
Kasper Bonne Rasmussen
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j13]Kübra Kalkan, Kasper Bonne Rasmussen:
TruSD: Trust framework for service discovery among IoT devices. Comput. Networks 178: 107318 (2020) - [j12]Ilias Giechaskiel
, Kasper Rasmussen
:
Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses. IEEE Commun. Surv. Tutorials 22(1): 645-670 (2020) - [j11]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy. ACM Trans. Priv. Secur. 23(3): 14:1-14:28 (2020) - [c42]Angeliki Aktypi, Kübra Kalkan, Kasper Bonne Rasmussen:
SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network. CODASPY 2020: 271-282 - [c41]Shanquan Tian, Wenjie Xiong, Ilias Giechaskiel
, Kasper Rasmussen, Jakub Szefer:
Fingerprinting Cloud FPGA Infrastructures. FPGA 2020: 58-64 - [c40]Youqian Zhang, Kasper Rasmussen:
Detection of Electromagnetic Interference Attacks on Sensor Systems. IEEE Symposium on Security and Privacy 2020: 203-216 - [c39]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
BIAS: Bluetooth Impersonation AttackS. IEEE Symposium on Security and Privacy 2020: 549-562 - [c38]Ilias Giechaskiel
, Kasper Bonne Rasmussen, Jakub Szefer:
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage. IEEE Symposium on Security and Privacy 2020: 1728-1741 - [i12]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer:
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy. CoRR abs/2009.11776 (2020)
2010 – 2019
- 2019
- [j10]Gildas Avoine, Muhammed Ali Bingöl
, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua
, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [j9]Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication. ACM Trans. Priv. Secur. 22(1): 4:1-4:30 (2019) - [j8]Ilias Giechaskiel
, Ken Eguro, Kasper Bonne Rasmussen:
Leakier Wires: Exploiting FPGA Long Wires for Covert- and Side-channel Attacks. ACM Trans. Reconfigurable Technol. Syst. 12(3): 11:1-11:29 (2019) - [c37]Simon Eberz, Giulio Lovisotto, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics. CCS 2019: 1187-1199 - [c36]Ilias Giechaskiel
, Youqian Zhang, Kasper Bonne Rasmussen:
A Framework for Evaluating Security in the Presence of Signal Injection Attacks. ESORICS (1) 2019: 512-532 - [c35]Ilias Giechaskiel
, Kasper Bonne Rasmussen, Jakub Szefer:
Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs. FPL 2019: 45-50 - [c34]Ilias Giechaskiel
, Kasper Rasmussen, Jakub Szefer:
Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs. ICCD 2019: 1-10 - [c33]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen:
Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android. NDSS 2019 - [c32]Munir Geden, Kasper Rasmussen:
Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems. PST 2019: 1-10 - [c31]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen:
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR. USENIX Security Symposium 2019: 1047-1061 - [i11]Ilias Giechaskiel, Youqian Zhang, Kasper Bonne Rasmussen:
A Framework for Evaluating Security in the Presence of Signal Injection Attacks. CoRR abs/1901.03675 (2019) - [i10]Ilias Giechaskiel, Kasper Bonne Rasmussen:
SoK: Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses. CoRR abs/1901.06935 (2019) - [i9]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy. IACR Cryptol. ePrint Arch. 2019: 933 (2019) - [i8]Eman Salem Alashwali, Kasper Rasmussen:
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. IACR Cryptol. ePrint Arch. 2019: 1083 (2019) - [i7]Eman Salem Alashwali, Kasper Rasmussen:
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name. IACR Cryptol. ePrint Arch. 2019: 1099 (2019) - 2018
- [j7]Ilias Giechaskiel
, Cas Cremers, Kasper Bonne Rasmussen:
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives. IEEE Secur. Priv. 16(4): 46-56 (2018) - [c30]Ilias Giechaskiel
, Kasper Bonne Rasmussen, Ken Eguro:
Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires. AsiaCCS 2018: 15-27 - [c29]Marc Roeschlin, Ivan Martinovic, Kasper Bonne Rasmussen:
Device Pairing at the Touch of an Electrode. NDSS 2018 - [c28]Kasper Bonne Rasmussen, Paolo Gasti:
Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications. PST 2018: 1-10 - [c27]Eman Salem Alashwali, Kasper Rasmussen:
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name. SecureComm (2) 2018: 213-228 - [c26]Eman Salem Alashwali, Kasper Rasmussen:
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. SecureComm (2) 2018: 468-487 - [c25]Marc Roeschlin, Christian Vaas, Kasper Bonne Rasmussen, Ivan Martinovic:
Bionyms: Driver-centric Message Authentication using Biometric Measurements. VNC 2018: 1-8 - [i6]Eman Salem Alashwali, Kasper Rasmussen:
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. CoRR abs/1809.05681 (2018) - [i5]Eman Salem Alashwali, Kasper Rasmussen:
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name. CoRR abs/1809.05686 (2018) - 2017
- [j6]Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Authentication using pulse-response biometrics. Commun. ACM 60(2): 108-115 (2017) - [j5]Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Pulse-Response: Exploring Human Body Impedance for Biometric Recognition. ACM Trans. Priv. Secur. 20(2): 6:1-6:31 (2017) - [c24]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. AsiaCCS 2017: 386-399 - 2016
- [j4]Nils Ole Tippenhauer
, Kasper Bonne Rasmussen, Srdjan Capkun:
Physical-layer integrity for wireless messages. Comput. Networks 109: 31-38 (2016) - [j3]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics. ACM Trans. Priv. Secur. 19(1): 1:1-1:31 (2016) - [c23]Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Using Reflexive Eye Movements for Fast Challenge-Response Authentication. CCS 2016: 1056-1067 - [c22]Ferdinand Brasser, Kasper Bonne Rasmussen, Ahmad-Reza Sadeghi, Gene Tsudik:
Remote attestation for low-end embedded devices: the prover's perspective. DAC 2016: 91:1-91:6 - [c21]Ilias Giechaskiel
, Cas J. F. Cremers, Kasper Bonne Rasmussen:
On Bitcoin Security in the Presence of Broken Cryptographic Primitives. ESORICS (2) 2016: 201-222 - [c20]Chitra Javali, Girish Revadigar, Kasper Bonne Rasmussen, Wen Hu
, Sanjay Jha
:
I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol. LCN 2016: 477-485 - [c19]Marc Roeschlin, Ivo Sluganovic, Ivan Martinovic, Gene Tsudik, Kasper Bonne Rasmussen:
Generating Secret Keys from Biometric Body Impedance Measurements. WPES@CCS 2016: 59-69 - [i4]Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen:
On Bitcoin Security in the Presence of Broken Crypto Primitives. IACR Cryptol. ePrint Arch. 2016: 167 (2016) - 2015
- [c18]Girish Revadigar, Chitra Javali, Hassan Jameel Asghar
, Kasper Bonne Rasmussen, Sanjay Jha:
Mobility Independent Secret Key Generation for Wearable Health-care Devices. BODYNETS 2015 - [c17]Girish Revadigar, Chitra Javali, Hassan Jameel Asghar
, Kasper Bonne Rasmussen, Sanjay Jha
:
iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel. AsiaCCS 2015: 669 - [c16]Andrew C. Simpson, Andrew P. Martin
, Cas J. F. Cremers, Ivan Flechais, Ivan Martinovic, Kasper Bonne Rasmussen:
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security. ICSE (2) 2015: 435-444 - [c15]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. NDSS 2015 - [c14]Paolo Gasti, Kasper Bonne Rasmussen:
Privacy-preserving User Matching. WPES@CCS 2015: 111-120 - 2014
- [c13]Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik:
A minimalist approach to Remote Attestation. DATE 2014: 1-6 - [c12]Kasper Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, Gene Tsudik:
Authentication Using Pulse-Response Biometrics. NDSS 2014 - [c11]Filipe Beato, Emiliano De Cristofaro, Kasper Bonne Rasmussen:
Undetectable communication: The Online Social Networks case. PST 2014: 19-26 - 2012
- [c10]Paolo Gasti, Kasper Bonne Rasmussen:
On the Security of Password Manager Database Formats. ESORICS 2012: 770-787 - [c9]Cas J. F. Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. NDSS 2012 - [c8]Cas J. F. Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. IEEE Symposium on Security and Privacy 2012: 113-127 - [i3]Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik:
Systematic Treatment of Remote Attestation. IACR Cryptol. ePrint Arch. 2012: 713 (2012) - 2011
- [c7]Nils Ole Tippenhauer
, Christina Pöpper
, Kasper Bonne Rasmussen, Srdjan Capkun:
On the requirements for successful GPS spoofing attacks. CCS 2011: 75-86 - [i2]Cas J. F. Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. IACR Cryptol. ePrint Arch. 2011: 129 (2011) - 2010
- [j2]Thomas R. Stidsen
, Bjørn Petersen, Simon Spoorendonk, Martin Zachariasen
, Kasper Bonne Rasmussen:
Optimal routing with failure-independent path protection. Networks 55(2): 125-137 (2010) - [c6]Kasper Bonne Rasmussen, Srdjan Capkun:
Realization of RF Distance Bounding. USENIX Security Symposium 2010: 389-402
2000 – 2009
- 2009
- [c5]Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun:
Proximity-based access control for implantable medical devices. CCS 2009: 410-419 - [c4]Nils Ole Tippenhauer
, Kasper Bonne Rasmussen, Christina Pöpper
, Srdjan Capkun:
Attacks on public WLAN-based positioning systems. MobiSys 2009: 29-40 - [i1]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun:
Secure Ranging With Message Temporal Integrity. IACR Cryptol. ePrint Arch. 2009: 602 (2009) - 2008
- [j1]Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani B. Srivastava:
Secure Location Verification with Hidden and Mobile Base Stations. IEEE Trans. Mob. Comput. 7(4): 470-483 (2008) - [c3]Kasper Bonne Rasmussen, Srdjan Capkun:
Location privacy of distance bounding protocols. CCS 2008: 149-160 - 2007
- [c2]Kasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj:
SecNav: secure broadcast localization and time synchronization in wireless networks. MobiCom 2007: 310-313 - [c1]Kasper Bonne Rasmussen, Srdjan Capkun:
Implications of radio fingerprinting on the security of sensor networks. SecureComm 2007: 331-340
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-11-27 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint