Patrick Leu

Orcid: 0000-0003-0069-3778

According to our database1, Patrick Leu authored at least 15 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure Ranging: Physical-Layer Attacks and Countermeasures.
PhD thesis, 2023

2022
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging.
Proceedings of the 31st USENIX Security Symposium, 2022

LTrack: Stealthy Tracking of Mobile Phones in LTE.
Proceedings of the 31st USENIX Security Symposium, 2022

AdaptOver: adaptive overshadowing attacks in cellular networks.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

2021
AdaptOver : Adaptive Overshadowing of LTE signals.
CoRR, 2021

Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Security of Multicarrier Time-of-Flight Ranging.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

2019
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband.
IACR Cryptol. ePrint Arch., 2019

Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement.
IACR Cryptol. ePrint Arch., 2019

2018
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

2017
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks.
IACR Cryptol. ePrint Arch., 2017

2016
Secure Motion Verification using the Doppler Effect.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016


  Loading...