Formal Security Analysis of Industrial Control Systems}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {114--126}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053024}, doi = {10.1145/3052973.3053024}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RocchettoT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GovilAT17, author = {Naman Govil and Anand Agrawal and Nils Ole Tippenhauer}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {On Ladder Logic Bombs in Industrial Control Systems}, booktitle = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, pages = {110--126}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72817-9\_8}, doi = {10.1007/978-3-319-72817-9\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GovilAT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaitiSST17, author = {Rajib Ranjan Maiti and Sandra Siby and Ragav Sridharan and Nils Ole Tippenhauer}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Link-Layer Device Type Classification on Encrypted Wireless Traffic with {COTS} Radios}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {247--264}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_14}, doi = {10.1007/978-3-319-66399-9\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MaitiSST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/MeidanBSGOTE17, author = {Yair Meidan and Michael Bohadana and Asaf Shabtai and Juan David Guarnizo and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Yuval Elovici}, editor = {Ahmed Seffah and Birgit Penzenstadler and Carina Alves and Xin Peng}, title = {ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis}, booktitle = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech, Morocco, April 3-7, 2017}, pages = {506--509}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3019612.3019878}, doi = {10.1145/3019612.3019878}, timestamp = {Wed, 01 Feb 2023 17:58:48 +0100}, biburl = {https://dblp.org/rec/conf/sac/MeidanBSGOTE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GuarnizoTBOTSE17, author = {Juan Guarnizo and Amit Tambe and Suman Sankar Bhunia and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Asaf Shabtai and Yuval Elovici}, title = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots}, journal = {CoRR}, volume = {abs/1701.02446}, year = {2017}, url = {http://arxiv.org/abs/1701.02446}, eprinttype = {arXiv}, eprint = {1701.02446}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GuarnizoTBOTSE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SibyMT17, author = {Sandra Siby and Rajib Ranjan Maiti and Nils Ole Tippenhauer}, title = {IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods}, journal = {CoRR}, volume = {abs/1701.05007}, year = {2017}, url = {http://arxiv.org/abs/1701.05007}, eprinttype = {arXiv}, eprint = {1701.05007}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SibyMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AntonioliGAOT17, author = {Daniele Antonioli and Hamid Reza Ghaeini and Sridhar Adepu and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer}, title = {Gamifying Education and Research on {ICS} Security: Design, Implementation and Results of {S3}}, journal = {CoRR}, volume = {abs/1702.03067}, year = {2017}, url = {http://arxiv.org/abs/1702.03067}, eprinttype = {arXiv}, eprint = {1702.03067}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AntonioliGAOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GovilAT17, author = {Naman Govil and Anand Agrawal and Nils Ole Tippenhauer}, title = {On Ladder Logic Bombs in Industrial Control Systems}, journal = {CoRR}, volume = {abs/1702.05241}, year = {2017}, url = {http://arxiv.org/abs/1702.05241}, eprinttype = {arXiv}, eprint = {1702.05241}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GovilAT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-04647, author = {Yair Meidan and Michael Bohadana and Asaf Shabtai and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Juan David Guarnizo and Yuval Elovici}, title = {Detection of Unauthorized IoT Devices Using Machine Learning Techniques}, journal = {CoRR}, volume = {abs/1709.04647}, year = {2017}, url = {http://arxiv.org/abs/1709.04647}, eprinttype = {arXiv}, eprint = {1709.04647}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-04647.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TippenhauerRC16, author = {Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Physical-layer integrity for wireless messages}, journal = {Comput. Networks}, volume = {109}, pages = {31--38}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.021}, doi = {10.1016/J.COMNET.2016.06.021}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TippenhauerRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmpt/NaithGTT16, author = {Qamar Hamid Naith and Hamid Reza Ghaeini and Nils Ole Tippenhauer and Alicia Trivi{\~{n}}o{-}Cabrera}, title = {Unequal Importance Multipath Video Streaming for Wireless Networks}, journal = {J. Multim. Process. Technol.}, volume = {7}, number = {3}, pages = {91--101}, year = {2016}, url = {http://www.dline.info/jmpt/fulltext/v7n3/jmptv7n3\_1.pdf}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmpt/NaithGTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/SiboniSTLE16, author = {Shachar Siboni and Asaf Shabtai and Nils Ole Tippenhauer and Jemin Lee and Yuval Elovici}, title = {Advanced Security Testbed Framework for Wearable IoT Devices}, journal = {{ACM} Trans. Internet Techn.}, volume = {16}, number = {4}, pages = {26:1--26:25}, year = {2016}, url = {https://doi.org/10.1145/2981546}, doi = {10.1145/2981546}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/SiboniSTLE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JansenTP16, author = {Kai Jansen and Nils Ole Tippenhauer and Christina P{\"{o}}pper}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Multi-receiver {GPS} spoofing detection: error models and realization}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {237--250}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991092}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JansenTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AntonioliAT16, author = {Daniele Antonioli and Anand Agrawal and Nils Ole Tippenhauer}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Alvaro A. C{\'{a}}rdenas and Rakesh B. Bobba}, title = {Towards High-Interaction Virtual {ICS} Honeypots-in-a-Box}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {13--22}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994487.2994493}, doi = {10.1145/2994487.2994493}, timestamp = {Sat, 09 Apr 2022 12:37:26 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AntonioliAT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GhaeiniT16, author = {Hamid Reza Ghaeini and Nils Ole Tippenhauer}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Alvaro A. C{\'{a}}rdenas and Rakesh B. Bobba}, title = {{HAMIDS:} Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {103--111}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994487.2994492}, doi = {10.1145/2994487.2994492}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GhaeiniT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UrbinaGCTVFRCS16, author = {David I. Urbina and Jairo Alonso Giraldo and Alvaro A. C{\'{a}}rdenas and Nils Ole Tippenhauer and Junia Valente and Mustafa Amir Faisal and Justin Ruths and Richard Candell and Henrik Sandberg}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Limiting the Impact of Stealthy Attacks on Industrial Control Systems}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1092--1105}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978388}, doi = {10.1145/2976749.2978388}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/UrbinaGCTVFRCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpsweek/MathurT16, author = {Aditya P. Mathur and Nils Ole Tippenhauer}, title = {SWaT: a water treatment testbed for research and training on {ICS} security}, booktitle = {2016 International Workshop on Cyber-physical Systems for Smart Water Networks, CySWater@CPSWeek 2016, Vienna, Austria, April 11, 2016}, pages = {31--36}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CySWater.2016.7469060}, doi = {10.1109/CYSWATER.2016.7469060}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cpsweek/MathurT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DongJTCKSTN16, author = {Xinshu Dong and Sumeet Jauhar and William G. Temple and Binbin Chen and Zbigniew Kalbarczyk and William H. Sanders and Nils Ole Tippenhauer and David M. Nicol}, editor = {Barbara Kordy and Mathias Ekstedt and Dong Seong Kim}, title = {The Right Tool for the Job: {A} Case for Common Input Scenarios for Security Assessment}, booktitle = {Graphical Models for Security - Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9987}, pages = {39--61}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46263-9\_3}, doi = {10.1007/978-3-319-46263-9\_3}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DongJTCKSTN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RocchettoT16, author = {Marco Rocchetto and Nils Ole Tippenhauer}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {On Attacker Models and Profiles for Cyber-Physical Systems}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, pages = {427--449}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3\_22}, doi = {10.1007/978-3-319-45741-3\_22}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RocchettoT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/RocchettoT16, author = {Marco Rocchetto and Nils Ole Tippenhauer}, editor = {Kazuhiro Ogata and Mark Lawford and Shaoying Liu}, title = {{CPDY:} Extending the Dolev-Yao Attacker with Physical-Layer Interactions}, booktitle = {Formal Methods and Software Engineering - 18th International Conference on Formal Engineering Methods, {ICFEM} 2016, Tokyo, Japan, November 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10009}, pages = {175--192}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47846-3\_12}, doi = {10.1007/978-3-319-47846-3\_12}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/icfem/RocchettoT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/UrbinaGTC16, author = {David I. Urbina and Jairo Alonso Giraldo and Nils Ole Tippenhauer and Alvaro A. C{\'{a}}rdenas}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Attacking Fieldbus Communications in {ICS:} Applications to the SWaT Testbed}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {75--89}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-75}, doi = {10.3233/978-1-61499-617-0-75}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sgcrc/UrbinaGTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/TaorminaGTSO16, author = {Riccardo Taormina and Stefano Galelli and Nils Ole Tippenhauer and Elad Salomons and Avi Ostfeld}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Simulation of Cyber-Physical Attacks on Water Distribution Systems with {EPANET}}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {123--130}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-123}, doi = {10.3233/978-1-61499-617-0-123}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/TaorminaGTSO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RocchettoT16, author = {Marco Rocchetto and Nils Ole Tippenhauer}, title = {{CPDY:} Extending the Dolev-Yao Attacker with Physical-Layer Interactions}, journal = {CoRR}, volume = {abs/1607.02562}, year = {2016}, url = {http://arxiv.org/abs/1607.02562}, eprinttype = {arXiv}, eprint = {1607.02562}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RocchettoT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AntonioliT15, author = {Daniele Antonioli and Nils Ole Tippenhauer}, editor = {Indrajit Ray and Roshan K. Thomas and Alvaro A. C{\'{a}}rdenas}, title = {MiniCPS: {A} Toolkit for Security Research on {CPS} Networks}, booktitle = {Proceedings of the First {ACM} Workshop on Cyber-Physical Systems-Security and/or PrivaCy, {CPS-SPC} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {91--100}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808705.2808715}, doi = {10.1145/2808705.2808715}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AntonioliT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TippenhauerLKC15, author = {Nils Ole Tippenhauer and Heinrich Luecken and Marc Kuhn and Srdjan Capkun}, title = {{UWB} rapid-bit-exchange system for distance bounding}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {2:1--2:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766504}, doi = {10.1145/2766498.2766504}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TippenhauerLKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AntonioliT15, author = {Daniele Antonioli and Nils Ole Tippenhauer}, title = {MiniCPS: {A} toolkit for security research on {CPS} Networks}, journal = {CoRR}, volume = {abs/1507.04860}, year = {2015}, url = {http://arxiv.org/abs/1507.04860}, eprinttype = {arXiv}, eprint = {1507.04860}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AntonioliT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/TippenhauerTVCNKS14, author = {Nils Ole Tippenhauer and William G. Temple and An Hoa Vu and Binbin Chen and David M. Nicol and Zbigniew Kalbarczyk and William H. Sanders}, title = {Automatic Generation of Security Argument Graphs}, booktitle = {20th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2014, Singapore, November 18-21, 2014}, pages = {33--42}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PRDC.2014.13}, doi = {10.1109/PRDC.2014.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/TippenhauerTVCNKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/VuTCNK14, author = {An Hoa Vu and Nils Ole Tippenhauer and Binbin Chen and David M. Nicol and Zbigniew Kalbarczyk}, editor = {Gethin Norman and William H. Sanders}, title = {CyberSAGE: {A} Tool for Automatic Security Assessment of Cyber-Physical Systems}, booktitle = {Quantitative Evaluation of Systems - 11th International Conference, {QEST} 2014, Florence, Italy, September 8-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8657}, pages = {384--387}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10696-0\_29}, doi = {10.1007/978-3-319-10696-0\_29}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qest/VuTCNK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TippenhauerTVCNKS14, author = {Nils Ole Tippenhauer and William G. Temple and An Hoa Vu and Binbin Chen and David M. Nicol and Zbigniew Kalbarczyk and William H. Sanders}, title = {Automatic Generation of Security Argument Graphs}, journal = {CoRR}, volume = {abs/1405.7475}, year = {2014}, url = {http://arxiv.org/abs/1405.7475}, eprinttype = {arXiv}, eprint = {1405.7475}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/TippenhauerTVCNKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/ChenKNSTTTVY13, author = {Binbin Chen and Zbigniew Kalbarczyk and David M. Nicol and William H. Sanders and Rui Tan and William G. Temple and Nils Ole Tippenhauer and An Hoa Vu and David K. Y. Yau}, editor = {Mary Ellen Zurko and Konstantin Beznosov and Tara Whalen and Tom Longstaff}, title = {Go with the flow: toward workflow-oriented security assessment}, booktitle = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September 9-12, 2013}, pages = {65--76}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535813.2535821}, doi = {10.1145/2535813.2535821}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/ChenKNSTTTVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/TempleCT13, author = {William G. Temple and Binbin Chen and Nils Ole Tippenhauer}, title = {Delay makes a difference: Smart grid resilience under remote meter disconnect attack}, booktitle = {{IEEE} Fourth International Conference on Smart Grid Communications, SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013}, pages = {462--467}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SmartGridComm.2013.6688001}, doi = {10.1109/SMARTGRIDCOMM.2013.6688001}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartgridcomm/TempleCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TippenhauerMRC13, author = {Nils Ole Tippenhauer and Luka Malisa and Aanjhan Ranganathan and Srdjan Capkun}, title = {On Limitations of Friendly Jamming for Confidentiality}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {160--173}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.21}, doi = {10.1109/SP.2013.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TippenhauerMRC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Tippenhauer12, author = {Nils Ole Tippenhauer}, title = {Physical-layer security aspects of wireless localization}, school = {{ETH} Zurich, Z{\"{u}}rich, Switzerland}, year = {2012}, url = {https://hdl.handle.net/20.500.11850/53642}, doi = {10.3929/ETHZ-A-7352063}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Tippenhauer12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/TippenhauerGM12, author = {Nils Ole Tippenhauer and Domenico Giustiniano and Stefan Mangold}, title = {Toys communicating with LEDs: Enabling toy cars interaction}, booktitle = {2012 {IEEE} Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, January 14-17, 2012}, pages = {48--49}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCNC.2012.6181045}, doi = {10.1109/CCNC.2012.6181045}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/TippenhauerGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RanganathanTSSC12, author = {Aanjhan Ranganathan and Nils Ole Tippenhauer and Boris Skoric and Dave Singel{\'{e}}e and Srdjan Capkun}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {415--432}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_24}, doi = {10.1007/978-3-642-33167-1\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RanganathanTSSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wd/GiustinianoTM12, author = {Domenico Giustiniano and Nils Ole Tippenhauer and Stefan Mangold}, title = {Low-complexity Visible Light Networking with LED-to-LED communication}, booktitle = {Proceedings of the {IFIP} Wireless Days Conference 2012, Ireland, November 21-23, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/WD.2012.6402861}, doi = {10.1109/WD.2012.6402861}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wd/GiustinianoTM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TippenhauerPRC11, author = {Nils Ole Tippenhauer and Christina P{\"{o}}pper and Kasper Bonne Rasmussen and Srdjan Capkun}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {On the requirements for successful {GPS} spoofing attacks}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {75--86}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046719}, doi = {10.1145/2046707.2046719}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TippenhauerPRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PopperTDC11, author = {Christina P{\"{o}}pper and Nils Ole Tippenhauer and Boris Danev and Srdjan Capkun}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {Investigation of Signal and Message Manipulations on the Wireless Channel}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {40--59}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_3}, doi = {10.1007/978-3-642-23822-2\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PopperTDC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/CapkunCKT10, author = {Srdjan Capkun and Mario Cagalj and Ghassan Karame and Nils Ole Tippenhauer}, title = {Integrity Regions: Authentication through Presence in Wireless Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {9}, number = {11}, pages = {1608--1621}, year = {2010}, url = {https://doi.org/10.1109/TMC.2010.127}, doi = {10.1109/TMC.2010.127}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/CapkunCKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpnc/KuhnLT10, author = {Marc Kuhn and Heinrich Luecken and Nils Ole Tippenhauer}, title = {{UWB} impulse radio based distance bounding}, booktitle = {7th Workshop on Positioning Navigation and Communication, {WPNC} 2010, Dresden Germany, 11-12 March 2010, Proceedings}, pages = {28--37}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WPNC.2010.5653801}, doi = {10.1109/WPNC.2010.5653801}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpnc/KuhnLT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TippenhauerC09, author = {Nils Ole Tippenhauer and Srdjan Capkun}, editor = {Michael Backes and Peng Ning}, title = {ID-Based Secure Distance Bounding and Localization}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {621--636}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_38}, doi = {10.1007/978-3-642-04444-1\_38}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TippenhauerC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/TippenhauerRPC09, author = {Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Christina P{\"{o}}pper and Srdjan Capkun}, editor = {Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca}, title = {Attacks on public WLAN-based positioning systems}, booktitle = {Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Krak{\'{o}}w, Poland, June 22-25, 2009}, pages = {29--40}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1555816.1555820}, doi = {10.1145/1555816.1555820}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/TippenhauerRPC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TippenhauerRC09, author = {Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Secure Ranging With Message Temporal Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2009}, url = {http://eprint.iacr.org/2009/602}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TippenhauerRC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.