BibTeX records: Nils Ole Tippenhauer

download as .bib file

@article{DBLP:journals/corr/abs-2403-14963,
  author       = {Taekkyung Oh and
                  Sangwook Bae and
                  Junho Ahn and
                  Yonghwa Lee and
                  Dinh{-}Tuan Hoang and
                  Min Suk Kang and
                  Nils Ole Tippenhauer and
                  Yongdae Kim},
  title        = {Enabling Physical Localization of Uncooperative Cellular Devices},
  journal      = {CoRR},
  volume       = {abs/2403.14963},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.14963},
  doi          = {10.48550/ARXIV.2403.14963},
  eprinttype    = {arXiv},
  eprint       = {2403.14963},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-14963.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/BerardiTMPC23,
  author       = {Davide Berardi and
                  Nils Ole Tippenhauer and
                  Andrea Melis and
                  Marco Prandini and
                  Franco Callegati},
  title        = {Time sensitive networking security: issues of precision time protocol
                  and its implementation},
  journal      = {Cybersecur.},
  volume       = {6},
  number       = {1},
  pages        = {8},
  year         = {2023},
  url          = {https://doi.org/10.1186/s42400-023-00140-5},
  doi          = {10.1186/S42400-023-00140-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/BerardiTMPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchluterCHTN00R23,
  author       = {Till Schl{\"{u}}ter and
                  Amit Choudhari and
                  Lorenz Hetterich and
                  Leon Trampert and
                  Hamed Nemati and
                  Ahmad Ibrahim and
                  Michael Schwarz and
                  Christian Rossow and
                  Nils Ole Tippenhauer},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {FetchBench: Systematic Identification and Characterization of Proprietary
                  Prefetchers},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {975--989},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623124},
  doi          = {10.1145/3576915.3623124},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchluterCHTN00R23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpss/Walita0CT23,
  author       = {Tim Walita and
                  Alessandro Erba and
                  John Henry Castellanos and
                  Nils Ole Tippenhauer},
  editor       = {Rodrigo Roman and
                  Mujeeb Ahmed},
  title        = {Blind Concealment from Reconstruction-based Attack Detectors for Industrial
                  Control Systems via Backdoor Attacks},
  booktitle    = {Proceedings of the 9th {ACM} Cyber-Physical System Security Workshop,
                  {CPSS} 2023, Melbourne, VIC, Australia, July 10-14, 2023},
  pages        = {36--47},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592538.3594271},
  doi          = {10.1145/3592538.3594271},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpss/Walita0CT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/0001T23,
  author       = {Alessandro Erba and
                  Nils Ole Tippenhauer},
  editor       = {Daniel Gruss and
                  Federico Maggi and
                  Mathias Fischer and
                  Michele Carminati},
  title        = {White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical
                  Systems},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 20th International Conference, {DIMVA} 2023, Hamburg, Germany, July
                  12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13959},
  pages        = {111--131},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35504-2\_6},
  doi          = {10.1007/978-3-031-35504-2\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/0001T23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/DingCHTMZ23,
  author       = {Aolin Ding and
                  Matthew Chan and
                  Amin Hass and
                  Nils Ole Tippenhauer and
                  Shiqing Ma and
                  Saman A. Zonouz},
  title        = {Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment
                  of Robotic Aerial Vehicles},
  booktitle    = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023},
  pages        = {67--80},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSN58367.2023.00020},
  doi          = {10.1109/DSN58367.2023.00020},
  timestamp    = {Tue, 15 Aug 2023 11:43:57 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/DingCHTMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BytesRDM0T23,
  author       = {Andrei Bytes and
                  Prashant Hari Narayan Rajput and
                  Constantine Doumanidis and
                  Michail Maniatakos and
                  Jianying Zhou and
                  Nils Ole Tippenhauer},
  title        = {FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation
                  Runtimes via the Network},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {499--512},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607226},
  doi          = {10.1145/3607199.3607226},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BytesRDM0T23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2023,
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482},
  doi          = {10.1145/3558482},
  isbn         = {978-1-4503-9859-6},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-13131,
  author       = {Yi Han and
                  Matthew Chan and
                  Eric Wengrowski and
                  Zhuohuan Li and
                  Nils Ole Tippenhauer and
                  Mani B. Srivastava and
                  Saman A. Zonouz and
                  Luis Garcia},
  title        = {Why Don't You Clean Your Glasses? Perception Attacks with Dynamic
                  Optical Perturbations},
  journal      = {CoRR},
  volume       = {abs/2307.13131},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.13131},
  doi          = {10.48550/ARXIV.2307.13131},
  eprinttype    = {arXiv},
  eprint       = {2307.13131},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-13131.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/BreitenbacherHA22,
  author       = {Dominik Breitenbacher and
                  Ivan Homoliak and
                  Yan Lin Aung and
                  Yuval Elovici and
                  Nils Ole Tippenhauer},
  title        = {HADES-IoT: {A} Practical and Effective Host-Based Anomaly Detection
                  System for IoT Devices (Extended Version)},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {12},
  pages        = {9640--9658},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3135789},
  doi          = {10.1109/JIOT.2021.3135789},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/BreitenbacherHA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangHRTO22,
  author       = {Xueou Wang and
                  Xiaolu Hou and
                  Ruben Rios and
                  Nils Ole Tippenhauer and
                  Mart{\'{\i}}n Ochoa},
  title        = {Constrained Proximity Attacks on Mobile Targets},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {10:1--10:29},
  year         = {2022},
  url          = {https://doi.org/10.1145/3498543},
  doi          = {10.1145/3498543},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WangHRTO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Esquivel-Vargas22,
  author       = {Herson Esquivel{-}Vargas and
                  John Henry Castellanos and
                  Marco Caselli and
                  Nils Ole Tippenhauer and
                  Andreas Peter},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited
                  Process Knowledge},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {170--192},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_9},
  doi          = {10.1007/978-3-031-09234-3\_9},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Esquivel-Vargas22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ErbaT22,
  author       = {Alessandro Erba and
                  Nils Ole Tippenhauer},
  title        = {Assessing Model-free Anomaly Detection in Industrial Control Systems
                  Against Generic Concealment Attacks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {412--426},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564633},
  doi          = {10.1145/3564625.3564633},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ErbaT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/AntonioliTRP22,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen and
                  Mathias Payer},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth
                  Classic and Bluetooth Low Energy},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {196--207},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3523258},
  doi          = {10.1145/3488932.3523258},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/AntonioliTRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ErbaMT22,
  author       = {Alessandro Erba and
                  Anne M{\"{u}}ller and
                  Nils Ole Tippenhauer},
  editor       = {Earlence Fernandes and
                  Cristina Alcaraz},
  title        = {Security Analysis of Vendor Implementations of the {OPC} {UA} Protocol
                  for Industrial Control Systems},
  booktitle    = {Proceedings of the 4th Workshop on {CPS} {\&} IoT Security and
                  Privacy, CPSIOTSEC@CCS 2022, Los Angeles, CA, USA, 7 November 2022},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560826.3563380},
  doi          = {10.1145/3560826.3563380},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ErbaMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Tippenhauer22,
  author       = {Nils Ole Tippenhauer},
  editor       = {Mark Yampolskiy and
                  Moti Yung},
  title        = {D{\'{e}}j{\`{a}} Vu? Challenges and Opportunities for {AM} Security
                  from an {ICS} perspective},
  booktitle    = {Proceedings of the 2022 {ACM} {CCS} Workshop on Additive Manufacturing
                  {(3D} Printing) Security, Los Angeles, CA, USA, 11 November 2022},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560833.3563556},
  doi          = {10.1145/3560833.3563556},
  timestamp    = {Fri, 11 Nov 2022 23:46:54 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Tippenhauer22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0002NSTR22,
  author       = {Ahmad Ibrahim and
                  Hamed Nemati and
                  Till Schl{\"{u}}ter and
                  Nils Ole Tippenhauer and
                  Christian Rossow},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Microarchitectural Leakage Templates and Their Application to Cache-Based
                  Side Channels},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1489--1503},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560613},
  doi          = {10.1145/3548606.3560613},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0002NSTR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HanCATZ22,
  author       = {Yi Han and
                  Matthew Chan and
                  Zahra Aref and
                  Nils Ole Tippenhauer and
                  Saman A. Zonouz},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based
                  Control Flow Monitoring},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {661--678},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/han},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HanCATZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/GhaeiniT22,
  author       = {Hamid Reza Ghaeini and
                  Nils Ole Tippenhauer},
  title        = {Smooth Transition of Vehicles' Maximum Speed for Lane Detection based
                  on Computer Vision},
  booktitle    = {96th Vehicular Technology Conference, {VTC} Fall 2022, London, United
                  Kingdom, September 26-29, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VTC2022-Fall57202.2022.10012739},
  doi          = {10.1109/VTC2022-FALL57202.2022.10012739},
  timestamp    = {Tue, 24 Jan 2023 16:39:10 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/GhaeiniT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-09106,
  author       = {Herson Esquivel{-}Vargas and
                  John Henry Castellanos and
                  Marco Caselli and
                  Nils Ole Tippenhauer and
                  Andreas Peter},
  title        = {Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited
                  Process Knowledge},
  journal      = {CoRR},
  volume       = {abs/2204.09106},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.09106},
  doi          = {10.48550/ARXIV.2204.09106},
  eprinttype    = {arXiv},
  eprint       = {2204.09106},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-09106.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-13958,
  author       = {Ahmad Ibrahim and
                  Hamed Nemati and
                  Till Schl{\"{u}}ter and
                  Nils Ole Tippenhauer and
                  Christian Rossow},
  title        = {Microarchitectural Leakage Templates and Their Application to Cache-Based
                  Side Channels},
  journal      = {CoRR},
  volume       = {abs/2211.13958},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.13958},
  doi          = {10.48550/ARXIV.2211.13958},
  eprinttype    = {arXiv},
  eprint       = {2211.13958},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-13958.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TippenhauerCMN21,
  author       = {Nils Ole Tippenhauer and
                  Binbin Chen and
                  Daisuke Mashima and
                  David M. Nicol},
  editor       = {Michail Maniatakos and
                  Cristina Alcaraz},
  title        = {vBump: Securing Ethernet-based Industrial Control System Networks
                  with VLAN-based Traffic Aggregation},
  booktitle    = {CPSIoTSec '21: Proceedings of the 2th Workshop on CPS{\&}IoT Security
                  and Privacy, Virtual Event, Republic of Korea, 15 November 2021},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3462633.3483983},
  doi          = {10.1145/3462633.3483983},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TippenhauerCMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/BarbieriCTT21,
  author       = {Giovanni Barbieri and
                  Mauro Conti and
                  Nils Ole Tippenhauer and
                  Federico Turrin},
  title        = {Assessing the Use of Insecure {ICS} Protocols via {IXP} Network Traffic
                  Analysis},
  booktitle    = {30th International Conference on Computer Communications and Networks,
                  {ICCCN} 2021, Athens, Greece, July 19-22, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCN52240.2021.9522219},
  doi          = {10.1109/ICCCN52240.2021.9522219},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/BarbieriCTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/AlsolimanRLPTC21,
  author       = {Anas Alsoliman and
                  Giulio Rigoni and
                  Marco Levorato and
                  Cristina M. Pinotti and
                  Nils Ole Tippenhauer and
                  Mauro Conti},
  title        = {{COTS} Drone Detection using Video Streaming Characteristics},
  booktitle    = {{ICDCN} '21: International Conference on Distributed Computing and
                  Networking, Virtual Event, Nara, Japan, January 5-8, 2021},
  pages        = {166--175},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3427796.3428480},
  doi          = {10.1145/3427796.3428480},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/AlsolimanRLPTC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuWAPTXTB21,
  author       = {Jianliang Wu and
                  Ruoyu Wu and
                  Daniele Antonioli and
                  Mathias Payer and
                  Nils Ole Tippenhauer and
                  Dongyan Xu and
                  Dave (Jing) Tian and
                  Antonio Bianchi},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{LIGHTBLUE:} Automatic Profile-Aware Debloating of Bluetooth Stacks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {339--356},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wu-jianliang},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WuWAPTXTB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2021-1,
  editor       = {Kazue Sako and
                  Nils Ole Tippenhauer},
  title        = {Applied Cryptography and Network Security - 19th International Conference,
                  {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12726},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78372-3},
  doi          = {10.1007/978-3-030-78372-3},
  isbn         = {978-3-030-78371-6},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2021-2,
  editor       = {Kazue Sako and
                  Nils Ole Tippenhauer},
  title        = {Applied Cryptography and Network Security - 19th International Conference,
                  {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12727},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78375-4},
  doi          = {10.1007/978-3-030-78375-4},
  isbn         = {978-3-030-78374-7},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cpss/2021,
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Mauro Conti and
                  Nils Ole Tippenhauer and
                  Alessandro Brighente},
  title        = {Proceedings of the 7th {ACM} on Cyber-Physical System Security Workshop,
                  CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://dl.acm.org/doi/proceedings/10.1145/3457339},
  doi          = {10.1145/3457339},
  isbn         = {978-1-4503-8402-5},
  timestamp    = {Mon, 23 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpss/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-06051,
  author       = {Alessandro Erba and
                  Anne M{\"{u}}ller and
                  Nils Ole Tippenhauer},
  title        = {Practical Pitfalls for Security in {OPC} {UA}},
  journal      = {CoRR},
  volume       = {abs/2104.06051},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.06051},
  eprinttype    = {arXiv},
  eprint       = {2104.06051},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-06051.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/TroncosoPHSLLSP20,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda Gurses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {36--66},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p36.pdf},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AntonioliTR20,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen},
  title        = {Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {14:1--14:28},
  year         = {2020},
  url          = {https://doi.org/10.1145/3394497},
  doi          = {10.1145/3394497},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AntonioliTR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ErbaTGPCZT20,
  author       = {Alessandro Erba and
                  Riccardo Taormina and
                  Stefano Galelli and
                  Marcello Pogliani and
                  Michele Carminati and
                  Stefano Zanero and
                  Nils Ole Tippenhauer},
  title        = {Constrained Concealment Attacks against Reconstruction-based Anomaly
                  Detectors in Industrial Control Systems},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {480--495},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427660},
  doi          = {10.1145/3427228.3427660},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ErbaTGPCZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Tippenhauer20,
  author       = {Nils Ole Tippenhauer},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Trust, But Verify? Perspectives On Industrial Device Security},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384941.3409593},
  doi          = {10.1145/3384941.3409593},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Tippenhauer20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TurrinETC20,
  author       = {Federico Turrin and
                  Alessandro Erba and
                  Nils Ole Tippenhauer and
                  Mauro Conti},
  editor       = {Michail Maniatakos and
                  Yuqing Zhang},
  title        = {A Statistical Analysis Framework for {ICS} Process Datasets},
  booktitle    = {CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS{\&}IoT
                  Security and Privacy, Virtual Event, USA, November 9, 2020},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411498.3419961},
  doi          = {10.1145/3411498.3419961},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TurrinETC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AntonioliTR20,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen},
  title        = {{BIAS:} Bluetooth Impersonation AttackS},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {549--562},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00093},
  doi          = {10.1109/SP40000.2020.00093},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AntonioliTR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12273,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Edouard Bugnion and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda F. G{\"{u}}rses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {CoRR},
  volume       = {abs/2005.12273},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.12273},
  eprinttype    = {arXiv},
  eprint       = {2005.12273},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-01114,
  author       = {Giovanni Barbieri and
                  Mauro Conti and
                  Nils Ole Tippenhauer and
                  Federico Turrin},
  title        = {Sorry, Shodan is not Enough! Assessing {ICS} Security via {IXP} Network
                  Traffic Analysis},
  journal      = {CoRR},
  volume       = {abs/2007.01114},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.01114},
  eprinttype    = {arXiv},
  eprint       = {2007.01114},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-01114.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-11776,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen and
                  Mathias Payer},
  title        = {BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth
                  Classic and Bluetooth Low Energy},
  journal      = {CoRR},
  volume       = {abs/2009.11776},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.11776},
  eprinttype    = {arXiv},
  eprint       = {2009.11776},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-11776.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-03586,
  author       = {Alessandro Erba and
                  Nils Ole Tippenhauer},
  title        = {No Need to Know Physics: Resilience of Process-based Model-free Anomaly
                  Detection for Industrial Control Systems},
  journal      = {CoRR},
  volume       = {abs/2012.03586},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.03586},
  eprinttype    = {arXiv},
  eprint       = {2012.03586},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-03586.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/envsoft/TaorminaGDTSO19,
  author       = {Riccardo Taormina and
                  Stefano Galelli and
                  Hunter C. Douglas and
                  Nils Ole Tippenhauer and
                  Elad Salomons and
                  Avi Ostfeld},
  title        = {A toolbox for assessing the impacts of cyber-physical attacks on water
                  distribution systems},
  journal      = {Environ. Model. Softw.},
  volume       = {112},
  pages        = {46--51},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.envsoft.2018.11.008},
  doi          = {10.1016/J.ENVSOFT.2018.11.008},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/envsoft/TaorminaGDTSO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GhaeiniTZ19,
  author       = {Hamid Reza Ghaeini and
                  Nils Ole Tippenhauer and
                  Jianying Zhou},
  title        = {Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {80:1--80:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340331},
  doi          = {10.1145/3339252.3340331},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GhaeiniTZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GiraldoUCT19,
  author       = {Jairo Giraldo and
                  David I. Urbina and
                  Alvaro A. C{\'{a}}rdenas and
                  Nils Ole Tippenhauer},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Hide and Seek: An Architecture for Improving Attack-Visibility in
                  Industrial Control Systems},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {175--195},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_9},
  doi          = {10.1007/978-3-030-21568-2\_9},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/GiraldoUCT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BreitenbacherHA19,
  author       = {Dominik Breitenbacher and
                  Ivan Homoliak and
                  Yan Lin Aung and
                  Nils Ole Tippenhauer and
                  Yuval Elovici},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {HADES-IoT: {A} Practical Host-Based Anomaly Detection System for IoT
                  Devices},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {479--484},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329847},
  doi          = {10.1145/3321705.3329847},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BreitenbacherHA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TippenhauerW19,
  author       = {Nils Ole Tippenhauer and
                  Avishai Wool},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {{CPS-SPC} 2019: Fifth Workshop on Cyber-Physical Systems Security
                  and PrivaCy},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2695--2696},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3353549},
  doi          = {10.1145/3319535.3353549},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TippenhauerW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TambeASOTSE19,
  author       = {Amit Tambe and
                  Yan Lin Aung and
                  Ragav Sridharan and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300024},
  doi          = {10.1145/3292006.3300024},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/TambeASOTSE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AntonioliTR19,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen},
  title        = {Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby
                  Connections' on Android},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/nearby-threats-reversing-analyzing-and-attacking-googles-nearby-connections-on-android/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AntonioliTR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GhaeiniCBBG0STZ19,
  author       = {Hamid Reza Ghaeini and
                  Matthew Chan and
                  Raad Bahmani and
                  Ferdinand Brasser and
                  Luis Garcia and
                  Jianying Zhou and
                  Ahmad{-}Reza Sadeghi and
                  Nils Ole Tippenhauer and
                  Saman A. Zonouz},
  title        = {PAtt: Physics-based Attestation of Control Systems},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {165--180},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/ghaeini},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GhaeiniCBBG0STZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AntonioliTR19,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {The {KNOB} is Broken: Exploiting Low Entropy in the Encryption Key
                  Negotiation Of Bluetooth {BR/EDR}},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1047--1061},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AntonioliTR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/Tippenhauer19,
  author       = {Nils Ole Tippenhauer},
  editor       = {Cristina Alcaraz},
  title        = {Design and Realization of Testbeds for Security Research in the Industrial
                  Internet of Things},
  booktitle    = {Security and Privacy Trends in the Industrial Internet of Things},
  pages        = {287--310},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12330-7\_14},
  doi          = {10.1007/978-3-030-12330-7\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/Tippenhauer19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-01027,
  author       = {Dominik Breitenbacher and
                  Ivan Homoliak and
                  Yan Lin Aung and
                  Nils Ole Tippenhauer and
                  Yuval Elovici},
  title        = {HADES-IoT: {A} Practical Host-Based Anomaly Detection System for IoT
                  Devices (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/1905.01027},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.01027},
  eprinttype    = {arXiv},
  eprint       = {1905.01027},
  timestamp    = {Mon, 27 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-01027.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10922,
  author       = {Yael Mathov and
                  Noga Agmon and
                  Asaf Shabtai and
                  Rami Puzis and
                  Nils Ole Tippenhauer and
                  Yuval Elovici},
  title        = {Challenges for Security Assessment of Enterprises in the IoT Era},
  journal      = {CoRR},
  volume       = {abs/1906.10922},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10922},
  eprinttype    = {arXiv},
  eprint       = {1906.10922},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10922.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-07487,
  author       = {Alessandro Erba and
                  Riccardo Taormina and
                  Stefano Galelli and
                  Marcello Pogliani and
                  Michele Carminati and
                  Stefano Zanero and
                  Nils Ole Tippenhauer},
  title        = {Real-time Evasion Attacks with Physical Constraints on Deep Learning-based
                  Anomaly Detectors in Industrial Control Systems},
  journal      = {CoRR},
  volume       = {abs/1907.07487},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.07487},
  eprinttype    = {arXiv},
  eprint       = {1907.07487},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-07487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AntonioliTR19,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen},
  title        = {Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low
                  Energy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {933},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/933},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AntonioliTR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/GiraldoUCVFRTSC18,
  author       = {Jairo Giraldo and
                  David I. Urbina and
                  Alvaro A. C{\'{a}}rdenas and
                  Junia Valente and
                  Mustafa Amir Faisal and
                  Justin Ruths and
                  Nils Ole Tippenhauer and
                  Henrik Sandberg and
                  Richard Candell},
  title        = {A Survey of Physics-Based Attack Detection in Cyber-Physical Systems},
  journal      = {{ACM} Comput. Surv.},
  volume       = {51},
  number       = {4},
  pages        = {76:1--76:36},
  year         = {2018},
  url          = {https://doi.org/10.1145/3203245},
  doi          = {10.1145/3203245},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/GiraldoUCVFRTSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SiddiqiTMC18,
  author       = {Ahnaf Siddiqi and
                  Nils Ole Tippenhauer and
                  Daisuke Mashima and
                  Binbin Chen},
  editor       = {Dieter Gollmann and
                  Jianying Zhou},
  title        = {On Practical Threat Scenario Testing in an Electric Power {ICS} Testbed},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {15--21},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3198458.3198461},
  doi          = {10.1145/3198458.3198461},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SiddiqiTMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RashidT18,
  author       = {Awais Rashid and
                  Nils Ole Tippenhauer},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {{CPS-SPC} 2018: Fourth Workshop on Cyber-Physical Systems Security
                  and PrivaCy},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2171--2172},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243874},
  doi          = {10.1145/3243734.3243874},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RashidT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangHRHTO18,
  author       = {Xueou Wang and
                  Xiaolu Hou and
                  Ruben Rios and
                  Per A. Hallgren and
                  Nils Ole Tippenhauer and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Location Proximity Attacks Against Mobile Targets: Analytical Bounds
                  and Attacker Strategies},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {373--392},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_19},
  doi          = {10.1007/978-3-319-98989-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangHRHTO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/GhaeiniABST18,
  author       = {Hamid Reza Ghaeini and
                  Daniele Antonioli and
                  Ferdinand Brasser and
                  Ahmad{-}Reza Sadeghi and
                  Nils Ole Tippenhauer},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {State-aware anomaly detection for industrial control systems},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {1620--1628},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167305},
  doi          = {10.1145/3167132.3167305},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/GhaeiniABST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SridharanMT18,
  author       = {Ragav Sridharan and
                  Rajib Ranjan Maiti and
                  Nils Ole Tippenhauer},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {{WADAC:} Privacy-Preserving Anomaly Detection and Attack Classification
                  on Wireless Traffic},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212495},
  doi          = {10.1145/3212480.3212495},
  timestamp    = {Mon, 16 Sep 2019 13:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SridharanMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-00152,
  author       = {Daniele Antonioli and
                  Giuseppe Bernieri and
                  Nils Ole Tippenhauer},
  title        = {Taking Control: Design and Implementation of Botnets for Cyber-Physical
                  Attacks with CPSBot},
  journal      = {CoRR},
  volume       = {abs/1802.00152},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.00152},
  eprinttype    = {arXiv},
  eprint       = {1802.00152},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-00152.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CastellanosATO17,
  author       = {John Henry Castellanos and
                  Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Legacy-Compliant Data Authentication for Industrial Control System
                  Traffic},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {665--685},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_33},
  doi          = {10.1007/978-3-319-61204-1\_33},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CastellanosATO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AntonioliST17,
  author       = {Daniele Antonioli and
                  Sandra Siby and
                  Nils Ole Tippenhauer},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {Practical Evaluation of Passive {COTS} Eavesdropping in 802.11b/n/ac
                  {WLAN}},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {415--435},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_19},
  doi          = {10.1007/978-3-030-02641-7\_19},
  timestamp    = {Wed, 25 Sep 2019 18:04:17 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/AntonioliST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SibyMT17,
  author       = {Sandra Siby and
                  Rajib Ranjan Maiti and
                  Nils Ole Tippenhauer},
  editor       = {Richard Chow and
                  G{\"{o}}kay Saldamli},
  title        = {IoTScanner: Detecting Privacy Threats in IoT Neighborhoods},
  booktitle    = {Proceedings of the 3rd {ACM} International Workshop on IoT Privacy,
                  Trust, and Security, IoTPTS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055245.3055253},
  doi          = {10.1145/3055245.3055253},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SibyMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuarnizoTBOTSE17,
  author       = {Juan David Guarnizo and
                  Amit Tambe and
                  Suman Sankar Bhunia and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Jianying Zhou and
                  Ernesto Damiani},
  title        = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017},
  pages        = {57--68},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055186.3055192},
  doi          = {10.1145/3055186.3055192},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuarnizoTBOTSE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AntonioliGAOT17,
  author       = {Daniele Antonioli and
                  Hamid Reza Ghaeini and
                  Sridhar Adepu and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer},
  editor       = {Bhavani Thuraisingham and
                  Rakesh B. Bobba and
                  Awais Rashid},
  title        = {Gamifying {ICS} Security Training and Research: Design, Implementation,
                  and Results of {S3}},
  booktitle    = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security
                  and PrivaCy, Dallas, TX, USA, November 3, 2017},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140241.3140253},
  doi          = {10.1145/3140241.3140253},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AntonioliGAOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RocchettoT17,
  author       = {Marco Rocchetto and
                  Nils Ole Tippenhauer},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Towards Formal Security Analysis of Industrial Control Systems},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {114--126},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053024},
  doi          = {10.1145/3052973.3053024},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RocchettoT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GovilAT17,
  author       = {Naman Govil and
                  Anand Agrawal and
                  Nils Ole Tippenhauer},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {On Ladder Logic Bombs in Industrial Control Systems},
  booktitle    = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  pages        = {110--126},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72817-9\_8},
  doi          = {10.1007/978-3-319-72817-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GovilAT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MaitiSST17,
  author       = {Rajib Ranjan Maiti and
                  Sandra Siby and
                  Ragav Sridharan and
                  Nils Ole Tippenhauer},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Link-Layer Device Type Classification on Encrypted Wireless Traffic
                  with {COTS} Radios},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {247--264},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_14},
  doi          = {10.1007/978-3-319-66399-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MaitiSST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/MeidanBSGOTE17,
  author       = {Yair Meidan and
                  Michael Bohadana and
                  Asaf Shabtai and
                  Juan David Guarnizo and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Yuval Elovici},
  editor       = {Ahmed Seffah and
                  Birgit Penzenstadler and
                  Carina Alves and
                  Xin Peng},
  title        = {ProfilIoT: a machine learning approach for IoT device identification
                  based on network traffic analysis},
  booktitle    = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech,
                  Morocco, April 3-7, 2017},
  pages        = {506--509},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3019612.3019878},
  doi          = {10.1145/3019612.3019878},
  timestamp    = {Wed, 01 Feb 2023 17:58:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/MeidanBSGOTE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GuarnizoTBOTSE17,
  author       = {Juan Guarnizo and
                  Amit Tambe and
                  Suman Sankar Bhunia and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots},
  journal      = {CoRR},
  volume       = {abs/1701.02446},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.02446},
  eprinttype    = {arXiv},
  eprint       = {1701.02446},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GuarnizoTBOTSE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SibyMT17,
  author       = {Sandra Siby and
                  Rajib Ranjan Maiti and
                  Nils Ole Tippenhauer},
  title        = {IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods},
  journal      = {CoRR},
  volume       = {abs/1701.05007},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.05007},
  eprinttype    = {arXiv},
  eprint       = {1701.05007},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SibyMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AntonioliGAOT17,
  author       = {Daniele Antonioli and
                  Hamid Reza Ghaeini and
                  Sridhar Adepu and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer},
  title        = {Gamifying Education and Research on {ICS} Security: Design, Implementation
                  and Results of {S3}},
  journal      = {CoRR},
  volume       = {abs/1702.03067},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.03067},
  eprinttype    = {arXiv},
  eprint       = {1702.03067},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AntonioliGAOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GovilAT17,
  author       = {Naman Govil and
                  Anand Agrawal and
                  Nils Ole Tippenhauer},
  title        = {On Ladder Logic Bombs in Industrial Control Systems},
  journal      = {CoRR},
  volume       = {abs/1702.05241},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.05241},
  eprinttype    = {arXiv},
  eprint       = {1702.05241},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GovilAT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-04647,
  author       = {Yair Meidan and
                  Michael Bohadana and
                  Asaf Shabtai and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Juan David Guarnizo and
                  Yuval Elovici},
  title        = {Detection of Unauthorized IoT Devices Using Machine Learning Techniques},
  journal      = {CoRR},
  volume       = {abs/1709.04647},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.04647},
  eprinttype    = {arXiv},
  eprint       = {1709.04647},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-04647.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/TippenhauerRC16,
  author       = {Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Physical-layer integrity for wireless messages},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {31--38},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.021},
  doi          = {10.1016/J.COMNET.2016.06.021},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/TippenhauerRC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmpt/NaithGTT16,
  author       = {Qamar Hamid Naith and
                  Hamid Reza Ghaeini and
                  Nils Ole Tippenhauer and
                  Alicia Trivi{\~{n}}o{-}Cabrera},
  title        = {Unequal Importance Multipath Video Streaming for Wireless Networks},
  journal      = {J. Multim. Process. Technol.},
  volume       = {7},
  number       = {3},
  pages        = {91--101},
  year         = {2016},
  url          = {http://www.dline.info/jmpt/fulltext/v7n3/jmptv7n3\_1.pdf},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmpt/NaithGTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/SiboniSTLE16,
  author       = {Shachar Siboni and
                  Asaf Shabtai and
                  Nils Ole Tippenhauer and
                  Jemin Lee and
                  Yuval Elovici},
  title        = {Advanced Security Testbed Framework for Wearable IoT Devices},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {16},
  number       = {4},
  pages        = {26:1--26:25},
  year         = {2016},
  url          = {https://doi.org/10.1145/2981546},
  doi          = {10.1145/2981546},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/SiboniSTLE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JansenTP16,
  author       = {Kai Jansen and
                  Nils Ole Tippenhauer and
                  Christina P{\"{o}}pper},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Multi-receiver {GPS} spoofing detection: error models and realization},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {237--250},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991092},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JansenTP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AntonioliAT16,
  author       = {Daniele Antonioli and
                  Anand Agrawal and
                  Nils Ole Tippenhauer},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Alvaro A. C{\'{a}}rdenas and
                  Rakesh B. Bobba},
  title        = {Towards High-Interaction Virtual {ICS} Honeypots-in-a-Box},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security
                  and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994487.2994493},
  doi          = {10.1145/2994487.2994493},
  timestamp    = {Sat, 09 Apr 2022 12:37:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AntonioliAT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GhaeiniT16,
  author       = {Hamid Reza Ghaeini and
                  Nils Ole Tippenhauer},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Alvaro A. C{\'{a}}rdenas and
                  Rakesh B. Bobba},
  title        = {{HAMIDS:} Hierarchical Monitoring Intrusion Detection System for Industrial
                  Control Systems},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security
                  and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {103--111},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994487.2994492},
  doi          = {10.1145/2994487.2994492},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GhaeiniT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/UrbinaGCTVFRCS16,
  author       = {David I. Urbina and
                  Jairo Alonso Giraldo and
                  Alvaro A. C{\'{a}}rdenas and
                  Nils Ole Tippenhauer and
                  Junia Valente and
                  Mustafa Amir Faisal and
                  Justin Ruths and
                  Richard Candell and
                  Henrik Sandberg},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Limiting the Impact of Stealthy Attacks on Industrial Control Systems},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1092--1105},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978388},
  doi          = {10.1145/2976749.2978388},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/UrbinaGCTVFRCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpsweek/MathurT16,
  author       = {Aditya P. Mathur and
                  Nils Ole Tippenhauer},
  title        = {SWaT: a water treatment testbed for research and training on {ICS}
                  security},
  booktitle    = {2016 International Workshop on Cyber-physical Systems for Smart Water
                  Networks, CySWater@CPSWeek 2016, Vienna, Austria, April 11, 2016},
  pages        = {31--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CySWater.2016.7469060},
  doi          = {10.1109/CYSWATER.2016.7469060},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cpsweek/MathurT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DongJTCKSTN16,
  author       = {Xinshu Dong and
                  Sumeet Jauhar and
                  William G. Temple and
                  Binbin Chen and
                  Zbigniew Kalbarczyk and
                  William H. Sanders and
                  Nils Ole Tippenhauer and
                  David M. Nicol},
  editor       = {Barbara Kordy and
                  Mathias Ekstedt and
                  Dong Seong Kim},
  title        = {The Right Tool for the Job: {A} Case for Common Input Scenarios for
                  Security Assessment},
  booktitle    = {Graphical Models for Security - Third International Workshop, GraMSec
                  2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9987},
  pages        = {39--61},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46263-9\_3},
  doi          = {10.1007/978-3-319-46263-9\_3},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DongJTCKSTN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RocchettoT16,
  author       = {Marco Rocchetto and
                  Nils Ole Tippenhauer},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {On Attacker Models and Profiles for Cyber-Physical Systems},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  pages        = {427--449},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3\_22},
  doi          = {10.1007/978-3-319-45741-3\_22},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RocchettoT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/RocchettoT16,
  author       = {Marco Rocchetto and
                  Nils Ole Tippenhauer},
  editor       = {Kazuhiro Ogata and
                  Mark Lawford and
                  Shaoying Liu},
  title        = {{CPDY:} Extending the Dolev-Yao Attacker with Physical-Layer Interactions},
  booktitle    = {Formal Methods and Software Engineering - 18th International Conference
                  on Formal Engineering Methods, {ICFEM} 2016, Tokyo, Japan, November
                  14-18, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10009},
  pages        = {175--192},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47846-3\_12},
  doi          = {10.1007/978-3-319-47846-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/RocchettoT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/UrbinaGTC16,
  author       = {David I. Urbina and
                  Jairo Alonso Giraldo and
                  Nils Ole Tippenhauer and
                  Alvaro A. C{\'{a}}rdenas},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Attacking Fieldbus Communications in {ICS:} Applications to the SWaT
                  Testbed},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {75--89},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-75},
  doi          = {10.3233/978-1-61499-617-0-75},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sgcrc/UrbinaGTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/TaorminaGTSO16,
  author       = {Riccardo Taormina and
                  Stefano Galelli and
                  Nils Ole Tippenhauer and
                  Elad Salomons and
                  Avi Ostfeld},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Simulation of Cyber-Physical Attacks on Water Distribution Systems
                  with {EPANET}},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {123--130},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-123},
  doi          = {10.3233/978-1-61499-617-0-123},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/TaorminaGTSO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RocchettoT16,
  author       = {Marco Rocchetto and
                  Nils Ole Tippenhauer},
  title        = {{CPDY:} Extending the Dolev-Yao Attacker with Physical-Layer Interactions},
  journal      = {CoRR},
  volume       = {abs/1607.02562},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.02562},
  eprinttype    = {arXiv},
  eprint       = {1607.02562},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RocchettoT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AntonioliT15,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer},
  editor       = {Indrajit Ray and
                  Roshan K. Thomas and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {MiniCPS: {A} Toolkit for Security Research on {CPS} Networks},
  booktitle    = {Proceedings of the First {ACM} Workshop on Cyber-Physical Systems-Security
                  and/or PrivaCy, {CPS-SPC} 2015, Denver, Colorado, USA, October 16,
                  2015},
  pages        = {91--100},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808705.2808715},
  doi          = {10.1145/2808705.2808715},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AntonioliT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TippenhauerLKC15,
  author       = {Nils Ole Tippenhauer and
                  Heinrich Luecken and
                  Marc Kuhn and
                  Srdjan Capkun},
  title        = {{UWB} rapid-bit-exchange system for distance bounding},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {2:1--2:12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766504},
  doi          = {10.1145/2766498.2766504},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TippenhauerLKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AntonioliT15,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer},
  title        = {MiniCPS: {A} toolkit for security research on {CPS} Networks},
  journal      = {CoRR},
  volume       = {abs/1507.04860},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.04860},
  eprinttype    = {arXiv},
  eprint       = {1507.04860},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AntonioliT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/TippenhauerTVCNKS14,
  author       = {Nils Ole Tippenhauer and
                  William G. Temple and
                  An Hoa Vu and
                  Binbin Chen and
                  David M. Nicol and
                  Zbigniew Kalbarczyk and
                  William H. Sanders},
  title        = {Automatic Generation of Security Argument Graphs},
  booktitle    = {20th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2014, Singapore, November 18-21, 2014},
  pages        = {33--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PRDC.2014.13},
  doi          = {10.1109/PRDC.2014.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/TippenhauerTVCNKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/VuTCNK14,
  author       = {An Hoa Vu and
                  Nils Ole Tippenhauer and
                  Binbin Chen and
                  David M. Nicol and
                  Zbigniew Kalbarczyk},
  editor       = {Gethin Norman and
                  William H. Sanders},
  title        = {CyberSAGE: {A} Tool for Automatic Security Assessment of Cyber-Physical
                  Systems},
  booktitle    = {Quantitative Evaluation of Systems - 11th International Conference,
                  {QEST} 2014, Florence, Italy, September 8-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8657},
  pages        = {384--387},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10696-0\_29},
  doi          = {10.1007/978-3-319-10696-0\_29},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qest/VuTCNK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TippenhauerTVCNKS14,
  author       = {Nils Ole Tippenhauer and
                  William G. Temple and
                  An Hoa Vu and
                  Binbin Chen and
                  David M. Nicol and
                  Zbigniew Kalbarczyk and
                  William H. Sanders},
  title        = {Automatic Generation of Security Argument Graphs},
  journal      = {CoRR},
  volume       = {abs/1405.7475},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.7475},
  eprinttype    = {arXiv},
  eprint       = {1405.7475},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/TippenhauerTVCNKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/ChenKNSTTTVY13,
  author       = {Binbin Chen and
                  Zbigniew Kalbarczyk and
                  David M. Nicol and
                  William H. Sanders and
                  Rui Tan and
                  William G. Temple and
                  Nils Ole Tippenhauer and
                  An Hoa Vu and
                  David K. Y. Yau},
  editor       = {Mary Ellen Zurko and
                  Konstantin Beznosov and
                  Tara Whalen and
                  Tom Longstaff},
  title        = {Go with the flow: toward workflow-oriented security assessment},
  booktitle    = {New Security Paradigms Workshop, {NSPW} '13, Banff, AB, Canada, September
                  9-12, 2013},
  pages        = {65--76},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535813.2535821},
  doi          = {10.1145/2535813.2535821},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/ChenKNSTTTVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/TempleCT13,
  author       = {William G. Temple and
                  Binbin Chen and
                  Nils Ole Tippenhauer},
  title        = {Delay makes a difference: Smart grid resilience under remote meter
                  disconnect attack},
  booktitle    = {{IEEE} Fourth International Conference on Smart Grid Communications,
                  SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013},
  pages        = {462--467},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SmartGridComm.2013.6688001},
  doi          = {10.1109/SMARTGRIDCOMM.2013.6688001},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/TempleCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TippenhauerMRC13,
  author       = {Nils Ole Tippenhauer and
                  Luka Malisa and
                  Aanjhan Ranganathan and
                  Srdjan Capkun},
  title        = {On Limitations of Friendly Jamming for Confidentiality},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {160--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.21},
  doi          = {10.1109/SP.2013.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TippenhauerMRC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Tippenhauer12,
  author       = {Nils Ole Tippenhauer},
  title        = {Physical-layer security aspects of wireless localization},
  school       = {{ETH} Zurich, Z{\"{u}}rich, Switzerland},
  year         = {2012},
  url          = {https://hdl.handle.net/20.500.11850/53642},
  doi          = {10.3929/ETHZ-A-7352063},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Tippenhauer12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/TippenhauerGM12,
  author       = {Nils Ole Tippenhauer and
                  Domenico Giustiniano and
                  Stefan Mangold},
  title        = {Toys communicating with LEDs: Enabling toy cars interaction},
  booktitle    = {2012 {IEEE} Consumer Communications and Networking Conference (CCNC),
                  Las Vegas, NV, USA, January 14-17, 2012},
  pages        = {48--49},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCNC.2012.6181045},
  doi          = {10.1109/CCNC.2012.6181045},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/TippenhauerGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RanganathanTSSC12,
  author       = {Aanjhan Ranganathan and
                  Nils Ole Tippenhauer and
                  Boris Skoric and
                  Dave Singel{\'{e}}e and
                  Srdjan Capkun},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Design and Implementation of a Terrorist Fraud Resilient Distance
                  Bounding System},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {415--432},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_24},
  doi          = {10.1007/978-3-642-33167-1\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RanganathanTSSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wd/GiustinianoTM12,
  author       = {Domenico Giustiniano and
                  Nils Ole Tippenhauer and
                  Stefan Mangold},
  title        = {Low-complexity Visible Light Networking with LED-to-LED communication},
  booktitle    = {Proceedings of the {IFIP} Wireless Days Conference 2012, Ireland,
                  November 21-23, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WD.2012.6402861},
  doi          = {10.1109/WD.2012.6402861},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wd/GiustinianoTM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TippenhauerPRC11,
  author       = {Nils Ole Tippenhauer and
                  Christina P{\"{o}}pper and
                  Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {On the requirements for successful {GPS} spoofing attacks},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046719},
  doi          = {10.1145/2046707.2046719},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TippenhauerPRC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PopperTDC11,
  author       = {Christina P{\"{o}}pper and
                  Nils Ole Tippenhauer and
                  Boris Danev and
                  Srdjan Capkun},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Investigation of Signal and Message Manipulations on the Wireless
                  Channel},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {40--59},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_3},
  doi          = {10.1007/978-3-642-23822-2\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PopperTDC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/CapkunCKT10,
  author       = {Srdjan Capkun and
                  Mario Cagalj and
                  Ghassan Karame and
                  Nils Ole Tippenhauer},
  title        = {Integrity Regions: Authentication through Presence in Wireless Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {9},
  number       = {11},
  pages        = {1608--1621},
  year         = {2010},
  url          = {https://doi.org/10.1109/TMC.2010.127},
  doi          = {10.1109/TMC.2010.127},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/CapkunCKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpnc/KuhnLT10,
  author       = {Marc Kuhn and
                  Heinrich Luecken and
                  Nils Ole Tippenhauer},
  title        = {{UWB} impulse radio based distance bounding},
  booktitle    = {7th Workshop on Positioning Navigation and Communication, {WPNC} 2010,
                  Dresden Germany, 11-12 March 2010, Proceedings},
  pages        = {28--37},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WPNC.2010.5653801},
  doi          = {10.1109/WPNC.2010.5653801},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpnc/KuhnLT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TippenhauerC09,
  author       = {Nils Ole Tippenhauer and
                  Srdjan Capkun},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {ID-Based Secure Distance Bounding and Localization},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {621--636},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_38},
  doi          = {10.1007/978-3-642-04444-1\_38},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/TippenhauerC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/TippenhauerRPC09,
  author       = {Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen and
                  Christina P{\"{o}}pper and
                  Srdjan Capkun},
  editor       = {Krzysztof Zielinski and
                  Adam Wolisz and
                  Jason Flinn and
                  Anthony LaMarca},
  title        = {Attacks on public WLAN-based positioning systems},
  booktitle    = {Proceedings of the 7th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2009), Krak{\'{o}}w, Poland,
                  June 22-25, 2009},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1555816.1555820},
  doi          = {10.1145/1555816.1555820},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/TippenhauerRPC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TippenhauerRC09,
  author       = {Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Secure Ranging With Message Temporal Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/602},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TippenhauerRC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics