default search action
Srdjan Capkun
Person information
- affiliation: ETH Zurich
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c137]Daniele Lain, Tarek Jost, Sinisa Matetic, Kari Kostiainen, Srdjan Capkun:
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training. CCS 2024: 4182-4196 - [c136]Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Capkun:
On (the Lack of) Code Confidentiality in Trusted Execution Environments. SP 2024: 4125-4142 - [c135]Daniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David A. Basin, Srdjan Capkun:
PURE: Payments with UWB RElay-protection. USENIX Security Symposium 2024 - [i78]Mark Kuhne, Supraja Sridhara, Andrin Bertschi, Nicolas Dutly, Srdjan Capkun, Shweta Shinde:
Aster: Fixing the Android TEE Ecosystem with Arm CCA. CoRR abs/2407.16694 (2024) - [i77]Andrin Bertschi, Supraja Sridhara, Friederike Groschupp, Mark Kuhne, Benedict Schlüter, Clément Thorens, Nicolas Dutly, Srdjan Capkun, Shweta Shinde:
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation. CoRR abs/2408.05835 (2024) - [i76]Carolin Beer, Sheila Zingg, Kari Kostiainen, Karl Wüst, Vedran Capkun, Srdjan Capkun:
PayOff: A Regulated Central Bank Digital Currency with Private Offline Payments. CoRR abs/2408.06956 (2024) - [i75]Daniele Lain, Tarek Jost, Sinisa Matetic, Kari Kostiainen, Srdjan Capkun:
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training. CoRR abs/2409.01378 (2024) - [i74]Moritz Schneider, Daniele Lain, Ivan Puddu, Nicolas Dutly, Srdjan Capkun:
Breaking Bad: How Compilers Break Constant-Time~Implementations. CoRR abs/2410.13489 (2024) - 2023
- [c134]Srdjan Capkun:
On Location Privacy and Security of Positioning in Modern Systems. IoTBDS 2023: 7 - [c133]Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, Srdjan Capkun:
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems. NDSS 2023 - [c132]Claudio Anliker, Giovanni Camurati, Srdjan Capkun:
Time for Change: How Clocks Break UWB Secure Ranging. USENIX Security Symposium 2023: 19-36 - [i73]Claudio Anliker, Giovanni Camurati, Srdjan Capkun:
Time for Change: How Clocks Break UWB Secure Ranging. CoRR abs/2305.09433 (2023) - 2022
- [j37]Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
Composite Enclaves: Towards Disaggregated Trusted Execution. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 630-656 (2022) - [c131]Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun:
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation. CCS 2022: 2947-2960 - [c130]Simon Erni, Martin Kotuliak, Patrick Leu, Marc Roeschlin, Srdjan Capkun:
AdaptOver: adaptive overshadowing attacks in cellular networks. MobiCom 2022: 743-755 - [c129]Mridula Singh, Marc Roeschlin, Aanjhan Ranganathan, Srdjan Capkun:
V-Range: Enabling Secure Ranging in 5G Wireless Networks. NDSS 2022 - [c128]Daniele Lain, Kari Kostiainen, Srdjan Capkun:
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. SP 2022: 842-859 - [c127]Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Capkun:
LTrack: Stealthy Tracking of Mobile Phones in LTE. USENIX Security Symposium 2022: 1291-1306 - [c126]Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. USENIX Security Symposium 2022: 1343-1359 - [c125]Srdjan Capkun:
Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies. WISEC 2022: 1 - [i72]Moritz Schneider, Ramya Jayaram Masti, Shweta Shinde, Srdjan Capkun, Ronald Perez:
SoK: Hardware-supported Trusted Execution Environments. CoRR abs/2205.12742 (2022) - [i71]Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, Renzo Andri:
Empowering Data Centers for Next Generation Trusted Computing. CoRR abs/2211.00306 (2022) - [i70]Friederike Groschupp, Mark Kuhne, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun:
It's TEEtime: Bringing User Sovereignty to Smartphones. CoRR abs/2211.05206 (2022) - [i69]Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Capkun:
On (the Lack of) Code Confidentiality in Trusted Execution Environments. CoRR abs/2212.07899 (2022) - 2021
- [c124]Patrick Leu, Martin Kotuliak, Marc Roeschlin, Srdjan Capkun:
Security of Multicarrier Time-of-Flight Ranging. ACSAC 2021: 887-899 - [c123]Srdjan Capkun, Ercan Ozturk, Gene Tsudik, Karl Wüst:
ROSEN: RObust and SElective Non-repudiation (for TLS). CCSW 2021: 97-109 - [c122]Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun:
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains. NDSS 2021 - [c121]Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun:
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. USENIX Security Symposium 2021: 663-680 - [c120]Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Capkun:
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols. USENIX Security Symposium 2021: 3811-3828 - [c119]Mridula Singh, Marc Roeschlin, Ezzat Zalzala, Patrick Leu, Srdjan Capkun:
Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement. WISEC 2021: 227-237 - [i68]Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun:
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones. CoRR abs/2102.02743 (2021) - [i67]Martin Kotuliak, Simon Erni, Patrick Leu, Marc Roeschlin, Srdjan Capkun:
LTrack: Stealthy Tracking of Mobile Phones in LTE. CoRR abs/2106.05007 (2021) - [i66]Simon Erni, Patrick Leu, Martin Kotuliak, Marc Röschlin, Srdjan Capkun:
AdaptOver : Adaptive Overshadowing of LTE signals. CoRR abs/2106.05039 (2021) - [i65]Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. CoRR abs/2111.05313 (2021) - [i64]Daniele Lain, Kari Kostiainen, Srdjan Capkun:
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. CoRR abs/2112.07498 (2021) - [i63]Karl Wüst, Kari Kostiainen, Srdjan Capkun:
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation. IACR Cryptol. ePrint Arch. 2021: 1443 (2021) - 2020
- [j36]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [j35]Kari Kostiainen, Aritra Dhar, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. IEEE Secur. Priv. 18(5): 38-46 (2020) - [c118]Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun:
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts. CCS 2020: 587-600 - [c117]Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
ProximiTEE: Hardened SGX Attestation by Proximity Verification. CODASPY 2020: 5-16 - [c116]Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
ProtectIOn: Root-of-Trust for IO in Compromised Platforms. NDSS 2020 - [c115]Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun:
Snappy: Fast On-chain Payments with Practical Collaterals. NDSS 2020 - [c114]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. SP 2020: 500-516 - [c113]Srdjan Capkun:
Digital Contact Tracing. USENIX Security Symposium 2020 - [e6]Srdjan Capkun, Franziska Roesner:
29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020. USENIX Association 2020, ISBN 978-1-939133-17-5 [contents] - [i62]Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun:
Snappy: Fast On-chain Payments with Practical Collaterals. CoRR abs/2001.01278 (2020) - [i61]Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun:
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. CoRR abs/2005.11516 (2020) - [i60]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i59]Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment. CoRR abs/2010.10416 (2020) - [i58]Anders P. K. Dalskov, Daniele Lain, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
2FE: Two-Factor Encryption for Cloud Storage. CoRR abs/2010.14417 (2020) - [i57]Ivo Sluganovic, Enis Ulqinaku, Aritra Dhar, Daniele Lain, Srdjan Capkun, Ivan Martinovic:
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients. CoRR abs/2011.13979 (2020) - [i56]Kari Kostiainen, Aritra Dhar, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. IACR Cryptol. ePrint Arch. 2020: 469 (2020) - [i55]Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Capkun:
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols. IACR Cryptol. ePrint Arch. 2020: 1298 (2020)
2010 – 2019
- 2019
- [j34]Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [j33]Moritz Schneider, Sinisa Matetic, Ari Juels, Andrew Miller, Srdjan Capkun:
Secure Brokered Delegation Through DelegaTEE. IEEE Secur. Priv. 17(4): 43-52 (2019) - [j32]Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun:
Securing Cloud Data Under Key Exposure. IEEE Trans. Cloud Comput. 7(3): 838-849 (2019) - [c112]Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi:
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization. ACSAC 2019: 788-800 - [c111]Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun:
PRCash: Fast, Private and Regulated Transactions for Digital Currencies. Financial Cryptography 2019: 158-178 - [c110]Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun:
ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution. Financial Cryptography 2019: 179-198 - [c109]Mridula Singh, Patrick Leu, Srdjan Capkun:
UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks. NDSS 2019 - [c108]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
Deniable Upload and Download via Passive Participation. NSDI 2019: 649-666 - [c107]Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. USENIX Security Symposium 2019: 73-88 - [c106]Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun:
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. USENIX Security Symposium 2019: 783-800 - [c105]Daniel Moser, Vincent Lenders, Srdjan Capkun:
Digital radio signal cancellation attacks: an experimental evaluation. WiSec 2019: 23-33 - [c104]Enis Ulqinaku, Daniele Lain, Srdjan Capkun:
2FA-PP: 2nd factor phishing prevention. WiSec 2019: 60-70 - [i54]Ivan Puddu, Daniele Lain, Moritz Schneider, Elizaveta Tretiakova, Sinisa Matetic, Srdjan Capkun:
TEEvil: Identity Lease via Trusted Execution Environments. CoRR abs/1903.00449 (2019) - [i53]David M. Sommer, Moritz Schneider, Jannik Gut, Srdjan Capkun:
Cyber-Risks in Paper Voting. CoRR abs/1906.07532 (2019) - [i52]Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun:
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. CoRR abs/1911.10637 (2019) - [i51]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. CoRR abs/1911.11052 (2019) - [i50]Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. CoRR abs/1911.11078 (2019) - [i49]Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun:
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts. IACR Cryptol. ePrint Arch. 2019: 835 (2019) - [i48]Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun:
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 857 (2019) - [i47]Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
ProtectIOn: Root-of-Trust for IO in Compromised Platforms. IACR Cryptol. ePrint Arch. 2019: 869 (2019) - [i46]Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. IACR Cryptol. ePrint Arch. 2019: 1349 (2019) - [i45]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. IACR Cryptol. ePrint Arch. 2019: 1350 (2019) - 2018
- [j31]Ghassan Karame, Srdjan Capkun:
Blockchain Security and Privacy. IEEE Secur. Priv. 16(4): 11-12 (2018) - [j30]Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Toward Shared Ownership in the Cloud. IEEE Trans. Inf. Forensics Secur. 13(12): 3019-3034 (2018) - [c103]Srdjan Capkun:
Secure Positioning and Location-Based Security for IoT and Beyond. ASHES@CCS 2018: 81 - [c102]Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun:
TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing. NDSS 2018 - [c101]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. USENIX Security Symposium 2018: 1387-1403 - [c100]Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun:
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. WISEC 2018: 23-33 - [e5]Srdjan Capkun, Sherman S. M. Chow:
Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11261, Springer 2018, ISBN 978-3-030-02640-0 [contents] - [i44]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. IACR Cryptol. ePrint Arch. 2018: 160 (2018) - [i43]Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun:
PRCash: Centrally-Issued Digital Currency with Privacy and Regulation. IACR Cryptol. ePrint Arch. 2018: 412 (2018) - [i42]Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun:
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. IACR Cryptol. ePrint Arch. 2018: 803 (2018) - [i41]Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification. IACR Cryptol. ePrint Arch. 2018: 902 (2018) - [i40]Sinisa Matetic, Karl Wüst, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun:
ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution. IACR Cryptol. ePrint Arch. 2018: 1024 (2018) - 2017
- [j29]Aanjhan Ranganathan, Srdjan Capkun:
Are We Really Close? Verifying Proximity in Wireless Systems. IEEE Secur. Priv. 15(3): 52-58 (2017) - [c99]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. AsiaCCS 2017: 3 - [c98]Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. CHES 2017: 468-489 - [c97]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-Based Ranging. CHES 2017: 490-509 - [c96]Luka Malisa, Kari Kostiainen, Srdjan Capkun:
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. CODASPY 2017: 289-300 - [c95]Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun:
Quantifying Web Adblocker Privacy. ESORICS (2) 2017: 21-42 - [c94]Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. USENIX Security Symposium 2017: 1289-1306 - [c93]Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun:
Using hover to compromise the confidentiality of user input on Android. WISEC 2017: 12-22 - [c92]Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi:
Software Grand Exposure: SGX Cache Attacks Are Practical. WOOT 2017 - [i39]Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi:
Software Grand Exposure: SGX Cache Attacks Are Practical. CoRR abs/1702.07521 (2017) - [i38]Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Urs Müller, Ahmad-Reza Sadeghi:
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization. CoRR abs/1709.09917 (2017) - [i37]Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. IACR Cryptol. ePrint Arch. 2017: 48 (2017) - [i36]Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun:
μchain: How to Forget without Hard Forks. IACR Cryptol. ePrint Arch. 2017: 106 (2017) - [i35]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. IACR Cryptol. ePrint Arch. 2017: 191 (2017) - [i34]Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Towards Shared Ownership in the Cloud. IACR Cryptol. ePrint Arch. 2017: 227 (2017) - [i33]Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun:
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation. IACR Cryptol. ePrint Arch. 2017: 578 (2017) - [i32]Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. IACR Cryptol. ePrint Arch. 2017: 584 (2017) - [i31]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-based Ranging. IACR Cryptol. ePrint Arch. 2017: 591 (2017) - [i30]Mridula Singh, Patrick Leu, Srdjan Capkun:
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks. IACR Cryptol. ePrint Arch. 2017: 1240 (2017) - [i29]Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, Srdjan Capkun:
IntegriKey: End-to-End Integrity Protection of User Input. IACR Cryptol. ePrint Arch. 2017: 1245 (2017) - 2016
- [j28]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun:
Physical-layer integrity for wireless messages. Comput. Networks 109: 31-38 (2016) - [c91]Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun:
On the Security and Performance of Proof of Work Blockchains. CCS 2016: 3-16 - [c90]Hubert Ritzdorf, Ghassan Karame, Claudio Soriente, Srdjan Capkun:
On Information Leakage in Deduplicated Storage Systems. CCSW 2016: 61-72 - [c89]Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking. SPSM@CCS 2016: 83-92 - [c88]Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications. CHI 2016: 540-551 - [c87]Luka Malisa, Kari Kostiainen, Michael Och, Srdjan Capkun:
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction. ESORICS (1) 2016: 217-237 - [c86]Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Vincent Lenders, Srdjan Capkun:
Quantifying Location Privacy Leakage from Transaction Prices. ESORICS (2) 2016: 382-405 - [c85]Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun:
SPREE: a spoofing resistant GPS receiver. MobiCom 2016: 348-360 - [c84]Daniel Moser, Patrick Leu, Vincent Lenders, Aanjhan Ranganathan, Fabio Ricciato, Srdjan Capkun:
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures. MobiCom 2016: 375-386 - [c83]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
SALVE: server authentication with location verification. MobiCom 2016: 401-414 - [c82]Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, Srdjan Capkun:
Verena: End-to-End Integrity Protection for Web Applications. IEEE Symposium on Security and Privacy 2016: 895-913 - [p3]Davide Zanetti, Srdjan Capkun, Boris Danev:
Types and Origins of Fingerprints. Digital Fingerprinting 2016: 5-29 - [i28]Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun:
SPREE: Spoofing Resistant GPS Receiver. CoRR abs/1603.05462 (2016) - [i27]Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals. CoRR abs/1604.04723 (2016) - [i26]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
SALVE: Server Authentication with Location VErification. CoRR abs/1608.04563 (2016) - [i25]Der-Yeuan Yu, Elizabeth Stobert, David A. Basin, Srdjan Capkun:
Exploring Website Location as a Security Indicator. CoRR abs/1610.03647 (2016) - [i24]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-based Ranging. CoRR abs/1610.06077 (2016) - [i23]Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun:
Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android. CoRR abs/1611.01477 (2016) - [i22]Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun:
On the Security and Performance of Proof of Work Blockchains. IACR Cryptol. ePrint Arch. 2016: 555 (2016) - [i21]Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun:
Quantifying Web Adblocker Privacy. IACR Cryptol. ePrint Arch. 2016: 900 (2016) - 2015
- [j27]Wade Trappe, Lalitha Sankar, Radha Poovendran, Heejo Lee, Srdjan Capkun:
Introduction to the Issue on Signal and Information Processing for Privacy. IEEE J. Sel. Top. Signal Process. 9(7): 1173-1175 (2015) - [j26]Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Capkun:
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability. ACM Trans. Inf. Syst. Secur. 18(1): 2:1-2:32 (2015) - [c81]Aanjhan Ranganathan, Boris Danev, Srdjan Capkun:
Proximity Verification for Contactless Access Control and Authentication Systems. ACSAC 2015: 271-280 - [c80]Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun:
Logical Partitions on Many-Core Platforms. ACSAC 2015: 451-460 - [c79]Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun:
Tampering with the Delivery of Blocks and Transactions in Bitcoin. CCS 2015: 692-705 - [c78]Claudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun:
Commune: Shared Ownership in an Agnostic Cloud. SACMAT 2015: 39-50 - [c77]Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Srdjan Capkun:
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. USENIX Security Symposium 2015: 483-498 - [c76]Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun:
Thermal Covert Channels on Multi-core Platforms. USENIX Security Symposium 2015: 865-880 - [c75]Nils Ole Tippenhauer, Heinrich Luecken, Marc Kuhn, Srdjan Capkun:
UWB rapid-bit-exchange system for distance bounding. WISEC 2015: 2:1-2:12 - [i20]Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms. CoRR abs/1502.06824 (2015) - [i19]Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Srdjan Capkun:
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. CoRR abs/1503.03790 (2015) - [i18]Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun:
Thermal Covert Channels on Multi-core Platforms. CoRR abs/1503.07000 (2015) - [i17]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
W-SPS: Designing a Wide-Area Secure Positioning System. IACR Cryptol. ePrint Arch. 2015: 230 (2015) - [i16]Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun:
Quantifying Location Privacy Leakage from Transaction Prices. IACR Cryptol. ePrint Arch. 2015: 496 (2015) - [i15]Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun:
Tampering with the Delivery of Blocks and Transactions in Bitcoin. IACR Cryptol. ePrint Arch. 2015: 578 (2015) - [i14]Luka Malisa, Kari Kostiainen, Srdjan Capkun:
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. IACR Cryptol. ePrint Arch. 2015: 709 (2015) - 2014
- [j25]Joel Reardon, David A. Basin, Srdjan Capkun:
On Secure Data Deletion. IEEE Secur. Priv. 12(3): 37-44 (2014) - [j24]Arthur Gervais, Ghassan O. Karame, Vedran Capkun, Srdjan Capkun:
Is Bitcoin a Decentralized Currency? IEEE Secur. Priv. 12(3): 54-60 (2014) - [j23]Ghassan Karame, Aurélien Francillon, Victor Budilivschi, Srdjan Capkun, Vedran Capkun:
Microcomputations as Micropayments in Web-based Services. ACM Trans. Internet Techn. 13(3): 8:1-8:23 (2014) - [c74]Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Capkun:
Assisted deletion of related content. ACSAC 2014: 206-215 - [c73]Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, Damian Gruber:
On the privacy provisions of Bloom filters in lightweight bitcoin clients. ACSAC 2014: 326-335 - [c72]Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, Vincent Lenders:
Quantifying Web-Search Privacy. CCS 2014: 966-977 - [c71]Naveed Ahmed, Christina Pöpper, Srdjan Capkun:
Enabling Short Fragments for Uncoordinated Spread Spectrum Communication. ESORICS (1) 2014: 488-507 - [c70]Elli Androulaki, Claudio Soriente, Luka Malisa, Srdjan Capkun:
Enforcing Location and Time-Based Access Control on Cloud-Stored Data. ICDCS 2014: 637-648 - [c69]Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Smartphones as Practical and Secure Location Verification Tokens for Payments. NDSS 2014 - [c68]Nikolaos Karapanos, Srdjan Capkun:
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications. USENIX Security Symposium 2014: 671-686 - [c67]Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun, David A. Basin:
Short paper: detection of GPS spoofing attacks in power grids. WISEC 2014: 99-104 - [i13]Aanjhan Ranganathan, Boris Danev, Srdjan Capkun:
Low-power Distance Bounding. CoRR abs/1404.4435 (2014) - [i12]Ramya Jayaram Masti, Devendra Rai, Claudio Marforio, Srdjan Capkun:
Isolated Execution on Many-core Architectures. IACR Cryptol. ePrint Arch. 2014: 136 (2014) - [i11]Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun:
Securing Cloud Data in the New Attacker Model. IACR Cryptol. ePrint Arch. 2014: 556 (2014) - [i10]Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun:
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients. IACR Cryptol. ePrint Arch. 2014: 763 (2014) - 2013
- [j22]Ghassan Karame, Boris Danev, Cyrill Bannwart, Srdjan Capkun:
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions. IEEE Trans. Inf. Forensics Secur. 8(1): 149-162 (2013) - [c66]Ramya Jayaram Masti, Claudio Marforio, Srdjan Capkun:
An architecture for concurrent execution of secure environments in clouds. CCSW 2013: 11-22 - [c65]Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Secure enrollment and practical migration for mobile trusted execution environments. SPSM@CCS 2013: 93-98 - [c64]Joel Reardon, Hubert Ritzdorf, David A. Basin, Srdjan Capkun:
Secure data deletion from persistent media. CCS 2013: 271-284 - [c63]Filipe Beato, Iulia Ion, Srdjan Capkun, Bart Preneel, Marc Langheinrich:
For some eyes only: protecting online information sharing. CODASPY 2013: 1-12 - [c62]Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun:
Evaluating User Privacy in Bitcoin. Financial Cryptography 2013: 34-51 - [c61]Davide Zanetti, Srdjan Capkun, Ari Juels:
Tailing RFID Tags for Clone Detection. NDSS 2013 - [c60]Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun:
On Limitations of Friendly Jamming for Confidentiality. IEEE Symposium on Security and Privacy 2013: 160-173 - [c59]Joel Reardon, David A. Basin, Srdjan Capkun:
SoK: Secure Data Deletion. IEEE Symposium on Security and Privacy 2013: 301-315 - [e4]Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp:
Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7904, Springer 2013, ISBN 978-3-642-38907-8 [contents] - [i9]Claudio Soriente, Ghassan Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun:
Commune: Shared Ownership in an Agnostic Cloud. CoRR abs/1311.6236 (2013) - [i8]Arthur Gervais, Ghassan Karame, Srdjan Capkun, Vedran Capkun:
Is Bitcoin a Decentralized Currency? IACR Cryptol. ePrint Arch. 2013: 829 (2013) - 2012
- [j21]David A. Basin, Srdjan Capkun:
The research value of publishing attacks. Commun. ACM 55(11): 22-24 (2012) - [j20]Boris Danev, Davide Zanetti, Srdjan Capkun:
On physical-layer identification of wireless devices. ACM Comput. Surv. 45(1): 6:1-6:29 (2012) - [j19]Boris Danev, Srdjan Capkun, Ramya Jayaram Masti, Thomas S. Benjamin:
Towards Practical Identification of HF RFID Devices. ACM Trans. Inf. Syst. Secur. 15(2): 7:1-7:24 (2012) - [c58]Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, Srdjan Capkun:
Analysis of the communication between colluding applications on modern smartphones. ACSAC 2012: 51-60 - [c57]Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, Srdjan Capkun:
Enabling trusted scheduling in embedded systems. ACSAC 2012: 61-70 - [c56]Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin:
User-level secure deletion on log-structured file systems. AsiaCCS 2012: 63-64 - [c55]Ghassan Karame, Elli Androulaki, Srdjan Capkun:
Double-spending fast payments in bitcoin. CCS 2012: 906-917 - [c54]Srdjan Capkun, Seny Kamara:
4th cloud computing security workshop (CCSW 2012). CCS 2012: 1060-1061 - [c53]Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun:
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. ESORICS 2012: 415-432 - [c52]Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. NDSS 2012 - [c51]Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. IEEE Symposium on Security and Privacy 2012: 113-127 - [c50]Joel Reardon, Srdjan Capkun, David A. Basin:
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. USENIX Security Symposium 2012: 333-348 - [c49]Aanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun:
Physical-layer attacks on chirp-based ranging systems. WISEC 2012: 15-26 - [e3]Ting Yu, Srdjan Capkun, Seny Kamara:
Proceedings of the 2012 ACM Workshop on Cloud computing security, CCSW 2012, Raleigh, NC, USA, October 19, 2012. ACM 2012, ISBN 978-1-4503-1665-1 [contents] - [i7]Ghassan Karame, Elli Androulaki, Srdjan Capkun:
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin. IACR Cryptol. ePrint Arch. 2012: 248 (2012) - [i6]Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun:
Evaluating User Privacy in Bitcoin. IACR Cryptol. ePrint Arch. 2012: 596 (2012) - 2011
- [j18]David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt:
Formal Reasoning about Physical Properties of Security Protocols. ACM Trans. Inf. Syst. Secur. 14(2): 16:1-16:28 (2011) - [c48]Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun:
Enabling secure VM-vTPM migration in private clouds. ACSAC 2011: 187-196 - [c47]Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun:
On the requirements for successful GPS spoofing attacks. CCS 2011: 75-86 - [c46]Ghassan Karame, Srdjan Capkun, Ueli Maurer:
Privacy-preserving outsourcing of brute-force key searches. CCSW 2011: 101-112 - [c45]Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun:
Investigation of Signal and Message Manipulations on the Wireless Channel. ESORICS 2011: 40-59 - [c44]Aurélien Francillon, Boris Danev, Srdjan Capkun:
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. NDSS 2011 - [c43]Davide Zanetti, Pascal Sachs, Srdjan Capkun:
On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem? PETS 2011: 97-116 - [c42]Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, Srdjan Capkun:
Home is safer than the cloud!: privacy concerns for consumer cloud storage. SOUPS 2011: 13 - [c41]Srdjan Capkun, Karim M. El Defrawy, Gene Tsudik:
Group Distance Bounding Protocols - (Short Paper). TRUST 2011: 302-312 - [c40]Ghassan Karame, Aurélien Francillon, Srdjan Capkun:
Pay as you browse: microcomputations as micropayments in web-based services. WWW 2011: 307-316 - [r4]Srdjan Capkun:
Jamming Resistance. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 661-662 - [r3]Srdjan Capkun:
Security of Distance Bounding Protocols. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1158-1159 - [r2]Srdjan Capkun:
Uncoordinated Direct Sequence Spread Spectrum. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1345-1346 - [r1]Srdjan Capkun:
Uncoordinated Frequency Hopping Spread Spectrum. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1346 - [i5]Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin:
Secure Deletion on Log-structured File Systems. CoRR abs/1106.0917 (2011) - [i4]Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. IACR Cryptol. ePrint Arch. 2011: 129 (2011) - 2010
- [j17]Christina Pöpper, Mario Strasser, Srdjan Capkun:
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE J. Sel. Areas Commun. 28(5): 703-715 (2010) - [j16]Srdjan Capkun, Mario Cagalj, Ghassan Karame, Nils Ole Tippenhauer:
Integrity Regions: Authentication through Presence in Wireless Networks. IEEE Trans. Mob. Comput. 9(11): 1608-1621 (2010) - [j15]Mario Strasser, Boris Danev, Srdjan Capkun:
Detection of reactive jamming in sensor networks. ACM Trans. Sens. Networks 7(2): 16:1-16:29 (2010) - [c39]Christina Pöpper, David A. Basin, Srdjan Capkun, Cas Cremers:
Keeping data secret under full compromise using porter devices. ACSAC 2010: 241-250 - [c38]Ghassan Karame, Srdjan Capkun:
Low-Cost Client Puzzles Based on Modular Exponentiation. ESORICS 2010: 679-697 - [c37]Davide Zanetti, Boris Danev, Srdjan Capkun:
Physical-layer identification of UHF RFID tags. MobiCom 2010: 353-364 - [c36]Iulia Ion, Marc Langheinrich, Ponnurangam Kumaraguru, Srdjan Capkun:
Influence of user perception, security needs, and social factors on device pairing method choices. SOUPS 2010 - [c35]Kasper Bonne Rasmussen, Srdjan Capkun:
Realization of RF Distance Bounding. USENIX Security Symposium 2010: 389-402 - [c34]Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim M. El Defrawy:
Attacks on physical-layer identification. WISEC 2010: 89-98 - [i3]Karim M. El Defrawy, Srdjan Capkun, Gene Tsudik:
GDB: Group Distance Bounding Protocols. CoRR abs/1011.5295 (2010) - [i2]Aurélien Francillon, Boris Danev, Srdjan Capkun:
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. IACR Cryptol. ePrint Arch. 2010: 332 (2010)
2000 – 2009
- 2009
- [c33]Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun:
Proximity-based access control for implantable medical devices. CCS 2009: 410-419 - [c32]Patrick Schaller, Benedikt Schmidt, David A. Basin, Srdjan Capkun:
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks. CSF 2009: 109-123 - [c31]Nils Ole Tippenhauer, Srdjan Capkun:
ID-Based Secure Distance Bounding and Localization. ESORICS 2009: 621-636 - [c30]Ghassan Karame, Mario Strasser, Srdjan Capkun:
Secure Remote Execution of Sequential Computations. ICICS 2009: 181-197 - [c29]Boris Danev, Srdjan Capkun:
Transient-based identification of wireless sensor nodes. IPSN 2009: 25-36 - [c28]Mario Strasser, Christina Pöpper, Srdjan Capkun:
Efficient uncoordinated FHSS anti-jamming communication. MobiHoc 2009: 207-218 - [c27]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun:
Attacks on public WLAN-based positioning systems. MobiSys 2009: 29-40 - [c26]Ghassan Karame, Mario Cagalj, Srdjan Capkun:
Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. NCA 2009: 278-283 - [c25]Ghassan Karame, David Gubler, Srdjan Capkun:
On the Security of Bottleneck Bandwidth Estimation Techniques. SecureComm 2009: 121-141 - [c24]David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt:
Let's Get Physical: Models and Methods for Real-World Security Protocols. TPHOLs 2009: 1-22 - [c23]Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun:
Physical-layer Identification of RFID Devices. USENIX Security Symposium 2009: 199-214 - [c22]Christina Pöpper, Mario Strasser, Srdjan Capkun:
Jamming-resistant Broadcast Communication without Shared Keys. USENIX Security Symposium 2009: 231-248 - [e2]David A. Basin, Srdjan Capkun, Wenke Lee:
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. ACM 2009, ISBN 978-1-60558-460-7 [contents] - [i1]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun:
Secure Ranging With Message Temporal Integrity. IACR Cryptol. ePrint Arch. 2009: 602 (2009) - 2008
- [j14]Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David A. Basin, Srdjan Capkun, Jean-Pierre Hubaux:
Secure neighborhood discovery: a fundamental element for mobile ad hoc networking. IEEE Commun. Mag. 46(2): 132-139 (2008) - [j13]Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani B. Srivastava:
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels. IEEE Trans. Dependable Secur. Comput. 5(4): 208-223 (2008) - [j12]Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava:
Secure Time Synchronization in Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): 23:1-23:35 (2008) - [j11]Shouhuai Xu, Srdjan Capkun:
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions. ACM Trans. Inf. Syst. Secur. 12(1): 2:1-2:37 (2008) - [j10]Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani B. Srivastava:
Secure Location Verification with Hidden and Mobile Base Stations. IEEE Trans. Mob. Comput. 7(4): 470-483 (2008) - [c21]Kasper Bonne Rasmussen, Srdjan Capkun:
Location privacy of distance bounding protocols. CCS 2008: 149-160 - [c20]Davide Zanetti, Srdjan Capkun:
Protecting Sensitive Business Information While Sharing Serial-Level Data. EDOCW 2008: 183-191 - [c19]Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj:
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. SP 2008: 64-78 - 2007
- [j9]Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux:
Wormhole-Based Antijamming Techniques in Sensor Networks. IEEE Trans. Mob. Comput. 6(1): 100-114 (2007) - [c18]Patrick Schaller, Srdjan Capkun, David A. Basin:
BAP: Broadcast Authentication Using Cryptographic Puzzles. ACNS 2007: 401-419 - [c17]Kasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj:
SecNav: secure broadcast localization and time synchronization in wireless networks. MobiCom 2007: 310-313 - [c16]Kasper Bonne Rasmussen, Srdjan Capkun:
Implications of radio fingerprinting on the security of sensor networks. SecureComm 2007: 331-340 - [p2]Srdjan Capkun:
Securing Localization in Wireless Networks (using Verifiable Multilateration and Covert Base Stations). Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 249-278 - [p1]Srdjan Capkun, Saurabh Ganeriwal, Simon Han, Mani B. Srivastava:
Securing Timing Synchronization in Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 369-389 - [e1]Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore:
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings. Lecture Notes in Computer Science 4572, Springer 2007, ISBN 978-3-540-73274-7 [contents] - 2006
- [j8]Srdjan Capkun, Jean-Pierre Hubaux:
Secure positioning in wireless networks. IEEE J. Sel. Areas Commun. 24(2): 221-232 (2006) - [j7]Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux:
Key Agreement in Peer-to-Peer Wireless Networks. Proc. IEEE 94(2): 467-478 (2006) - [j6]Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán:
Mobility Helps Peer-to-Peer Security. IEEE Trans. Mob. Comput. 5(1): 43-51 (2006) - [c15]Srdjan Capkun, Mario Cagalj, Mani B. Srivastava:
Secure Localization with Hidden and Mobile Base Stations. INFOCOM 2006 - [c14]Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava:
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. S&P 2006: 280-294 - [c13]Srdjan Capkun, Mario Cagalj:
Integrity regions: authentication through presence in wireless networks. Workshop on Wireless Security 2006: 1-10 - 2005
- [c12]Srdjan Capkun, Jean-Pierre Hubaux:
Secure positioning of wireless devices with application to sensor networks. INFOCOM 2005: 1917-1928 - [c11]Loukas Lazos, Radha Poovendran, Srdjan Capkun:
Rope: robust position estimation in wireless sensor networks. IPSN 2005: 324-331 - [c10]Sahar Sedighpour, Srdjan Capkun, Saurabh Ganeriwal, Mani B. Srivastava:
Distance enlargement and reduction attacks on ultrasound ranging. SenSys 2005: 312 - [c9]Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava:
Secure time synchronization service for sensor networks. Workshop on Wireless Security 2005: 97-106 - 2004
- [j5]Jean-Pierre Hubaux, Srdjan Capkun, Jun Luo:
The Security and Privacy of Smart Vehicles. IEEE Secur. Priv. 2(3): 49-55 (2004) - [j4]Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun:
A formal model of rational exchange and its application to the analysis of Syverson's protocol. J. Comput. Secur. 12(3-4): 551-587 (2004) - [c8]Márk Félegyházi, Srdjan Capkun, Jean-Pierre Hubaux:
SOWER: self-organizing wireless network for messaging. WMASH 2004: 1-10 - 2003
- [j3]Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux:
Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 2(1): 52-64 (2003) - [c7]Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán:
Mobility helps security in ad hoc networks. MobiHoc 2003: 46-56 - [c6]Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux:
SECTOR: secure tracking of node encounters in multi-hop wireless networks. SASN 2003: 21-32 - [c5]Srdjan Capkun, Jean-Pierre Hubaux:
BISS: building secure routing out of an incomplete set of security associations. Workshop on Wireless Security 2003: 21-29 - 2002
- [j2]Srdjan Capkun, Maher Hamdi, Jean-Pierre Hubaux:
GPS-free Positioning in Mobile Ad Hoc Networks. Clust. Comput. 5(2): 157-167 (2002) - [c4]Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun:
A Formal Analysis of Syverson?s Rational Exchange Protocol. CSFW 2002: 193-205 - [c3]Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux:
Small worlds in security systems: an analysis of the PGP certificate graph. NSPW 2002: 28-35 - 2001
- [j1]Ljubica Blazevic, Levente Buttyán, Srdjan Capkun, Silvia Giordano, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Self-organization in mobile ad hoc networks: the approach of Terminodes. IEEE Commun. Mag. 39(6): 166-174 (2001) - [c2]Srdjan Capkun, Maher Hamdi, Jean-Pierre Hubaux:
GPS-Free Positioning in Mobile ad-hoc Networks. HICSS 2001 - [c1]Jean-Pierre Hubaux, Levente Buttyán, Srdjan Capkun:
The quest for security in mobile ad hoc networks. MobiHoc 2001: 146-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint