Ravishankar Borgaonkar

Orcid: 0000-0003-2874-3650

Affiliations:
  • TU Berlin, Department of Software Engineering and Theoretical Computer Science


According to our database1, Ravishankar Borgaonkar authored at least 32 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Software Bill of Materials in Critical Infrastructure.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

2022
Experimental Security Analysis of Connected Pacemakers.
Proceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies, 2022

Security Analysis of the Internet of Medical Things (IoMT): Case Study of the Pacemaker Ecosystem.
Proceedings of the Biomedical Engineering Systems and Technologies, 2022

2021
Improving smart grid security through 5G enabled IoT and edge computing.
Concurr. Comput. Pract. Exp., 2021

A Testbed for Advanced Distribution Management Systems: Assessment of Cybersecurity.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2021

Tool-assisted Threat Modeling for Smart Grid Cyber Security.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2020
On the Certificate Revocation Problem in the Maritime Sector.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols.
Proc. Priv. Enhancing Technol., 2019

New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

5G as an Enabler for Secure IoT in the Smart Grid : Invited Paper.
Proceedings of the First International Conference on Societal Automation, 2019

Anatomy of Commercial IMSI Catchers and Detectors.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

2018
A Security Architecture for 5G Networks.
IEEE Access, 2018

On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

2017
White-Stingray: Evaluating IMSI Catchers Detection Applications.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Mobile Subscriber WiFi Privacy.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Architectures for Enhancing Authentication Privacy and Security using Trusted Computing.
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017

2016
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Analysis of Trusted Execution Environment usage in Samsung KNOX.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Characterizing SEAndroid Policies in the Wild.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2014
New paradigms for access control in constrained environments.
Proceedings of the 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip, 2014

What Does the Fox Say? On the Security Architecture of Firefox OS.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Security Analysis of Femtocell-Enabled Cellular Network Architecture.
PhD thesis, 2013

SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

2012
Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

New privacy issues in mobile telephony: fix and verification.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Security analysis of a femtocell device.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

2010
An Analysis of the Asprox Botnet.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Experimental Analysis of the Femtocell Location Verification Techniques.
Proceedings of the Information Security Technology for Applications, 2010

2009
Spam filter optimality based on signal detection theory.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Security Usability of Petname Systems.
Proceedings of the Identity and Privacy in the Internet Age, 2009


  Loading...