default search action
Nils Ole Tippenhauer
Person information
- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c69]Alessandro Erba, Andrés F. Murillo, Riccardo Taormina, Stefano Galelli, Nils Ole Tippenhauer:
On Practical Realization of Evasion Attacks for Industrial Control Systems. RICSS@CCS 2024: 9-25 - [i25]Taekkyung Oh, Sangwook Bae, Junho Ahn, Yonghwa Lee, Dinh-Tuan Hoang, Min Suk Kang, Nils Ole Tippenhauer, Yongdae Kim:
Enabling Physical Localization of Uncooperative Cellular Devices. CoRR abs/2403.14963 (2024) - [i24]Till Schlüter, Nils Ole Tippenhauer:
A Scheduling-Aware Defense Against Prefetching-Based Side-Channel Attacks. CoRR abs/2410.00452 (2024) - [i23]Alessandro Erba, John H. Castellanos, Sahil Sihag, Saman A. Zonouz, Nils Ole Tippenhauer:
Sensor Deprivation Attacks for Stealthy UAV Manipulation. CoRR abs/2410.11131 (2024) - 2023
- [j11]Davide Berardi, Nils Ole Tippenhauer, Andrea Melis, Marco Prandini, Franco Callegati:
Time sensitive networking security: issues of precision time protocol and its implementation. Cybersecur. 6(1): 8 (2023) - [c68]Till Schlüter, Amit Choudhari, Lorenz Hetterich, Leon Trampert, Hamed Nemati, Ahmad Ibrahim, Michael Schwarz, Christian Rossow, Nils Ole Tippenhauer:
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers. CCS 2023: 975-989 - [c67]Tim Walita, Alessandro Erba, John Henry Castellanos, Nils Ole Tippenhauer:
Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks. CPSS@AsiaCCS 2023: 36-47 - [c66]Alessandro Erba, Nils Ole Tippenhauer:
White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems. DIMVA 2023: 111-131 - [c65]Aolin Ding, Matthew Chan, Amin Hass, Nils Ole Tippenhauer, Shiqing Ma, Saman A. Zonouz:
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles. DSN 2023: 67-80 - [c64]Andrei Bytes, Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos, Jianying Zhou, Nils Ole Tippenhauer:
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network. RAID 2023: 499-512 - [e4]Ioana Boureanu, Steve Schneider, Bradley Reaves, Nils Ole Tippenhauer:
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023. ACM 2023, ISBN 978-1-4503-9859-6 [contents] - [i22]Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani B. Srivastava, Saman A. Zonouz, Luis Garcia:
Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations. CoRR abs/2307.13131 (2023) - 2022
- [j10]Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Yuval Elovici, Nils Ole Tippenhauer:
HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version). IEEE Internet Things J. 9(12): 9640-9658 (2022) - [j9]Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martín Ochoa:
Constrained Proximity Attacks on Mobile Targets. ACM Trans. Priv. Secur. 25(2): 10:1-10:29 (2022) - [c63]Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter:
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge. ACNS 2022: 170-192 - [c62]Alessandro Erba, Nils Ole Tippenhauer:
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks. ACSAC 2022: 412-426 - [c61]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer:
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy. AsiaCCS 2022: 196-207 - [c60]Alessandro Erba, Anne Müller, Nils Ole Tippenhauer:
Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems. CPSIOTSEC@CCS 2022: 1-13 - [c59]Nils Ole Tippenhauer:
Déjà Vu? Challenges and Opportunities for AM Security from an ICS perspective. AMSec@CCS 2022: 1 - [c58]Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer, Christian Rossow:
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels. CCS 2022: 1489-1503 - [c57]Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman A. Zonouz:
Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring. USENIX Security Symposium 2022: 661-678 - [c56]Hamid Reza Ghaeini, Nils Ole Tippenhauer:
Smooth Transition of Vehicles' Maximum Speed for Lane Detection based on Computer Vision. VTC Fall 2022: 1-5 - [i21]Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter:
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge. CoRR abs/2204.09106 (2022) - [i20]Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer, Christian Rossow:
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels. CoRR abs/2211.13958 (2022) - 2021
- [c55]Nils Ole Tippenhauer, Binbin Chen, Daisuke Mashima, David M. Nicol:
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation. CPSIOTSEC@CCS 2021: 3-14 - [c54]Giovanni Barbieri, Mauro Conti, Nils Ole Tippenhauer, Federico Turrin:
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis. ICCCN 2021: 1-9 - [c53]Anas Alsoliman, Giulio Rigoni, Marco Levorato, Cristina M. Pinotti, Nils Ole Tippenhauer, Mauro Conti:
COTS Drone Detection using Video Streaming Characteristics. ICDCN 2021: 166-175 - [c52]Jianliang Wu, Ruoyu Wu, Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. USENIX Security Symposium 2021: 339-356 - [e3]Kazue Sako, Nils Ole Tippenhauer:
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12726, Springer 2021, ISBN 978-3-030-78371-6 [contents] - [e2]Kazue Sako, Nils Ole Tippenhauer:
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12727, Springer 2021, ISBN 978-3-030-78374-7 [contents] - [e1]Jiannong Cao, Man Ho Au, Mauro Conti, Nils Ole Tippenhauer, Alessandro Brighente:
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021. ACM 2021, ISBN 978-1-4503-8402-5 [contents] - [i19]Alessandro Erba, Anne Müller, Nils Ole Tippenhauer:
Practical Pitfalls for Security in OPC UA. CoRR abs/2104.06051 (2021) - 2020
- [j8]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [j7]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy. ACM Trans. Priv. Secur. 23(3): 14:1-14:28 (2020) - [c51]Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, Nils Ole Tippenhauer:
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems. ACSAC 2020: 480-495 - [c50]Nils Ole Tippenhauer:
Trust, But Verify? Perspectives On Industrial Device Security. CPSS@AsiaCCS 2020: 1 - [c49]Federico Turrin, Alessandro Erba, Nils Ole Tippenhauer, Mauro Conti:
A Statistical Analysis Framework for ICS Process Datasets. CPSIOTSEC@CCS 2020: 25-30 - [c48]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
BIAS: Bluetooth Impersonation AttackS. SP 2020: 549-562 - [i18]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i17]Giovanni Barbieri, Mauro Conti, Nils Ole Tippenhauer, Federico Turrin:
Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis. CoRR abs/2007.01114 (2020) - [i16]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer:
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy. CoRR abs/2009.11776 (2020) - [i15]Alessandro Erba, Nils Ole Tippenhauer:
No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems. CoRR abs/2012.03586 (2020)
2010 – 2019
- 2019
- [j6]Riccardo Taormina, Stefano Galelli, Hunter C. Douglas, Nils Ole Tippenhauer, Elad Salomons, Avi Ostfeld:
A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems. Environ. Model. Softw. 112: 46-51 (2019) - [c47]Hamid Reza Ghaeini, Nils Ole Tippenhauer, Jianying Zhou:
Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures. ARES 2019: 80:1-80:10 - [c46]Jairo Giraldo, David I. Urbina, Alvaro A. Cárdenas, Nils Ole Tippenhauer:
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems. ACNS 2019: 175-195 - [c45]Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici:
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices. AsiaCCS 2019: 479-484 - [c44]Nils Ole Tippenhauer, Avishai Wool:
CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy. CCS 2019: 2695-2696 - [c43]Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. CODASPY 2019: 85-96 - [c42]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen:
Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android. NDSS 2019 - [c41]Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, Saman A. Zonouz:
PAtt: Physics-based Attestation of Control Systems. RAID 2019: 165-180 - [c40]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen:
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR. USENIX Security Symposium 2019: 1047-1061 - [p1]Nils Ole Tippenhauer:
Design and Realization of Testbeds for Security Research in the Industrial Internet of Things. Security and Privacy Trends in the Industrial Internet of Thing 2019: 287-310 - [i14]Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici:
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version). CoRR abs/1905.01027 (2019) - [i13]Yael Mathov, Noga Agmon, Asaf Shabtai, Rami Puzis, Nils Ole Tippenhauer, Yuval Elovici:
Challenges for Security Assessment of Enterprises in the IoT Era. CoRR abs/1906.10922 (2019) - [i12]Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, Nils Ole Tippenhauer:
Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems. CoRR abs/1907.07487 (2019) - [i11]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy. IACR Cryptol. ePrint Arch. 2019: 933 (2019) - 2018
- [j5]Jairo Giraldo, David I. Urbina, Alvaro A. Cárdenas, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, Richard Candell:
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Comput. Surv. 51(4): 76:1-76:36 (2018) - [c39]Ahnaf Siddiqi, Nils Ole Tippenhauer, Daisuke Mashima, Binbin Chen:
On Practical Threat Scenario Testing in an Electric Power ICS Testbed. CPSS@AsiaCCS 2018: 15-21 - [c38]Awais Rashid, Nils Ole Tippenhauer:
CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy. CCS 2018: 2171-2172 - [c37]Xueou Wang, Xiaolu Hou, Ruben Rios, Per A. Hallgren, Nils Ole Tippenhauer, Martín Ochoa:
Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies. ESORICS (2) 2018: 373-392 - [c36]Hamid Reza Ghaeini, Daniele Antonioli, Ferdinand Brasser, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer:
State-aware anomaly detection for industrial control systems. SAC 2018: 1620-1628 - [c35]Ragav Sridharan, Rajib Ranjan Maiti, Nils Ole Tippenhauer:
WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic. WISEC 2018: 51-62 - [i10]Daniele Antonioli, Giuseppe Bernieri, Nils Ole Tippenhauer:
Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot. CoRR abs/1802.00152 (2018) - 2017
- [c34]John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, Martín Ochoa:
Legacy-Compliant Data Authentication for Industrial Control System Traffic. ACNS 2017: 665-685 - [c33]Daniele Antonioli, Sandra Siby, Nils Ole Tippenhauer:
Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN. CANS 2017: 415-435 - [c32]Sandra Siby, Rajib Ranjan Maiti, Nils Ole Tippenhauer:
IoTScanner: Detecting Privacy Threats in IoT Neighborhoods. IoTPTS@AsiaCCS 2017: 23-30 - [c31]Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
SIPHON: Towards Scalable High-Interaction Physical Honeypots. CPSS@AsiaCCS 2017: 57-68 - [c30]Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martín Ochoa, Nils Ole Tippenhauer:
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3. CPS-SPC@CCS 2017: 93-102 - [c29]Marco Rocchetto, Nils Ole Tippenhauer:
Towards Formal Security Analysis of Industrial Control Systems. AsiaCCS 2017: 114-126 - [c28]Naman Govil, Anand Agrawal, Nils Ole Tippenhauer:
On Ladder Logic Bombs in Industrial Control Systems. CyberICPS/SECPRE@ESORICS 2017: 110-126 - [c27]Rajib Ranjan Maiti, Sandra Siby, Ragav Sridharan, Nils Ole Tippenhauer:
Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios. ESORICS (2) 2017: 247-264 - [c26]Yair Meidan, Michael Bohadana, Asaf Shabtai, Juan David Guarnizo, Martín Ochoa, Nils Ole Tippenhauer, Yuval Elovici:
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. SAC 2017: 506-509 - [i9]Juan Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
SIPHON: Towards Scalable High-Interaction Physical Honeypots. CoRR abs/1701.02446 (2017) - [i8]Sandra Siby, Rajib Ranjan Maiti, Nils Ole Tippenhauer:
IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods. CoRR abs/1701.05007 (2017) - [i7]Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martín Ochoa, Nils Ole Tippenhauer:
Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3. CoRR abs/1702.03067 (2017) - [i6]Naman Govil, Anand Agrawal, Nils Ole Tippenhauer:
On Ladder Logic Bombs in Industrial Control Systems. CoRR abs/1702.05241 (2017) - [i5]Yair Meidan, Michael Bohadana, Asaf Shabtai, Martín Ochoa, Nils Ole Tippenhauer, Juan David Guarnizo, Yuval Elovici:
Detection of Unauthorized IoT Devices Using Machine Learning Techniques. CoRR abs/1709.04647 (2017) - 2016
- [j4]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun:
Physical-layer integrity for wireless messages. Comput. Networks 109: 31-38 (2016) - [j3]Qamar Hamid Naith, Hamid Reza Ghaeini, Nils Ole Tippenhauer, Alicia Triviño-Cabrera:
Unequal Importance Multipath Video Streaming for Wireless Networks. J. Multim. Process. Technol. 7(3): 91-101 (2016) - [j2]Shachar Siboni, Asaf Shabtai, Nils Ole Tippenhauer, Jemin Lee, Yuval Elovici:
Advanced Security Testbed Framework for Wearable IoT Devices. ACM Trans. Internet Techn. 16(4): 26:1-26:25 (2016) - [c25]Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper:
Multi-receiver GPS spoofing detection: error models and realization. ACSAC 2016: 237-250 - [c24]Daniele Antonioli, Anand Agrawal, Nils Ole Tippenhauer:
Towards High-Interaction Virtual ICS Honeypots-in-a-Box. CPS-SPC@CCS 2016: 13-22 - [c23]Hamid Reza Ghaeini, Nils Ole Tippenhauer:
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems. CPS-SPC@CCS 2016: 103-111 - [c22]David I. Urbina, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Richard Candell, Henrik Sandberg:
Limiting the Impact of Stealthy Attacks on Industrial Control Systems. CCS 2016: 1092-1105 - [c21]Aditya P. Mathur, Nils Ole Tippenhauer:
SWaT: a water treatment testbed for research and training on ICS security. CySWATER@CPSWeek 2016: 31-36 - [c20]Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol:
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment. GraMSec@CSF 2016: 39-61 - [c19]Marco Rocchetto, Nils Ole Tippenhauer:
On Attacker Models and Profiles for Cyber-Physical Systems. ESORICS (2) 2016: 427-449 - [c18]Marco Rocchetto, Nils Ole Tippenhauer:
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. ICFEM 2016: 175-192 - [c17]David I. Urbina, Jairo Alonso Giraldo, Nils Ole Tippenhauer, Alvaro A. Cárdenas:
Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed. SG-CRC 2016: 75-89 - [c16]Riccardo Taormina, Stefano Galelli, Nils Ole Tippenhauer, Elad Salomons, Avi Ostfeld:
Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET. SG-CRC 2016: 123-130 - [i4]Marco Rocchetto, Nils Ole Tippenhauer:
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. CoRR abs/1607.02562 (2016) - 2015
- [c15]Daniele Antonioli, Nils Ole Tippenhauer:
MiniCPS: A Toolkit for Security Research on CPS Networks. CPS-SPC@CCS 2015: 91-100 - [c14]Nils Ole Tippenhauer, Heinrich Luecken, Marc Kuhn, Srdjan Capkun:
UWB rapid-bit-exchange system for distance bounding. WISEC 2015: 2:1-2:12 - [i3]Daniele Antonioli, Nils Ole Tippenhauer:
MiniCPS: A toolkit for security research on CPS Networks. CoRR abs/1507.04860 (2015) - 2014
- [c13]Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. PRDC 2014: 33-42 - [c12]An Hoa Vu, Nils Ole Tippenhauer, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk:
CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems. QEST 2014: 384-387 - [i2]Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William H. Sanders:
Automatic Generation of Security Argument Graphs. CoRR abs/1405.7475 (2014) - 2013
- [c11]Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K. Y. Yau:
Go with the flow: toward workflow-oriented security assessment. NSPW 2013: 65-76 - [c10]William G. Temple, Binbin Chen, Nils Ole Tippenhauer:
Delay makes a difference: Smart grid resilience under remote meter disconnect attack. SmartGridComm 2013: 462-467 - [c9]Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun:
On Limitations of Friendly Jamming for Confidentiality. IEEE Symposium on Security and Privacy 2013: 160-173 - 2012
- [b1]Nils Ole Tippenhauer:
Physical-layer security aspects of wireless localization. ETH Zurich, Zürich, Switzerland, 2012 - [c8]Nils Ole Tippenhauer, Domenico Giustiniano, Stefan Mangold:
Toys communicating with LEDs: Enabling toy cars interaction. CCNC 2012: 48-49 - [c7]Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun:
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. ESORICS 2012: 415-432 - [c6]Domenico Giustiniano, Nils Ole Tippenhauer, Stefan Mangold:
Low-complexity Visible Light Networking with LED-to-LED communication. Wireless Days 2012: 1-8 - 2011
- [c5]Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun:
On the requirements for successful GPS spoofing attacks. CCS 2011: 75-86 - [c4]Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun:
Investigation of Signal and Message Manipulations on the Wireless Channel. ESORICS 2011: 40-59 - 2010
- [j1]Srdjan Capkun, Mario Cagalj, Ghassan Karame, Nils Ole Tippenhauer:
Integrity Regions: Authentication through Presence in Wireless Networks. IEEE Trans. Mob. Comput. 9(11): 1608-1621 (2010) - [c3]Marc Kuhn, Heinrich Luecken, Nils Ole Tippenhauer:
UWB impulse radio based distance bounding. WPNC 2010: 28-37
2000 – 2009
- 2009
- [c2]Nils Ole Tippenhauer, Srdjan Capkun:
ID-Based Secure Distance Bounding and Localization. ESORICS 2009: 621-636 - [c1]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun:
Attacks on public WLAN-based positioning systems. MobiSys 2009: 29-40 - [i1]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun:
Secure Ranging With Message Temporal Integrity. IACR Cryptol. ePrint Arch. 2009: 602 (2009)
Coauthor Index
aka: Kasper Rasmussen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint