Jiska Classen
Orcid: 0009-0006-4341-2808Affiliations:
- TU Darmstadt, Department of Computer Science, Germany
According to our database1,
Jiska Classen
authored at least 38 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements.
Proceedings of the Computer Security - ESORICS 2024, 2024
2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
2020
CoRR, 2020
DEMO: Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips.
CoRR, 2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Acoustic integrity codes: secure device pairing using short-range acoustic communication.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020
2019
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019
2018
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
2017
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
2016
Opportunities and pitfalls in securing visible light communication on the physical layer.
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 2016
Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2nd International Workshop on Visible Light Communications Systems, 2015
Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014