2024
Sensor Deprivation Attacks for Stealthy UAV Manipulation.
CoRR, 2024
A Scheduling-Aware Defense Against Prefetching-Based Side-Channel Attacks.
CoRR, 2024
Enabling Physical Localization of Uncooperative Cellular Devices.
CoRR, 2024
On Practical Realization of Evasion Attacks for Industrial Control Systems.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024
Enabling Physical Localization of Uncooperative Cellular Devices.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024
2023
Time sensitive networking security: issues of precision time protocol and its implementation.
Cybersecur., December, 2023
Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations.
CoRR, 2023
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 2022
HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version).
IEEE Internet Things J., 2022
Smooth Transition of Vehicles' Maximum Speed for Lane Detection based on Computer Vision.
Proceedings of the 96th Vehicular Technology Conference, 2022
Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
Proceedings of the 31st USENIX Security Symposium, 2022
Déjà Vu? Challenges and Opportunities for AM Security from an ICS perspective.
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security, 2022
Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
Proceedings of the 4th Workshop on CPS & IoT Security and Privacy, 2022
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
Proceedings of the Annual Computer Security Applications Conference, 2022
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Practical Pitfalls for Security in OPC UA.
CoRR, 2021
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Proceedings of the 30th USENIX Security Symposium, 2021
COTS Drone Detection using Video Streaming Characteristics.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021
2020
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy.
ACM Trans. Priv. Secur., 2020
Decentralized Privacy-Preserving Proximity Tracing.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
IEEE Data Eng. Bull., 2020
No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems.
CoRR, 2020
Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis.
CoRR, 2020
Decentralized Privacy-Preserving Proximity Tracing.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2020
BIAS: Bluetooth Impersonation AttackS.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
A Statistical Analysis Framework for ICS Process Datasets.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
Trust, But Verify? Perspectives On Industrial Device Security.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy.
IACR Cryptol. ePrint Arch., 2019
A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems.
Environ. Model. Softw., 2019
Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems.
CoRR, 2019
Challenges for Security Assessment of Enterprises in the IoT Era.
CoRR, 2019
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version).
CoRR, 2019
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
Proceedings of the 28th USENIX Security Symposium, 2019
PAtt: Physics-based Attestation of Control Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security, 2019
Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems.
ACM Comput. Surv., 2018
Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot.
CoRR, 2018
WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
State-aware anomaly detection for industrial control systems.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies.
Proceedings of the Computer Security, 2018
On Practical Threat Scenario Testing in an Electric Power ICS Testbed.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018
CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Detection of Unauthorized IoT Devices Using Machine Learning Techniques.
CoRR, 2017
IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods.
CoRR, 2017
Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3.
CoRR, 2017
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017
Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios.
Proceedings of the Computer Security - ESORICS 2017, 2017
On Ladder Logic Bombs in Industrial Control Systems.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
IoTScanner: Detecting Privacy Threats in IoT Neighborhoods.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017
Towards Formal Security Analysis of Industrial Control Systems.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Legacy-Compliant Data Authentication for Industrial Control System Traffic.
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Advanced Security Testbed Framework for Wearable IoT Devices.
ACM Trans. Internet Techn., 2016
Unequal Importance Multipath Video Streaming for Wireless Networks.
J. Multim. Process. Technol., 2016
Physical-layer integrity for wireless messages.
Comput. Networks, 2016
Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions.
Proceedings of the Formal Methods and Software Engineering, 2016
On Attacker Models and Profiles for Cyber-Physical Systems.
Proceedings of the Computer Security - ESORICS 2016, 2016
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016
SWaT: a water treatment testbed for research and training on ICS security.
Proceedings of the 2016 International Workshop on Cyber-physical Systems for Smart Water Networks, 2016
Limiting the Impact of Stealthy Attacks on Industrial Control Systems.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
Towards High-Interaction Virtual ICS Honeypots-in-a-Box.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
Multi-receiver GPS spoofing detection: error models and realization.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
UWB rapid-bit-exchange system for distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
MiniCPS: A Toolkit for Security Research on CPS Networks.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
2014
CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014
Automatic Generation of Security Argument Graphs.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014
2013
On Limitations of Friendly Jamming for Confidentiality.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Delay makes a difference: Smart grid resilience under remote meter disconnect attack.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Go with the flow: toward workflow-oriented security assessment.
Proceedings of the New Security Paradigms Workshop, 2013
2012
Physical-layer security aspects of wireless localization.
PhD thesis, 2012
Low-complexity Visible Light Networking with LED-to-LED communication.
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Proceedings of the Computer Security - ESORICS 2012, 2012
Toys communicating with LEDs: Enabling toy cars interaction.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
2011
Investigation of Signal and Message Manipulations on the Wireless Channel.
Proceedings of the Computer Security - ESORICS 2011, 2011
On the requirements for successful GPS spoofing attacks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Integrity Regions: Authentication through Presence in Wireless Networks.
IEEE Trans. Mob. Comput., 2010
UWB impulse radio based distance bounding.
Proceedings of the 7th Workshop on Positioning Navigation and Communication, 2010
2009
Secure Ranging With Message Temporal Integrity.
IACR Cryptol. ePrint Arch., 2009
Attacks on public WLAN-based positioning systems.
Proceedings of the 7th International Conference on Mobile Systems, 2009
ID-Based Secure Distance Bounding and Localization.
Proceedings of the Computer Security, 2009