Kasper Bonne Rasmussen
Orcid: 0000-0002-9471-9985
According to our database1,
Kasper Bonne Rasmussen
authored at least 81 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Aerosp. Electron. Syst., February, 2024
Defending Against Attack on the Cloned: In-Band Active Man-in-the-Middle Detection for the Signal Protocol.
CoRR, 2024
Basilisk: Remote Code Execution by Laser Excitation of P-N Junctions Without Insider Assistance.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
2023
Proc. IEEE, December, 2023
RegGuard: Leveraging CPU registers for mitigation of control- and data-oriented attacks.
Comput. Secur., June, 2023
IET Inf. Secur., May, 2023
IEEE Trans. Dependable Secur. Comput., 2023
CoRR, 2023
CoRR, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine Communication.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Private Data Exfiltration from Cyber-Physical Systems Using Channel State Information.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
2020
ACM Trans. Priv. Secur., 2020
IEEE Commun. Surv. Tutorials, 2020
Comput. Networks, 2020
TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the FPGA '20: The 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020
SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
ACM Trans. Reconfigurable Technol. Syst., 2019
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication.
ACM Trans. Priv. Secur., 2019
IACR Cryptol. ePrint Arch., 2019
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name.
IACR Cryptol. ePrint Arch., 2019
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS.
IACR Cryptol. ePrint Arch., 2019
CoRR, 2019
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 37th IEEE International Conference on Computer Design, 2019
Proceedings of the 29th International Conference on Field Programmable Logic and Applications, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Secur. Priv., 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
ACM Trans. Priv. Secur., 2017
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
ACM Trans. Priv. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel.
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th EAI International Conference on Body Area Networks, 2015
2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IEEE Trans. Mob. Comput., 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007