
Srdjan Capkun
Person information
- affiliation: ETH Zurich
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j35]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [j34]Kari Kostiainen
, Aritra Dhar
, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. IEEE Secur. Priv. 18(5): 38-46 (2020) - [c118]Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun:
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts. CCS 2020: 587-600 - [c117]Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
ProximiTEE: Hardened SGX Attestation by Proximity Verification. CODASPY 2020: 5-16 - [c116]Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
ProtectIOn: Root-of-Trust for IO in Compromised Platforms. NDSS 2020 - [c115]Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun:
Snappy: Fast On-chain Payments with Practical Collaterals. NDSS 2020 - [c114]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. IEEE Symposium on Security and Privacy 2020: 500-516 - [c113]Srdjan Capkun:
Digital Contact Tracing. USENIX Security Symposium 2020 - [e6]Srdjan Capkun, Franziska Roesner:
29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020. USENIX Association 2020, ISBN 978-1-939133-17-5 [contents] - [i62]Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun:
Snappy: Fast On-chain Payments with Practical Collaterals. CoRR abs/2001.01278 (2020) - [i61]Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun:
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. CoRR abs/2005.11516 (2020) - [i60]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i59]Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment. CoRR abs/2010.10416 (2020) - [i58]Anders Dalskov, Daniele Lain, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
2FE: Two-Factor Encryption for Cloud Storage. CoRR abs/2010.14417 (2020) - [i57]Ivo Sluganovic, Enis Ulqinaku, Aritra Dhar, Daniele Lain, Srdjan Capkun, Ivan Martinovic:
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients. CoRR abs/2011.13979 (2020) - [i56]Kari Kostiainen, Aritra Dhar, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. IACR Cryptol. ePrint Arch. 2020: 469 (2020) - [i55]Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Capkun:
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols. IACR Cryptol. ePrint Arch. 2020: 1298 (2020)
2010 – 2019
- 2019
- [j33]Gildas Avoine, Muhammed Ali Bingöl
, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua
, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [j32]Moritz Schneider
, Sinisa Matetic, Ari Juels, Andrew Miller, Srdjan Capkun:
Secure Brokered Delegation Through DelegaTEE. IEEE Secur. Priv. 17(4): 43-52 (2019) - [j31]Ghassan O. Karame
, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun:
Securing Cloud Data Under Key Exposure. IEEE Trans. Cloud Comput. 7(3): 838-849 (2019) - [c112]Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi:
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization. ACSAC 2019: 788-800 - [c111]Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun:
PRCash: Fast, Private and Regulated Transactions for Digital Currencies. Financial Cryptography 2019: 158-178 - [c110]Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun:
ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution. Financial Cryptography 2019: 179-198 - [c109]Mridula Singh, Patrick Leu, Srdjan Capkun:
UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks. NDSS 2019 - [c108]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
Deniable Upload and Download via Passive Participation. NSDI 2019: 649-666 - [c107]Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. USENIX Security Symposium 2019: 73-88 - [c106]Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun:
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. USENIX Security Symposium 2019: 783-800 - [c105]Daniel Moser, Vincent Lenders, Srdjan Capkun:
Digital radio signal cancellation attacks: an experimental evaluation. WiSec 2019: 23-33 - [c104]Enis Ulqinaku, Daniele Lain, Srdjan Capkun:
2FA-PP: 2nd factor phishing prevention. WiSec 2019: 60-70 - [i54]Ivan Puddu, Daniele Lain, Moritz Schneider, Elizaveta Tretiakova, Sinisa Matetic, Srdjan Capkun:
TEEvil: Identity Lease via Trusted Execution Environments. CoRR abs/1903.00449 (2019) - [i53]David M. Sommer, Moritz Schneider, Jannik Gut, Srdjan Capkun:
Cyber-Risks in Paper Voting. CoRR abs/1906.07532 (2019) - [i52]Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun:
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. CoRR abs/1911.10637 (2019) - [i51]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. CoRR abs/1911.11052 (2019) - [i50]Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. CoRR abs/1911.11078 (2019) - [i49]Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun:
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts. IACR Cryptol. ePrint Arch. 2019: 835 (2019) - [i48]Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun:
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 857 (2019) - [i47]Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
ProtectIOn: Root-of-Trust for IO in Compromised Platforms. IACR Cryptol. ePrint Arch. 2019: 869 (2019) - [i46]Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. IACR Cryptol. ePrint Arch. 2019: 1349 (2019) - [i45]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. IACR Cryptol. ePrint Arch. 2019: 1350 (2019) - 2018
- [j30]Ghassan Karame, Srdjan Capkun:
Blockchain Security and Privacy. IEEE Secur. Priv. 16(4): 11-12 (2018) - [j29]Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame
, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Toward Shared Ownership in the Cloud. IEEE Trans. Inf. Forensics Secur. 13(12): 3019-3034 (2018) - [c103]Srdjan Capkun:
Secure Positioning and Location-Based Security for IoT and Beyond. ASHES@CCS 2018: 81 - [c102]Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun:
TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing. NDSS 2018 - [c101]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. USENIX Security Symposium 2018: 1387-1403 - [c100]Patrick Leu
, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun:
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. WISEC 2018: 23-33 - [e5]Srdjan Capkun, Sherman S. M. Chow
:
Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11261, Springer 2018, ISBN 978-3-030-02640-0 [contents] - [i44]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. IACR Cryptol. ePrint Arch. 2018: 160 (2018) - [i43]Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun:
PRCash: Centrally-Issued Digital Currency with Privacy and Regulation. IACR Cryptol. ePrint Arch. 2018: 412 (2018) - [i42]Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun:
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. IACR Cryptol. ePrint Arch. 2018: 803 (2018) - [i41]Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification. IACR Cryptol. ePrint Arch. 2018: 902 (2018) - [i40]Sinisa Matetic, Karl Wüst, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun:
ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution. IACR Cryptol. ePrint Arch. 2018: 1024 (2018) - 2017
- [j28]Aanjhan Ranganathan, Srdjan Capkun:
Are We Really Close? Verifying Proximity in Wireless Systems. IEEE Secur. Priv. 15(3): 52-58 (2017) - [c99]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. AsiaCCS 2017: 3 - [c98]Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. CHES 2017: 468-489 - [c97]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-Based Ranging. CHES 2017: 490-509 - [c96]Luka Malisa, Kari Kostiainen, Srdjan Capkun:
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. CODASPY 2017: 289-300 - [c95]Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun:
Quantifying Web Adblocker Privacy. ESORICS (2) 2017: 21-42 - [c94]Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. USENIX Security Symposium 2017: 1289-1306 - [c93]Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun:
Using hover to compromise the confidentiality of user input on Android. WISEC 2017: 12-22 - [c92]Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi:
Software Grand Exposure: SGX Cache Attacks Are Practical. WOOT 2017 - [i39]Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi:
Software Grand Exposure: SGX Cache Attacks Are Practical. CoRR abs/1702.07521 (2017) - [i38]Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Urs Müller, Ahmad-Reza Sadeghi:
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization. CoRR abs/1709.09917 (2017) - [i37]Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. IACR Cryptol. ePrint Arch. 2017: 48 (2017) - [i36]Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun:
μchain: How to Forget without Hard Forks. IACR Cryptol. ePrint Arch. 2017: 106 (2017) - [i35]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. IACR Cryptol. ePrint Arch. 2017: 191 (2017) - [i34]Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Towards Shared Ownership in the Cloud. IACR Cryptol. ePrint Arch. 2017: 227 (2017) - [i33]Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun:
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation. IACR Cryptol. ePrint Arch. 2017: 578 (2017) - [i32]Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. IACR Cryptol. ePrint Arch. 2017: 584 (2017) - [i31]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-based Ranging. IACR Cryptol. ePrint Arch. 2017: 591 (2017) - [i30]Mridula Singh, Patrick Leu, Srdjan Capkun:
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks. IACR Cryptol. ePrint Arch. 2017: 1240 (2017) - [i29]Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, Srdjan Capkun:
IntegriKey: End-to-End Integrity Protection of User Input. IACR Cryptol. ePrint Arch. 2017: 1245 (2017) - 2016
- [j27]Nils Ole Tippenhauer
, Kasper Bonne Rasmussen, Srdjan Capkun:
Physical-layer integrity for wireless messages. Comput. Networks 109: 31-38 (2016) - [c91]Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun:
On the Security and Performance of Proof of Work Blockchains. CCS 2016: 3-16 - [c90]Hubert Ritzdorf, Ghassan Karame, Claudio Soriente, Srdjan Capkun:
On Information Leakage in Deduplicated Storage Systems. CCSW 2016: 61-72 - [c89]Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking. SPSM@CCS 2016: 83-92 - [c88]Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications. CHI 2016: 540-551 - [c87]Luka Malisa, Kari Kostiainen, Michael Och, Srdjan Capkun:
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction. ESORICS (1) 2016: 217-237 - [c86]Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Vincent Lenders, Srdjan Capkun:
Quantifying Location Privacy Leakage from Transaction Prices. ESORICS (2) 2016: 382-405 - [c85]Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun:
SPREE: a spoofing resistant GPS receiver. MobiCom 2016: 348-360 - [c84]Daniel Moser, Patrick Leu
, Vincent Lenders, Aanjhan Ranganathan, Fabio Ricciato, Srdjan Capkun:
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures. MobiCom 2016: 375-386 - [c83]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
SALVE: server authentication with location verification. MobiCom 2016: 401-414 - [c82]Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, Srdjan Capkun:
Verena: End-to-End Integrity Protection for Web Applications. IEEE Symposium on Security and Privacy 2016: 895-913 - [p3]Davide Zanetti, Srdjan Capkun, Boris Danev:
Types and Origins of Fingerprints. Digital Fingerprinting 2016: 5-29 - [i28]Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun:
SPREE: Spoofing Resistant GPS Receiver. CoRR abs/1603.05462 (2016) - [i27]Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals. CoRR abs/1604.04723 (2016) - [i26]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
SALVE: Server Authentication with Location VErification. CoRR abs/1608.04563 (2016) - [i25]Der-Yeuan Yu, Elizabeth Stobert, David A. Basin, Srdjan Capkun:
Exploring Website Location as a Security Indicator. CoRR abs/1610.03647 (2016) - [i24]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-based Ranging. CoRR abs/1610.06077 (2016) - [i23]Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun:
Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android. CoRR abs/1611.01477 (2016) - [i22]Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun:
On the Security and Performance of Proof of Work Blockchains. IACR Cryptol. ePrint Arch. 2016: 555 (2016) - [i21]Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun:
Quantifying Web Adblocker Privacy. IACR Cryptol. ePrint Arch. 2016: 900 (2016) - 2015
- [j26]Wade Trappe, Lalitha Sankar, Radha Poovendran, Heejo Lee, Srdjan Capkun:
Introduction to the Issue on Signal and Information Processing for Privacy. IEEE J. Sel. Top. Signal Process. 9(7): 1173-1175 (2015) - [j25]Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Capkun:
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability. ACM Trans. Inf. Syst. Secur. 18(1): 2:1-2:32 (2015) - [c81]Aanjhan Ranganathan, Boris Danev, Srdjan Capkun:
Proximity Verification for Contactless Access Control and Authentication Systems. ACSAC 2015: 271-280 - [c80]Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun:
Logical Partitions on Many-Core Platforms. ACSAC 2015: 451-460 - [c79]Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun:
Tampering with the Delivery of Blocks and Transactions in Bitcoin. CCS 2015: 692-705 - [c78]Claudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun:
Commune: Shared Ownership in an Agnostic Cloud. SACMAT 2015: 39-50 - [c77]Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Srdjan Capkun:
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. USENIX Security Symposium 2015: 483-498 - [c76]Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun:
Thermal Covert Channels on Multi-core Platforms. USENIX Security Symposium 2015: 865-880 - [c75]Nils Ole Tippenhauer
, Heinrich Luecken, Marc Kuhn, Srdjan Capkun:
UWB rapid-bit-exchange system for distance bounding. WISEC 2015: 2:1-2:12 - [i20]Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms. CoRR abs/1502.06824 (2015) - [i19]Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Srdjan Capkun:
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. CoRR abs/1503.03790 (2015) - [i18]Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun:
Thermal Covert Channels on Multi-core Platforms. CoRR abs/1503.07000 (2015) - [i17]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
W-SPS: Designing a Wide-Area Secure Positioning System. IACR Cryptol. ePrint Arch. 2015: 230 (2015) - [i16]Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun:
Quantifying Location Privacy Leakage from Transaction Prices. IACR Cryptol. ePrint Arch. 2015: 496 (2015) - [i15]Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun:
Tampering with the Delivery of Blocks and Transactions in Bitcoin. IACR Cryptol. ePrint Arch. 2015: 578 (2015) - [i14]Luka Malisa, Kari Kostiainen, Srdjan Capkun:
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. IACR Cryptol. ePrint Arch. 2015: 709 (2015) - 2014
- [j24]Joel Reardon, David A. Basin, Srdjan Capkun:
On Secure Data Deletion. IEEE Secur. Priv. 12(3): 37-44 (2014) - [j23]Arthur Gervais, Ghassan O. Karame, Vedran Capkun, Srdjan Capkun:
Is Bitcoin a Decentralized Currency? IEEE Secur. Priv. 12(3): 54-60 (2014) - [j22]Ghassan Karame, Aurélien Francillon, Victor Budilivschi, Srdjan Capkun, Vedran Capkun:
Microcomputations as Micropayments in Web-based Services. ACM Trans. Internet Techn. 13(3): 8:1-8:23 (2014) - [c74]Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Capkun:
Assisted deletion of related content. ACSAC 2014: 206-215 - [c73]Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, Damian Gruber:
On the privacy provisions of Bloom filters in lightweight bitcoin clients. ACSAC 2014: 326-335 - [c72]Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, Vincent Lenders:
Quantifying Web-Search Privacy. CCS 2014: 966-977 - [c71]Naveed Ahmed, Christina Pöpper
, Srdjan Capkun:
Enabling Short Fragments for Uncoordinated Spread Spectrum Communication. ESORICS (1) 2014: 488-507 - [c70]Elli Androulaki, Claudio Soriente, Luka Malisa, Srdjan Capkun:
Enforcing Location and Time-Based Access Control on Cloud-Stored Data. ICDCS 2014: 637-648 - [c69]Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Smartphones as Practical and Secure Location Verification Tokens for Payments. NDSS 2014 - [c68]Nikolaos Karapanos, Srdjan Capkun:
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications. USENIX Security Symposium 2014: 671-686 - [c67]Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun, David A. Basin:
Short paper: detection of GPS spoofing attacks in power grids. WISEC 2014: 99-104 - [i13]Aanjhan Ranganathan, Boris Danev, Srdjan Capkun:
Low-power Distance Bounding. CoRR abs/1404.4435 (2014) - [i12]Ramya Jayaram Masti, Devendra Rai, Claudio Marforio, Srdjan Capkun:
Isolated Execution on Many-core Architectures. IACR Cryptol. ePrint Arch. 2014: 136 (2014) - [i11]Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun:
Securing Cloud Data in the New Attacker Model. IACR Cryptol. ePrint Arch. 2014: 556 (2014) - [i10]Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun:
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients. IACR Cryptol. ePrint Arch. 2014: 763 (2014) - 2013
- [j21]Ghassan Karame, Boris Danev, Cyrill Bannwart
, Srdjan Capkun:
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions. IEEE Trans. Inf. Forensics Secur. 8(1): 149-162 (2013) - [c66]