Vincent Lenders

Orcid: 0000-0002-2289-3722

Affiliations:
  • armasuisse, Thun, Switzerland


According to our database1, Vincent Lenders authored at least 163 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SkyPos: Real-World Evaluation of Self-Positioning With Aircraft Signals for IoT Devices.
IEEE J. Sel. Areas Commun., January, 2024

X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don't-Care Hardware Trojans to Shared Cloud FPGAs.
IEEE Access, 2024

VSAsTer: Uncovering Inherent Security Issues in Current VSAT System Practices.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS).
Proceedings of the 33rd USENIX Security Symposium, 2024

RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users.
Proceedings of the 33rd USENIX Security Symposium, 2024

Wireless Signal Injection Attacks on VSAT Satellite Modems.
Proceedings of the 33rd USENIX Security Symposium, 2024

HydroLab: A Versatile Hydroelectric Power Lab for Security Research and Education.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Automated Identification of Emerging Technologies: Open Data Approach.
Proceedings of Joint Workshop of the 5th Extraction and Evaluation of Knowledge Entities from Scientific Documents (EEKE2024) and the 4th AI + Informetrics (AII2024) co-located with the ( iConference2024), 2024

On Building Secure Wide-Area Networks over Public Internet Service Providers.
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024

Defeating and Improving Network Flow Classifiers Through Adversarial Machine Learning.
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024

2023
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach.
IEEE Secur. Priv., 2023

Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era.
ACM Comput. Surv., 2023

Lessons Learned in ATCO2: 5000 hours of Air Traffic Control Communications for Robust Automatic Speech Recognition and Understanding.
CoRR, 2023

Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense.
CoRR, 2023

FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Modeling 5G Threat Scenarios for Critical Infrastructure Protection.
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023

Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic.
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023

2022
Improving Aircraft Localization: Experiences and Lessons Learned from an Open Competition.
CoRR, 2022

Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing.
CoRR, 2022

DFAulted: Analyzing and Exploiting CPU Software Faults Caused by FPGA-Driven Undervolting Attacks.
IEEE Access, 2022

Building an Avionics Laboratory for Cybersecurity Testing.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.
Proceedings of the 31st USENIX Security Symposium, 2022

Aggregate-based congestion control for pulse-wave DDoS defense.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022

ditto: WAN Traffic Obfuscation at Line Rate.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

FPGA-to-CPU Undervolting Attacks.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

Security and Privacy Issues of Satellite Communication in the Avlatlon Domain.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

High Data Throughput Exfiltration Through Video Cable Emanations.
Proceedings of the Critical Information Infrastructures Security, 2022

On the Security of the FLARM Collision Warning System.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Event Detection on Microposts: A Comparison of Four Approaches.
IEEE Trans. Knowl. Data Eng., 2021

Classi-Fly: Inferring Aircraft Categories from Open Data.
ACM Trans. Intell. Syst. Technol., 2021

LocaRDS: A Localization Reference Data Set.
Sensors, 2021

From Scattered Sources to Comprehensive Technology Landscape: A Recommendation-based Retrieval Approach.
CoRR, 2021

5G System Security Analysis.
CoRR, 2021

Blockchain in Cyberdefence: A Technology Review from a Swiss Perspective.
CoRR, 2021

Orbit-based authentication using TDOA signatures in satellite networks.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

In the Same Boat: On Small Satellites, Big Rockets, and Cyber Trust.
Proceedings of the 13th International Conference on Cyber Conflict, 2021

Towards an AI-powered Player in Cyber Defence Exercises.
Proceedings of the 13th International Conference on Cyber Conflict, 2021

Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses.
Proceedings of the Critical Information Infrastructures Security, 2021

You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

2020
Crowdsourced Wireless Spectrum Anomaly Detection.
IEEE Trans. Cogn. Commun. Netw., 2020

Understanding Realistic Attacks on Airborne Collision Avoidance Systems.
CoRR, 2020

Contact Tracing: An Overview of Technologies and Cyber Risks.
CoRR, 2020

QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband.
CoRR, 2020

Electrosense+: Crowdsourcing radio spectrum decoding using IoT receivers.
Comput. Networks, 2020

A Tale of Sea and Sky On the Security of Maritime VSAT Communications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SkySense: terrestrial and aerial spectrum use analysed using lightweight sensing technology with weather balloons.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

2019
Unsupervised Wireless Spectrum Anomaly Detection With Interpretable Features.
IEEE Trans. Cogn. Commun. Netw., 2019

Safety vs. Security: Attacking Avionic Systems with Humans in the Loop.
CoRR, 2019

On the Applicability of Satellite-Based Air Traffic Control Communication for Security.
IEEE Commun. Mag., 2019

Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Digital radio signal cancellation attacks: an experimental evaluation.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Jamming/Garbling assessment and possible mitigations in the OpenSky network.
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019

Higher than a kite: ADS-B communication analysis using a high-altitude balloon.
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019

Collaborative wideband signal decoding using non-coherent receivers.
Proceedings of the 18th International Conference on Information Processing in Sensor Networks, 2019

(Self) Driving Under the Influence: Intoxicating Adversarial Network Inputs.
Proceedings of the 18th ACM Workshop on Hot Topics in Networks, 2019

Secure Location Verification: Why You Want Your Verifiers to Be Mobile.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Machine Learninģ-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defense Exercise.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

Detection of Malicious Remote Shell Sessions.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

BlackWidow: Monitoring the Dark Web for Cyber Security Information.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Deep Learning Models for Wireless Signal Classification With Distributed Low-Cost Spectrum Sensors.
IEEE Trans. Cogn. Commun. Netw., 2018

A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2018

Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS).
Proc. Priv. Enhancing Technol., 2018

Electrosense+: Empowering People to Decode the Radio Spectrum.
CoRR, 2018

Electrosense: Open and Big Spectrum Data.
IEEE Commun. Mag., 2018

Interference Suppression in Bandwidth Hopping Spread Spectrum Communications.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

NetHide: Secure and Practical Network Topology Obfuscation.
Proceedings of the 27th USENIX Security Symposium, 2018

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Monitoring meteorological parameters with crowdsourced air traffic control data.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

Data fusion for hybrid and autonomous time-of-flight positioning.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

Nanosecond-precision time-of-arrival estimation for aircraft signals with low-cost SDR receivers.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

Demo: Electrosense - spectrum sensing with increased frequency range.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Surveying Aviation Professionals on the Security of the Air Traffic Control System.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Utilizing air traffic communications for OSINT on state and government aircraft.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

Screen watermarking for data theft investigation and attribution.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
Filtering Noisy 802.11 Time-of-Flight Ranging Measurements From Commoditized WiFi Radios.
IEEE/ACM Trans. Netw., 2017

On Perception and Reality in Wireless Air Traffic Communication Security.
IEEE Trans. Intell. Transp. Syst., 2017

Distributed Deep Learning Models for Wireless Signal Classification with Low-Cost Spectrum Sensors.
CoRR, 2017

Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS).
CoRR, 2017

Measuring Spectrum Similarity in Distributed Radio Monitoring Systems.
Proceedings of the Digital Communication. Towards a Smart and Secure Future Internet, 2017

LTESS-track: A Precise and Fast Frequency Offset Estimation for low-cost SDR Platforms.
Proceedings of the 11th Workshop on Wireless Network Testbeds, 2017

Crowdsourcing spectrum data decoding.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS.
Proceedings of the Financial Cryptography and Data Security, 2017

ArmaTweet: Detecting Events by Semantic Tweet Analysis.
Proceedings of the Semantic Web - 14th International Conference, 2017

Electrosense: Crowdsourcing spectrum monitoring.
Proceedings of the 2017 IEEE International Symposium on Dynamic Spectrum Access Networks, 2017

Unsupervised Detection of APT C&C Channels using Web Request Graphs.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Crowdsourcing security for wireless air traffic communications.
Proceedings of the 9th International Conference on Cyber Conflict, 2017

Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics.
ACM Trans. Priv. Secur., 2016

Quantifying Web Adblocker Privacy.
IACR Cryptol. ePrint Arch., 2016

A Localization Approach for Crowdsourced Air Traffic Communication Networks.
CoRR, 2016

On Perception and Reality in Wireless Air Traffic Communications Security.
CoRR, 2016

Secure Motion Verification using the Doppler Effect.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Evaluation of self-positioning algorithms for time-of-flight based localization.
Proceedings of the 14th International Symposium on Modeling and Optimization in Mobile, 2016

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Quantifying Location Privacy Leakage from Transaction Prices.
Proceedings of the Computer Security - ESORICS 2016, 2016

Assessing the impact of aviation security on cyber power.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

2015
An Automated Approach for Complementing Ad Blockers' Blacklists.
Proc. Priv. Enhancing Technol., 2015

Gaining an Edge in Cyberspace with Advanced Situational Awareness.
IEEE Secur. Priv., 2015

Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic?
IEEE Secur. Priv., 2015

Hviz: HTTP(S) traffic aggregation and visualization for network forensics.
Digit. Investig., 2015

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol.
IEEE Commun. Surv. Tutorials, 2015

Security by mobility in location and track verification.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Secure Track Verification.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Deep Inspection of the Noise in WiFi Time-of-Flight Echo Techniques.
Proceedings of the 18th ACM International Conference on Modeling, 2015

Towards understanding upstream Web traffic.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A software-defined sensor architecture for large-scale wideband spectrum monitoring.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

A low-cost sensor platform for large-scale wideband spectrum monitoring.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

Intrusion Detection for Airborne Communication Using PHY-Layer Information.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

Jamming mitigation by randomized bandwidth hopping.
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015

Lightweight Location Verification in Air Traffic Surveillance Networks.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
On the Reception of Concurrent Transmissions in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014

Detection of Reactive Jamming in DSSS-based Wireless Communications.
IEEE Trans. Wirel. Commun., 2014

Realities and challenges of nextgen air traffic management: the case of ADS-B.
IEEE Commun. Mag., 2014

Poster abstract: practical limits of wifi time-of-flight echo techniques.
Proceedings of the IPSN'14, 2014

Demonstration abstract: OpenSky: a large-scale ADS-B sensor network for research.
Proceedings of the IPSN'14, 2014

Bringing up OpenSky: a large-scale ADS-B sensor network for research.
Proceedings of the IPSN'14, 2014

Filtering Noisy 802.11 Time-of-Flight Ranging Measurements.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

Towards Classifying Third-Party Web Services at Scale.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

Quantifying Web-Search Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference
CoRR, 2013

An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks.
CoRR, 2013

Security of ADS-B: State of the Art and Beyond.
CoRR, 2013

Detection of reactive jamming in DSSS-based wireless networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Semantic fusion of live Web content: System design and implementation experiences.
Proceedings of the Workshop on Sensor Data Fusion: Trends, Solutions, Applications, 2013

BLITZ: Wireless Link Quality Estimation in the Dark.
Proceedings of the Wireless Sensor Networks - 10th European Conference, 2013

Horizon extender: long-term preservation of data leakage evidence in web traffic.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Experimental Analysis of Attacks on Next Generation Air Traffic Communication.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Obfuscating IEEE 802.15.4 communication using secret spreading codes.
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012

Fast and accurate packet delivery estimation based on DSSS chip errors.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

AFR: automatic multi-stage forensic data retrieval.
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 2012

2011
WiSec 2011 demo: RFReact - a real-time capable and channel-aware jamming platform.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Holmes: A data theft forensic framework.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

WiFire: a firewall for wireless networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

2009
Repeatable and Realistic Experimentation in Mobile Wireless Networks.
IEEE Trans. Mob. Comput., 2009

2008
An empirical study of the impact of mobility on link failures in an 802.11 ad hoc network.
IEEE Wirel. Commun., 2008

Density-based anycast: a robust routing strategy for wireless ad hoc networks.
IEEE/ACM Trans. Netw., 2008

Wireless ad hoc podcasting.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

Location-based trust for mobile user-generated content: applications, challenges and implementations.
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008

Link-Diversity Routing: A Robust Routing Paradigm for Mobile Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

The limits of theory: Pragmatic challenges in mobile ad hoc systems.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Narrowcasting: an empirical performance evaluation study.
Proceedings of the Third Workshop on Challenged Networks, CHANTS 2008, San Francisco, 2008

2007
Delay-Tolerant Broadcasting.
IEEE Trans. Broadcast., 2007

HEAT: Scalable Routing in Wireless Mesh Networks Using Temperature Fields.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Routing Packets into Wireless Mesh Networks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

Wireless Ad Hoc Podcasting.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

Wireless opportunistic podcasting: implementation and design tradeoffs.
Proceedings of the Second Workshop on Challenged Networks, CHANTS 2007, Montréal, Québec, 2007

2006
Field based routing and its application to wireless ad hoc networks.
PhD thesis, 2006

Measurements from an 802.11b Mobile Ad Hoc Network.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative Comparison.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

Analyzing the impact of mobility in ad hoc networks.
Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality, 2006

Density-Based vs. Proximity-Based Anycast Routing for Mobile Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Service discovery in mobile ad hoc networks: A field theoretic approach.
Pervasive Mob. Comput., 2005

Towards a new communication paradigm for mobile ad hoc networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005


  Loading...