Pieter Robyns

Orcid: 0000-0003-3306-8637

According to our database1, Pieter Robyns authored at least 14 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2020
Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
Explicit and Implicit Information Leakage in Wireless Communication
PhD thesis, 2019

Improving CEMA using Correlation Optimization.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Personal Information Leakage by Abusing the GDPR 'Right of Access'.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

2018
IUPTIS: Fingerprinting Profile Webpages in a Dynamic and Practical DPI Context.
Proceedings of the Web Information Systems and Technologies, 2018

IUPTIS: A Practical, Cache-resistant Fingerprinting Technique for Dynamic Webpages.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 2018

A Multi-Channel Software Decoder for the LoRa Modulation Scheme.
Proceedings of the 3rd International Conference on Internet of Things, 2018

2017
Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices.
Secur. Commun. Networks, 2017

PHY-layer security is no alternative to cryptography.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

2016
POSTER: Assessing the Impact of 802.11 Vulnerabilities using Wicability.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

2015
Injection attacks on 802.11n MAC frame aggregation.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

2014
Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014


  Loading...