Watching your call: Breaking VoLTE Privacy in LTE/5G Networks.
Proc. Priv. Enhancing Technol., April, 2023
Millimeter-Wave Automotive Radar Spoofing.
CoRR, 2022
Cutting Through the Complexity of Reverse Engineering Embedded Devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
SoK: Untangling File-based Encryption on Mobile Devices.
CoRR, 2021
Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons.
IACR Cryptol. ePrint Arch., 2020
CAOS: Concurrent-Access Obfuscated Store.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
TRAKS: A Universal Key Management Scheme for ERTMS.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017