Nils Ole Tippenhauer
Orcid: 0000-0001-8424-2602Affiliations:
- CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
According to our database1,
Nils Ole Tippenhauer
authored at least 97 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
CoRR, 2024
2023
Time sensitive networking security: issues of precision time protocol and its implementation.
Cybersecur., December, 2023
Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations.
CoRR, 2023
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version).
IEEE Internet Things J., 2022
Smooth Transition of Vehicles' Maximum Speed for Lane Detection based on Computer Vision.
Proceedings of the 96th Vehicular Technology Conference, 2022
Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security, 2022
Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
Proceedings of the 4th Workshop on CPS & IoT Security and Privacy, 2022
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
Proceedings of the Annual Computer Security Applications Conference, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021
2020
ACM Trans. Priv. Secur., 2020
No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems.
CoRR, 2020
Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis.
CoRR, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems.
Environ. Model. Softw., 2019
Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems.
CoRR, 2019
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version).
CoRR, 2019
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
ACM Comput. Surv., 2018
Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot.
CoRR, 2018
WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies.
Proceedings of the Computer Security, 2018
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
CoRR, 2017
Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3.
CoRR, 2017
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017
Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios.
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
ACM Trans. Internet Techn., 2016
J. Multim. Process. Technol., 2016
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016
Proceedings of the Formal Methods and Software Engineering, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016
Proceedings of the 2016 International Workshop on Cyber-physical Systems for Smart Water Networks, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
2014
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Delay makes a difference: Smart grid resilience under remote meter disconnect attack.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Proceedings of the New Security Paradigms Workshop, 2013
2012
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
IEEE Trans. Mob. Comput., 2010
Proceedings of the 7th Workshop on Positioning Navigation and Communication, 2010
2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the Computer Security, 2009