Srdjan Capkun
Orcid: 0000-0001-5727-3673Affiliations:
- ETH Zurich
According to our database1,
Srdjan Capkun
authored at least 217 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2019, "For contributions to systems and wireless network security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
CoRR, 2024
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
On Location Privacy and Security of Positioning in Modern Systems.
Proceedings of the 8th International Conference on Internet of Things, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols.
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
CoRR, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
2017
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks.
IACR Cryptol. ePrint Arch., 2017
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android.
CoRR, 2016
Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals.
CoRR, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
ACM Trans. Inf. Syst. Secur., 2015
IEEE J. Sel. Top. Signal Process., 2015
IACR Cryptol. ePrint Arch., 2015
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms.
CoRR, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
ACM Trans. Internet Techn., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the CCSW'13, 2013
Proceedings of the SPSM'13, 2013
2012
ACM Trans. Inf. Syst. Secur., 2012
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
ACM Trans. Inf. Syst. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the Symposium On Usable Privacy and Security, 2011
On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
IEEE Trans. Mob. Comput., 2010
IEEE J. Sel. Areas Commun., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Influence of user perception, security needs, and social factors on device pairing method choices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the Theorem Proving in Higher Order Logics, 22nd International Conference, 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009
Proceedings of the 8th International Conference on Information Processing in Sensor Networks, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Computer Security, 2009
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IEEE Trans. Mob. Comput., 2008
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions.
ACM Trans. Inf. Syst. Secur., 2008
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels.
IEEE Trans. Dependable Secur. Comput., 2008
IEEE Commun. Mag., 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Securing Localization in Wireless Networks <i>(using Verifiable Multilateration and Covert Base Stations)</i>.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
IEEE Trans. Mob. Comput., 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
2005
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
2004
A formal model of rational exchange and its application to the analysis of Syverson's protocol.
J. Comput. Secur., 2004
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004
2003
IEEE Trans. Mob. Comput., 2003
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003
2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2001
IEEE Commun. Mag., 2001
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001