Christoph Krauß

Orcid: 0000-0001-7776-7574

According to our database1, Christoph Krauß authored at least 60 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Penetration Testing of In-Vehicle Infotainment Systems in Connected Vehicles.
Proceedings of the IEEE Vehicular Networking Conference, 2024

Security Protocols for Ethernet-Based In-Vehicle Communication.
Proceedings of the IEEE Vehicular Networking Conference, 2024

(Un)authenticated Diagnostic Services: A Practical Evaluation of Vulnerabilities in the UDS Authentication Service.
Proceedings of the 2024 on Cyber Security in CarS Workshop, 2024

CSCS '24 - Cyber Security in CarS Workshop.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Self-sovereign Identity for Electric Vehicle Charging.
Proceedings of the Applied Cryptography and Network Security, 2024

Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid Domains.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging.
IACR Cryptol. ePrint Arch., 2023

Evaluation of Decision Tree-Based Rule Derivation for Intrusion Detection in Automotive Ethernet.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Detection of e-Mobility-Based Attacks on the Power Grid.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

Detection of Anomalies in Electric Vehicle Charging Sessions.
Proceedings of the Annual Computer Security Applications Conference, 2023

Remote Attestation with Constrained Disclosure.
Proceedings of the Annual Computer Security Applications Conference, 2023

Formal Security Analysis of Vehicle Diagnostic Protocols.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering.
Microprocess. Microsystems, April, 2022

Integrating Privacy into the Electric Vehicle Charging Architecture.
Proc. Priv. Enhancing Technol., 2022

Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

2021
Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants.
Simul. Model. Pract. Theory, 2021

Implementing a Security Architecture for Safety-Critical Railway Infrastructure.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

Analysis of E-Mobility-based Threats to Power Grid Resilience.
Proceedings of the CSCS '21: Computer Science in Cars Symposium, 2021

Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Post-Quantum TLS on Embedded Systems.
IACR Cryptol. ePrint Arch., 2020

Securing Electric Vehicle Charging Systems Through Component Binding.
Proceedings of the Computer Safety, Reliability, and Security, 2020

TrustEV: trustworthy electric vehicle charging and billing.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

SEPAD - Security Evaluation Platform for Autonomous Driving.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

Post-Quantum Secure Boot.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Security Analysis of Automotive Protocols.
Proceedings of the CSCS '20: Computer Science in Cars Symposium, 2020

HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure.
Proceedings of the CSCS '20: Computer Science in Cars Symposium, 2020

Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

HIP: HSM-based identities for plug-and-charge.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Security Requirements Engineering in Safety-Critical Railway Signalling Networks.
Secur. Commun. Networks, 2019

Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Digitization of the Energy System.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

2018
Souveränität und die IT-Wertschöpfungskette.
Datenschutz und Datensicherheit, 2018

Open Source Value Chains for Addressing Security Issues Efficiently.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
Proceedings of the International Workshop on MILS: Architecture and Assurance for Secure Systems, 2018

Anonymous Charging and Billing of Electric Vehicles.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Umfassende Sicherheit - Safety und Security im Kontext autonomer Systeme.
Inform. Spektrum, 2017

Selbstdatenschutz im vernetzten Fahrzeug.
Datenschutz und Datensicherheit, 2017

Runtime Firmware Product Lines Using TPM2.0.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

On Using TLS to Secure In-Vehicle Networks.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Advanced Remote Firmware Upgrades Using TPM 2.0.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

2015
Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids.
Secur. Commun. Networks, 2015

IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
Datenschutz und Datensicherheit, 2015

2013
Distributed Privacy-Preserving Aggregation of Metering Data in Smart Grids.
IEEE J. Sel. Areas Commun., 2013

Using Trusted Platform Modules for Location Assurance in Cloud Networking.
Proceedings of the Network and System Security - 7th International Conference, 2013

Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks.
Proceedings of the Information Security, 16th International Conference, 2013

Secure distributed data aggregation in the automatic metering infrastructure of smart grids.
Proceedings of IEEE International Conference on Communications, 2013

A decisional attack to privacy-friendly data aggregation in Smart Grids.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Towards Secure Fieldbus Communication.
Proceedings of the Computer Safety, Reliability, and Security, 2012

2011
Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen.
Datenschutz und Datensicherheit, 2011

T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011

2010
Handling insider attacks in wireless sensor networks.
PhD thesis, 2010

Detecting Compromised Nodes in Wireless Sensor Networks: Misbehavior-based Detection versus Attestation-based Detection (Erkennung kompromittierter Knoten in drahtlosen Sensornetzen: Erkennung basierend auf Fehlverhalten im Vergleich zu Erkennung mittels Attestation).
it Inf. Technol., 2010

2009
Short Hash-Based Signatures for Wireless Sensor Networks.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
On handling insider attacks in wireless sensor networks.
Inf. Secur. Tech. Rep., 2008

Defending against false-endorsement-based dos attacks in wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

2007
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks.
Proceedings of the The Second International Conference on Availability, 2007


  Loading...