default search action
Ravishankar Borgaonkar
Person information
- affiliation: TU Berlin, Department of Software Engineering and Theoretical Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c29]Lars Andreassen Jaatun, Silje Marie Sørlien, Ravishankar Borgaonkar, Steve Taylor, Martin Gilje Jaatun:
Software Bill of Materials in Critical Infrastructure. CloudCom 2023: 319-324 - 2022
- [c28]Guillaume Bour, Marie Elisabeth Gaup Moe, Ravishankar Borgaonkar:
Experimental Security Analysis of Connected Pacemakers. BIODEVICES 2022: 35-45 - [c27]Guillaume Bour, Anniken Wium Lie, Jakob Stenersen Kok, Bendik Markussen, Marie Elisabeth Gaup Moe, Ravishankar Borgaonkar:
Security Analysis of the Internet of Medical Things (IoMT): Case Study of the Pacemaker Ecosystem. BIOSTEC (Selected Papers) 2022: 73-96 - 2021
- [j3]Ravishankar Borgaonkar, Inger Anne Tøndel, Merkebu Zenebe Degefa, Martin Gilje Jaatun:
Improving smart grid security through 5G enabled IoT and edge computing. Concurr. Comput. Pract. Exp. 33(18) (2021) - [c26]Lars Halvdan Flå, Ravishankar Borgaonkar, Inger Anne Tøndel, Martin Gilje Jaatun:
Tool-assisted Threat Modeling for Smart Grid Cyber Security. CyberSA 2021: 1-8 - [c25]Merkebu Z. Degefa, Santiago Sanchez, Ravishankar Borgaonkar:
A Testbed for Advanced Distribution Management Systems: Assessment of Cybersecurity. ISGT-Europe 2021: 1-5 - 2020
- [c24]Inger Anne Tøndel, Ravishankar Borgaonkar, Martin Gilje Jaatun, Christian Frøystad:
What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios. Cyber Security 2020: 1-8 - [c23]Guillaume Bour, Karin Bernsmed, Ravishankar Borgaonkar, Per Håkon Meland:
On the Certificate Revocation Problem in the Maritime Sector. NordSec 2020: 142-157
2010 – 2019
- 2019
- [j2]Ravishankar Borgaonkar, Lucca Hirschi, Shinjo Park, Altaf Shaik:
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols. Proc. Priv. Enhancing Technol. 2019(3): 108-127 (2019) - [c22]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:
Anatomy of Commercial IMSI Catchers and Detectors. Krypto-Tag 2019 - [c21]Ravishankar Borgaonkar, Martin Gilje Jaatun:
5G as an Enabler for Secure IoT in the Smart Grid : Invited Paper. SA 2019: 1-7 - [c20]Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert:
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. WiSec 2019: 221-231 - [c19]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:
Anatomy of Commercial IMSI Catchers and Detectors. WPES@CCS 2019: 74-86 - 2018
- [j1]Ghada Arfaoui, Pascal Bisson, Rolf Blom, Ravishankar Borgaonkar, Håkan Englund, Edith Felix, Felix Klaedtke, Prajwol Kumar Nakarmi, Mats Näslund, Piers O'Hanlon, Juri Papay, Jani Suomalainen, Mike Surridge, Jean-Philippe Wary, Alexander Zahariev:
A Security Architecture for 5G Networks. IEEE Access 6: 22466-22479 (2018) - [c18]Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert:
On the Impact of Rogue Base Stations in 4G/LTE Self Organizing Networks. WISEC 2018: 75-86 - [i3]Ravishankar Borgaonkar, Lucca Hirschi, Shinjo Park, Altaf Shaik:
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols. IACR Cryptol. ePrint Arch. 2018: 1175 (2018) - 2017
- [c17]Ranjbar A. Balisane, Ravishankar Borgaonkar, Ahmad Atamli-Reineh, Andrew Martin:
Architectures for Enhancing Authentication Privacy and Security using Trusted Computing. SysTEX@SOSP 2017: 10:1-10:7 - [c16]Piers O'Hanlon, Ravishankar Borgaonkar, Lucca Hirschi:
Mobile Subscriber WiFi Privacy. IEEE Symposium on Security and Privacy Workshops 2017: 169-178 - [c15]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, Jean-Pierre Seifert:
White-Stingray: Evaluating IMSI Catchers Detection Applications. WOOT 2017 - 2016
- [c14]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Jean-Pierre Seifert:
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones. SPSM@CCS 2016: 13-21 - [c13]Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan:
Characterizing SEAndroid Policies in the Wild. ICISSP 2016: 482-489 - [c12]Ahmad Atamli-Reineh, Ravishankar Borgaonkar, Ranjbar A. Balisane, Giuseppe Petracca, Andrew P. Martin:
Analysis of Trusted Execution Environment usage in Samsung KNOX. SysTEX@Middleware 2016: 7:1-7:6 - [c11]Altaf Shaik, Jean-Pierre Seifert, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi:
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. NDSS 2016 - 2015
- [i2]Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan:
Characterizing SEAndroid Policies in the Wild. CoRR abs/1510.05497 (2015) - [i1]Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert:
Practical attacks against privacy and availability in 4G/LTE mobile communication systems. CoRR abs/1510.07563 (2015) - 2014
- [c10]Marta Piekarska, Bhargava Shastry, Ravishankar Borgaonkar:
What Does the Fox Say? On the Security Architecture of Firefox OS. ARES 2014: 172-177 - [c9]Abdelkarim Cherkaoui, Lilian Bossuet, Ludwig Seitz, Göran Selander, Ravishankar Borgaonkar:
New paradigms for access control in constrained environments. ReCoSoC 2014: 1-4 - 2013
- [b1]Ravishankar Bhaskarrao Borgaonkar:
Security Analysis of Femtocell-Enabled Cellular Network Architecture. Berlin Institute of Technology, 2013 - [c8]Collin Mulliner, Ravishankar Borgaonkar, Patrick Stewin, Jean-Pierre Seifert:
SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper). DIMVA 2013: 150-159 - 2012
- [c7]Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan, Nico Golde, Kevin Redon, Ravishankar Borgaonkar:
New privacy issues in mobile telephony: fix and verification. CCS 2012: 205-216 - [c6]Nico Golde, Kevin Redon, Ravishankar Borgaonkar:
Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications. NDSS 2012 - 2011
- [c5]Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert:
Security analysis of a femtocell device. SIN 2011: 95-102 - 2010
- [c4]Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert:
Experimental Analysis of the Femtocell Location Verification Techniques. NordSec 2010: 49-54 - [c3]Ravishankar Borgaonkar:
An Analysis of the Asprox Botnet. SECURWARE 2010: 148-153
2000 – 2009
- 2009
- [c2]Md. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar:
Security Usability of Petname Systems. NordSec 2009: 44-59 - [c1]Kuldeep Singh, Audun Jøsang, Md. Sadek Ferdous, Ravishankar Borgaonkar:
Spam filter optimality based on signal detection theory. SIN 2009: 219-224
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint