Publications

The provided PDFs are typically preprint versions. The final publications are available through the publisher online archives.

2025



2024

-Aritra Dhar, Supraja Sridhara Shweta Shinde Srdjan Capkun, Renzo Andri
Confidential Computing with Heterogeneous Devices at Cloud-Scale, Annual Computer Security Applications Conference (ACSAC 2024) (to appear)

-Daniele Lain, Tarek Jost, Sinisa Matetic, Kari Kostiainen, Srdjan Čapkun
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training, ACM CCS 2024 (to appear)

2023

  • Claudio Anliker, Giovanni Camurati, Srdjan Čapkun
    Time for Change: How Clocks Break UWB Secure Ranging,
    in Usenix Security, 2023 [external page PDF] (to appear)
  • Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, Srdjan Capkun
    EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems
    in Network and Distributed System Security Symposium (NDSS) 2023 (to appear)
  • Giovanni Camurati, Matteo Dell'Amico, François-Xavier Standaert
    MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
    in IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES) 2023
    [external page PDF | external page DOI | external page CODE]
  • Giovanni Camurati, Aurélien Francillon
    Screaming Channels
    in Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
    [external page DOI]

2022

  • Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Čapkun
    On (the Lack of) Code Confidentiality in Trusted Execution Environments
    in arXiv preprint (arXiv:2212.07899)
    [Download BIB (BIB, 465 Bytes) | external page PDF | external page DOI]
  • Friederike Groschupp, Mark Kuhne, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun
    It's TEEtime: Bringing User Sovereignty to Smartphones
    in arXiv preprint (arXiv:2211.05206)
    [external page BIB | external page PDF | external page DOI]
  • Simon Erni, Martin Kotuliak, Patrick Leu, Marc Roeschlin, Srdjan Capkun
    AdaptOver: Adaptive Overshadowing Attacks in Cellular Networks
    In The 28th Annual International Conference On Mobile Computing And Networking (ACM MobiCom ’22) (to appear)
    [external page PDF | external page BIB | external page DOI]
  • Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun
    Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulationcall_made
    In ACM Conference on Computer and Communications Security (CCS), 2022
    [external page PDF | external page BIB | external page DOI]
  • Giulia Fanti, Kari Kostiainen, William Howlett, Josh Lipsky, Ole Moehr, John Paul Schnapper-Casteras, and Josephine Wolff
    Missing Key: The challenge of cybersecurity and central bank digital currency
    Atlantic Council Report, June 2022
    [external page PDF, external page web]
  • Patrick Leu*, Giovanni Camurati*, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, and Jiska Classen
    Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
    in USENIX Security 2022 *equal contributions
    https://securepositioning.com/ghost-peak/
    [external page BIB | PDF | external page DOI]
  • Daniele Lain, Kari Kostiainen, Srdjan Čapkun
    Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
    in IEEE Symposium on Security and Privacy (S&P), 2022
    [external page BIB | external page PDF | external page DOI]
  • Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun
    LTrack: Stealthy Tracking of Mobile Phones in LTE
    in USENIX Security 2022
    [external page BIB | external page PDF | external page DOI]
  • Mridula Singh, Marc Roeschlin, Aanjhan Ranganathan, Srdjan Čapkun
    V-Range: Enabling Secure Ranging in 5G Wireless Networks
    In Proceedings of Network and Distributed System Security Symposium (NDSS) 2022 (to appear)
    [external page BIB | PDF | external page DOI]

2021

  • Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Čapkun
    Composite Enclaves: Towards Disaggregated Trusted Execution

    in Transactions on Cryptographic Hardware and Embedded Systems (CHES) 2021
    [external page BIB | external page PDF | external page DOI]
  • Patrick Leu, Martin Kotuliak, Marc Röschlin, Srdjan Čapkun
    Security of Multicarrier Time-of-Flight Ranging
    in ACSAC 2021
    [Download BIB (BIB, 2 KB) | Download PDF (PDF, 908 KB) | external page DOI]
  • Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Čapkun
    Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
    in USENIX Security 2021
    [Download BIB (BIB, 343 Bytes) | external page PDF | external page DOI]
  • Enis Ulqinaku and Hala Assal and AbdelRahman Abdou and Sonia Chiasson and Srdjan Čapkun
    Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols
    in Usenix Security 2021
    [external page BIB | external page PDF | external page DOI]
  • Mridula Singh*, Marc Röschlin*, Ezzat Zalzala*, Patrick Leu, Srdjan Čapkun
    Security Analysis of IEEE 802.15.4z/HRP UWB Time-of-Flight
    in ACM WiSec 2021 *equal contribution
    [BIB | Download PDF (PDF, 503 KB) | external page DOI]
  • Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Čapkun
    Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones
    in Arxiv e-​print (arXiv:2102.02743)
    [external page BIB | external page PDF]
  • Lois Orosa, Yaohua Wang, Mohammad Sadrosadati, Jeremie S. Kim, Minesh Patel, Ivan Puddu, Haocong Luo, Kaveh Razavi, Juan Gómez-Luna, Hasan Hassan, Nika Mansouri-Ghiasi, Saugata Ghose, Onur Mutlu
    CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations
    in ACM/IEEE International Symposium on Computer Architecture (ISCA), 2021
    [external page BIB | external page PDF | external page DOI]
  • Jawad Haj-Yahya, Jeremie Kim, A. Giray Yaglikci, Ivan Puddu, Mohammed Alser, Lois Orosa, Juan-Gomez Luna, Onur Mutlu
    IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern Processors
    in ACM/IEEE International Symposium on Computer Architecture (ISCA), 2021
    [external page BIB | external page PDF | external page DOI]
  • Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun
    Bitcontracts: Supporting Smart Contracts in Legacy Blockchains
    in Network and Distributed Systems Security (NDSS) Symposium 2021
    [external page BIBexternal page PDF | external page DOI]
  • Irina Calciu, M. Talha Imran, Ivan Puddu, Sanidhya Kashyap, Hasan Al Maruf, Onur Mutlu, Aasheesh Kolli
    Rethinking Software Runtimes for Disaggregated Memory
    in ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2021
    [external page BIB | Download PDF (PDF, 1 MB) | external page DOI]

2020

  • Decentralized Privacy-Preserving Proximity Tracing. 
    Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Capkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira.
    in arXiv, 2020
    [Download BIB (BIB, 847 Bytes) | external page PDF| external page DOI]
  • Design choices for central bank digital currency: Policy and technical considerations
    Sarah Allen, Srdjan Capkun, Ittay Eyal, Giulia Fanti, Bryan Ford, James Grimmelmann, Ari Juels, Kari Kostiainen, Sarah Meiklejohn, Andrew Miller, Eswar Prasad, Karl Wüst, and Fan Zhang
    in Brookings, Working Paper, July, 2020
    [Download BIB (BIB, 609 Bytes)external page PDF | external page DOI]
  • Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun
    ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
    in ACM Conference on Computer and Communication Security (CCS), 2020
    [Download BIB (BIB, 2 KB) | external page PDF | external page DOI]
  • Kari Kostiainen, Aritra Dhar, Srdjan Capkun
    Dedicated Security Chips in the Age of Secure Enclaves
    in IEEE Security & Privacy magazine, 2020
    [Download BIB (BIB, 316 Bytes) | external page PDF | external page DOI]
  • Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun
    Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement

    in IEEE Symposium on Security and Privacy (S&P), 2020
    [Download BIB (BIB, 2 KB)PDF | external page DOI]
  • Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun
    Snappy: Fast On-chain Payments with Practical Collaterals
    in Network and Distributed Systems Security (NDSS) Symposium 2020
    [Download BIB (PDF, 1.4 MB) | Download PDF (PDF, 707 KB) | external page DOI]
  • Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
    ProtectIOn: Root-of-Trust for IO in Compromised Platforms
    in Network and Distributed Systems Security (NDSS) Symposium 2020
    [Download BIB (BIB, 765 Bytes) | Download PDF (PDF, 4.4 MB) | external page DOI]
  • Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun
    ProximiTEE: Hardened SGX Attestation byProximity Verification
    in ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2020 
    [Download BIB (BIB, 350 Bytes) | Download PDF (PDF, 2.6 MB) | external page DOI]

2019

2018

2017

  • Aritra Dhar, Der-Yeuan Yu, Srdjan Capkun
    IntegriKey: End-to-End Integrity Protection of User Input
    in ePrint Archive: Report 2017/1245
    [external page BIB | external page PDF | external page DOI]
  • Mridula Singh, Patrick Leu, Srdjan Capkun
    UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
    EPrint Archive 2017/1240 [external page PDF]
  • Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
    On the Security of Carrier Phase-based Ranging
    in Proceedings of Cryptographic Hardware and Embedded Systems (CHES), 2017 (to appear)
    Arxiv e-print (arXiv:1610.06077) [external page PDF]
  • Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
    μchain: How to Forget without Hard Forks
    in ePrint Archive: Report 2017/106
    [Download BIB (BIB, 340 Bytes) | external page PDF | external page DOI]
  • Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
    Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
    Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017 [Download PDF (PDF, 910 KB)]
  • Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
    ROTE: Rollback Protection for Trusted Execution
    26th USENIX Security Symposium, August 2017 (To appear)
  • Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi
    Software Grand Exposure: SGX Cache Attacks Are Practical
    USENIX Workshop on Offensive Technologies (WOOT'17), August 2017 [external page PDF]
  • Aanjhan Ranganathan, Srdjan Capkun
    Are We Really Close? Verifying Proximity in Wireless Systems  
    in IEEE Security & Privacy Magazine, May-June 2017 edition [Download PDF (PDF, 523 KB)]
  • Ghassan Karame, Matthias Neugschwandtner, Melek Önen, Hubert Ritzdorf
    Reconciling Security and Functional Requirements in Multi-tenant Clouds     
    in Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing (SCC), 2017 [Download PDF (PDF, 239 KB) |external page Bibtex]
  • Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders and Ivan Martinovic
    Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
    in Financial Cryptography and Data Security (FC'17), 2017 [Download PDF (PDF, 2.1 MB)]
  • Luka Malisa, Kari Kostiainen, and Srdjan Capkun
    Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
    6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2017 [Download PDF (PDF, 3.2 MB) | Download tech. report (PDF, 3.6 MB)]
  • Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, and Srdjan Capkun
    Using Hover to Compromise the Confidentiality of User Input on Android
    Proc. ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017 [Download PDF (PDF, 1.5 MB)]

 

2016

  • Hubert Ritzdorf, Ghassan O. Karame, Claudio Soriente, Srdjan Čapkun
    On Information Leakage in Deduplicated Storage Systems
    in 8th ACM Cloud Computing Secruity Workshop (CCSW), 2016 [Download PDF (PDF, 550 KB) | external page DOI | Download Bibtex (BIB, 437 Bytes)]
  • Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
    Quantifying Web Adblocker Privacy
    EPrint Archive 2016/900 [external page PDF]
  • Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun
    On the Security and Performance of Proof of Work Blockchains
    in ACM Conference on Computer and Communication Security (CCS), 2016 [Download PDF (PDF, 393 KB) | external page DOI]
  • Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
    Quantifying Location Privacy Leakage from Transaction Prices
    In Proceedings of the 21th European Symposium on Research in Computer Security (ESORICS), 2016 [Download PDF (PDF, 353 KB) | external page DOI]
  • Luka Malisa, Kari Kostiainen, Michael Och, and Srdjan Capkun
    Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
    21st European Symposium on Research in Computer Security (ESORICS), 2016 [Download PDF (PDF, 569 KB) | external page DOI | Download bibtex (BIB, 889 Bytes)]
  • Aanjhan Ranganathan, Hildur Olafsdottir and Srdjan Capkun
    SPREE: Spoofing Resistant GPS Receiver
    22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [Download PDF (PDF, 1.1 MB) | external page DOI]
  • Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente and Srdjan Capkun
    SALVE: Server Authentication with Location VErification
    22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [external page PDF | external page DOI]
  • Daniel Moser, Patrick Leu, Vincent Lenders, Aanjhan Ranganathan, Fabio Ricciato and Srdjan Capkun
    Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures
    22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [Download PDF (PDF, 756 KB) | external page DOI]
  • Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa and Srdjan Capkun
    Verena: End-to-End Integrity Protection for Web Applications
    37th IEEE Symposium on Security and Privacy (S&P)2016 [Download PDF (PDF, 526 KB) | external page DOI | Download bibtex (BIB, 330 Bytes) | external page video]
  • Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun
    Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications
    SIGCHI Conference on Human Factors in Computing Systems (CHI), 2016 [Download PDF (PDF, 2.2 MB) | external page DOI | Download bibtex (BIB, 409 Bytes)]
  • Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun
    Physical-Layer Integrity for Wireless Messages
    Computer Networks (COMNET), 2016 [Download PDF (PDF, 464 KB) | external page DOI

2015

  • Julien Bringer, Beatriz Gallego, Ghassan Karame, Mathias Kohler, Panos Louridas, Melek Önen, Hubert Ritzdorf, Alessandro Sorniotti, David Vallejo
    TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud
    E-Democracy – Citizen Rights in the World of the New Computing Paradigms, 2015 [external page DOI | Download bibtex (BIB, 764 Bytes)]
  • Luka Malisa, Kari Kostiainen, Srdjan Capkun
    Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
    IACR Cryptology ePrint Archive, 2015 [external page URL]
  • Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
    W-SPS: Designing a Wide-Area Secure Positioning System
    IACR Cryptology ePrint Archive, 2015 [external page URL]
  • Claudio Marforio; Ramya Jayaram Masti; Claudio Soriente; Kari Kostiainen; Srdjan Capkun
    Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms
    CoRR 2015 [external page URL]
  • Wade Trappe,Lalitha Sankar Sankar, Radha Poovendran, Heejo Lee, Srdjan Capkun
    Introduction to the Issue on Signal and Information Processing for Privacy
    IEEE Journal of Selected Topics in Signal Processing, 2015 [external page DOI]
  • Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun
    Logical Partitions on Many-core Platforms
    31st Annual Computer Security Applications Conference (ACSAC), 2015 (to appear) [Download PDF (PDF, 272 KB)]
  • Aanjhan Ranganathan, Boris Danev and Srdjan Capkun
    Proximity Verification for Contactless Access Control and Authentication Systems
    31st Annual Computer Security Applications Conference (ACSAC), 2015 [Download PDF (PDF, 5.1 MB)]
  • Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
    Tampering with the Delivery of Blocks and Transactions in Bitcoin
    ACM Conference on Computer and Communication Security (CCS), 2015 [external page Preprint]
  • Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
    Quantifying Location Privacy Leakage from Transaction Prices
    Cryptology ePrint Archive: Report 2015/496 [external page Paper]
  • Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele and Srdjan Capkun
    Thermal Covert Channels on Multi-core Platforms
    24rd USENIX Security Symposium2015 
    arXiv:1503.07000, 2015 [Download PDF (PDF, 2.1 MB)]
  • Nikolaos Karapanos, Claudio Marforio, Claudio Soriente and Srdjan Capkun
    Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
    24th USENIX Security Symposium2015 [Download PDF (PDF, 1.7 MB) | Download bibtex (BIB, 517 Bytes) | external page video | external page demo video | external page project website]
    arXiv:1503.03790, 2015 [external page PDF]
  • Claudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun
    Commune: Shared Ownership in an Agnostic Cloud
    20th ACM Symposium on Access Control Models and Technologies, SACMAT 2015 [Download PDF (PDF, 458 KB) | Download bibtex (BIB, 691 Bytes)]
  • Justine Sherry, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy
    BlindBox: Deep Packet Inspection for Encrypted Traffic
    SIGCOMM 2015 [PDF | bibtex | external page DOI]
  • Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser
    Machine Learning Classification Over Encrypted Data
    NDSS 2015 [external page PDF | external page URL]
  • Nils Ole Tippenhauer, Heinrich Luecken, Marc Kuhn and Srdjan Capkun 
    UWB Rapid-Bit-Exchange System for Distance Bounding
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015 [Download PDF]
  • Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais,
    Srdjan Capkun
    Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
    in ACM Transactions on Information and System Security (TISSEC), 2015 [Download PDF (PDF, 703 KB)]

2014

  • N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, and Christian Wachsmann.
    Mobile Trusted Computing.
    Proceedings of the IEEE, 2014.
  • Arthur Gervais, Ghassan Karame, Damian Gruber, Srdjan Capkun
    On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
    In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), 2014 [Download Paper (PDF, 379 KB) | Download BibTeX (BIB, 330 Bytes) | Download Slides (PDF, 3.9 MB)]
  • Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Čapkun
    Assisted Deletion of Related Content
    In Proceedings of 30th Annual Computer Security Applications Conference (ACSAC), 2014 [Download Paper (PDF, 375 KB) | Download BibTeX (BIB, 507 Bytes) | Download Slides (PDF, 2.8 MB) | external page DOI]
  • Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun and Vincent Lenders
    Quantifying Web-Search Privacy
    in Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2014 [Download Paper (PDF, 466 KB) | Download BibTeX (BIB, 342 Bytes) | Download Slides (PDF, 8.6 MB)]
  • Naveed Ahmed, Christina Poepper and Srdjan Capkun
    Enabling Short Fragments for Uncoordinated Spread Spectrum Communication
    In Proceedings of 19th European Symposium on Research in Computer Security (ESORICS), 2014 [Download PDF (PDF, 637 KB)]
  • Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun and David Basin.
    Detection of GPS Spoofing Attacks in Power Grids (short paper)
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014 [Download PDF (PDF, 256 KB) | Download bibtex (BIB, 374 Bytes)]
  • Nikolaos Karapanos and Srdjan Capkun
    On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
    In Proceedings of the 23rd USENIX Security Symposium, 2014 [Download PDF (PDF, 849 KB) | Download bibtex (BIB, 485 Bytes) | external page video]
  • Elli Androulaki, Claudio Soriente, Luka Malisa and Srdjan Capkun
    Enforcing Location and Time-based Access Control on Cloud-stored Data
    34th IEEE International Conference on Distributed Computing Systems (ICDCS), 2014 [Download PDF | Download bibtex]
  • Arthur Gervais, Ghassan O. Karame, Srdjan Capkun, Vedran Capkun
    Is Bitcoin a Decentralized Currency?
    IEEE Security and Privacy Magazine, 2014
    [Preliminary version Download PDF (PDF, 154 KB) | Download BibTeX (BIB, 232 Bytes)]
  • Joel Reardon, David Basin, Srdjan Capkun
    On Secure Data Deletion
    IEEE Security and Privacy Magazine, 2014
  • Ghassan O. Karame, Aurélien Francillon, Victor Budilivschi, Srdjan Capkun, Vedran Capkun
    Microcomputations as Micropayments in Web-based Services
    In ACM Transactions on Internet Technology (TOIT), 2014 (to appear)
  • Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun
    Smartphones as Practical and Secure Location Verification Tokens for Payments
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014 [Download PDF (PDF, 865 KB) | Download bibtex (BIB, 455 Bytes)]
  • Jan-Erik Ekberg, Kari Kostiainen and N. Asokan.
    The Untapped Potential of Trusted Execution Environments on Mobile Devices
    IEEE Security & Privacy Magazine , 2014.
    [Preliminary version Download PDF (PDF, 628 KB)]

2013

  • N. Asokan, Lucas Davi, Alexandra Dmitrienko, Kari Kostiainen, Elena Reshetova and Ahmad-Reza Sadeghi.
    Mobile Platform Security
    Synthesis Lectures on Information Security, Privacy and Trust (Morgan & Claypool), 2013. [external page Link]
  • Ramya Jayaram Masti, Claudio Marforio and Srdjan Capkun
    An Architecture for Concurrent Execution of Secure Environments in Clouds
    In Proceedings of the 2013 ACM Cloud Computing Security Workshop (CCSW), 2013, [Download PDF (PDF, 325 KB) | Download bibtex (BIB, 2 KB)]
  • Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun
    Secure Enrollment and Practical Migration for Mobile Trusted Execution Environments
    In Proceedings of the third ACM workshop on Security and privacy in smartphones and mobile devices (SPSM), 2013 [Download PDF (PDF, 230 KB) | Download bibtex (BIB, 464 Bytes)]
  • Joel Reardon, Hubert Ritzdorf, David Basin and Srdjan Capkun
    Secure Data Deletion from Persistent Media
    in Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2013 [Download PDF (PDF, 246 KB) | Download bibtex (BIB, 485 Bytes) | Download slides (PDF, 276 KB)]
  • Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun
    On Limitations of Friendly Jamming for Confidentiality
    in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2013 [Download PDF (PDF, 1.4 MB)]
  • Joel Reardon, Srdjan Capkun, David Basin
    SoK: Secure Data Deletion
    in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2013 [Download PDF (PDF, 163 KB) | Download slides (PDF, 222 KB)]
  • Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer and Srdjan Capkun
    Evaluating User Privacy in Bitcoin
    In Proceedings of the International Conference on Financial Cryptography and Data Security (FC), 2013 [Download bibtex (RTF, 767 Bytes)]
  • Davide Zanetti, Ari Juels, Srdjan Capkun
    Tailing RFID Tags for Clone Detection
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013 [Download PDF (PDF, 504 KB) | Download bibtex (BIB, 246 Bytes)]
  • Iulia Ion, Filipe Beato, Srdjan Capkun, Bart Preneel, and Marc Langheinrich
    For Some Eyes Only: Protecting Online Information Sharing
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2013 [Download bibtex (RTF, 1019 Bytes)]
  • Ghassan Karame, Boris Danev, Cyrill Bannwart, Srdjan Capkun
    On the Security of End-to-End Measurements based on Packet-Pair Dispersions
    In IEEE Transactions on Information Forensics & Security (TIFS), 2013 [Download bibtex (RTF, 734 Bytes)]

2012

  • Boris Danev, Davide Zanetti, Srdjan Capkun
    On Physical-layer Identification of Wireless Devices
    In ACM Computing Surveys, 2012 [Download PDF (PDF, 378 KB) | Download bibtex (BIB, 281 Bytes)]
  • David Basin, Srdjan Capkun
    Column: The Research Value of Publishing Attacks
    Communications of the ACM, November 2012, Vol. 55 No. 11, Pages 22-24
  • Elli Androulaki, Ghassan O. Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun
    Evaluating User Privacy in Bitcoin
    Technical report: Cryptology ePrint Archive Report 2012/596, 2012 [Download PDF (PDF, 940 KB)]
  • Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, and Srdjan Capkun
    Analysis of the Communication between Colluding Applications on Modern Smartphones
    In Proceedings of 28th Annual Computer Security Applications Conference (ACSAC), 2012 [Download PDF (PDF, 286 KB) | Download bibtex (BIB, 451 Bytes)]
  • Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, and Srdjan Capkun
    Enabling Trusted Scheduling in Embedded Systems
    In Proceedings of 28th Annual Computer Security Applications Conference (ACSAC), 2012 [Download PDF (PDF, 404 KB)]
  • Ghassan O. Karame, Elli Androulaki, Srdjan Capkun
    Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2012
    Related technical report: Cryptology ePrint Archive Report 2012/248, 2012 [Download PDF (PDF, 529 KB)]
  • Davide Zanetti, Vincent Lenders and Srdjan Capkun
    Exploring the Physical-layer Identification of GSM Devices
    Technical Report 763, ETH Zurich, Institute of Information Security, June 2012 [Download PDF (PDF, 837 KB) | Download bibtex (BIB, 339 Bytes)]
  • Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelee and Srdjan Capkun
    Design and Implementation of a Terrorist-Fraud Resilient Distance Bounding System
    In Proceedings of 17th European Symposium on Research in Computer Security (ESORICS), 2012 [Download PDF (PDF, 2.4 MB)]
  • Joel Reardon, Srdjan Capkun, David Basin
    Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
    In Proceedings of the 21st USENIX Security Symposium, 2012 [Download PDF (PDF, 404 KB) | Download slides (PDF, 7.5 MB) | external page video]
  • Joel Reardon, Claudio Marforio, Srdjan Capkun, David Basin
    Secure Deletion on Log-structured File Systems
    In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012 [Download PDF (PDF, 629 KB) | Download slides (PDF, 1.2 MB)]
  • Related Schweizer Fernsehen: external page Einstein show 9.6.2011
    On-line Report and Secure Deletion Application Download: SHREDroid: Secure Deletion for Android
  • Aanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun
    Physical-Layer Attacks on Chirp-based Ranging Systems
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2012 [Download PDF (PDF, 1.3 MB)]
  • Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun
    Distance Hijacking Attacks on Distance Bounding Protocols
    in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2012
  • Boris Danev, Srdjan Capkun, Ramya Jayaram Masti, Thomas S. Benjamin
    Towards Practical Identification of HF RFID Devices
    in ACM Transactions on Information and System Security (TISSEC)
  • Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun
    Distance Hijacking Attacks on Distance Bounding Protocols (invited paper)
    Abstract to appear In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012
    Related technical report: Cryptology ePrint Archive: Report 2011/129, 2011 [Download PDF (PDF, 638 KB)]

2011

  • Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun
    Enabling Secure VM-vTPM Migration in Private Clouds
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2011 [Download PDF (PDF, 430 KB) | Download bibtex (BIB, 298 Bytes)]
  • Ghassan Karame, Srdjan Capkun, Ueli Maurer
    Privacy-Preserving Outsourcing of Brute-Force Key Searches
    In Proceedings of the ACM Cloud Computing Security Workshop (CCSW); in conjunction with ACM CCS, 2011 [Download PDF (PDF, 474 KB) | Download bibtex (BIB, 300 Bytes)]
  • Claude Castelluccia, Emiliano De Cristofaro, Aurélien Francillon, Mohamed Ali Kaafar
    EphPub: Toward Robust Ephemeral Publishing
    In Proceedings of the IEEE International Conference on Network Protocols (ICNP), 2011 [external page software]
  • Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
    On the Requirements for Successful GPS Spoofing Attacks
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011 [Download PDF (PDF, 1.2 MB) | Download bibtex (BIB, 328 Bytes)]
  • Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, Srdjan Capkun
    Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage
    In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), 2011
  • Joel Reardon, Claudio Marforio, Srdjan Capkun, David Basin
    Secure Deletion on Log-structured File Systems
    arXiv Technical Report arXiv:1106.0917 [Download PDF (PDF, 580 KB)]
    Related Schweizer Fernsehen: external page Einstein show 9.6.2011
    On-line Report and Secure Deletion Application Download: external page SHREDroid: Secure Deletion for Android
  • Claudio Marforio, Aurélien Francillon, Srdjan Capkun
    Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems
    Technical Report 724, ETH Zürich, System Security Group, April 2011. [Download PDF (PDF, 446 KB) | Download bibtex (BIB, 338 Bytes)]
  • Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
    Investigation of Signal and Message Manipulations on the Wireless Channel
    In Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2011 [Download PDF (PDF, 454 KB) | Download bibtex (BIB, 326 Bytes)]
  • Patrick Schaller, Benedikt Schmidt, David Basin, Srdjan Capkun
    Formal Reasoning about Physical Properties of Security Protocols
    in ACM Transactions on Information and System Security (TISSEC), 2011
  • Davide Zanetti, Pascal Sachs, Srdjan Capkun
    On The Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?
    In Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), 2011 [Download PDF (PDF, 455 KB) | Download bibtex (BIB, 270 Bytes)]
  • Srdjan Capkun, Karim El Defrawy, Gene Tsudik
    Group Distance Bounding Protocols (short paper)
    In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST), 2011
    Related technical report: [Download PDF (PDF, 1.1 MB)]
  • Ghassan Karame, Aurelien Francillon, Srdjan Capkun
    Pay as you Browse: Microcomputations as Micropayments in Web-based Services
    In Proceedings of the International World Wide Web Conference (WWW), 2011 [Download PDF (PDF, 1.3 MB) | Download bibtex (BIB, 297 Bytes)].
  • Aurelien Francillon, Boris Danev, Srdjan Capkun
    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2011
    Preceding technical report: Cryptology ePrint Archive: Report 2010/332, 2010 [Download PDF (PDF, 1 MB) | Download bibtex (BIB, 296 Bytes)]

2010

2009

2008

  • Kasper Bonne Rasmussen, Srdjan Capkun
    Location Privacy of Distance Bounding Protocols
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2008. [Download PDF (PDF, 309 KB)]
  • Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava
    Secure Time Synchronization in Sensor Networks
    in ACM Transactions on Information and System Security (TISSEC), July 2008 [Download PDF (PDF, 479 KB)Download (BIB, 306 Bytes) (BIB, 306 Bytes)]
  • Shouhuai Xu, Srdjan Capkun
    Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
    in ACM Transactions on Information and System Security (TISSEC), 2008. [Download PDF (PDF, 391 KB) | Download bibtex (BIB, 306 Bytes)]
  • Zanetti Davide, Srdjan Capkun
    Protecting Sensitive Business Information While Sharing Serial-Level Data,
    International Workshop on Security and Privacy in Enterprise Computing (InSPEC), IEEE EDOC, 2008.
  • Nils Ole Tippenhauer, Srdjan Capkun
    UWB-based Secure Ranging and Localization
    Technical Report 586, ETH Zürich, System Security Group, January 2008. [Download PDF (PDF, 248 KB) | Download bibtex (BIB, 234 Bytes)]
  • Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj
    Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
    in Proceedings of IEEE Symposium on Security and Privacy (S&P), 2008 [Download PDF (PDF, 353 KB)]
  • Srdjan Capkun, Mario Cagalj, Ramkumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani Srivastava
    Integrity Codes: Message Integrity Protection and Authentication Over Insecure Channels
    in IEEE Transactions on Dependable and Secure Computing (TDSC), 2008 [Download PDF (PDF, 265 KB)]
  • Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, Srdjan Capkun, Jean-Pierre Hubaux
    Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking
    in IEEE Communications Magazine, February 2008 [Download PDF (PDF, 279 KB)]
  • Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj and Mani Srivastava
    Secure Location Verification With Hidden and Mobile Base Stations
    in IEEE Transactions on Mobile Computing (TMC), April 2008 [Download PDF (PDF, 1.9 MB)]

2007

  • Kasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj
    SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks (extended abstract),
    in Proceedings of ACM MobiCom 2007 [Download PDF (PDF, 664 KB)]
    (related Technical Report 546, ETH Zürich, IFW, February 7, 2007. [Download PDF (PDF, 1.2 MB)]
  • Kasper Bonne Rasmussen, Srdjan Capkun
    Implications of Radio Fingerprinting on the Security of Sensor Networks,
    in Proceedings of IEEE SecureComm, 2007 [Download PDF (PDF, 262 KB)]
  • Patrick Schaller, Srdjan Capkun, David Basin
    BAP: Broadcast Authentication Using Cryptographic Puzzles
    in Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS) [Download PDF (PDF, 288 KB)]
  • Mario Cagalj, Srdjan Capkun and Jean-Pierre Hubaux
    Wormhole-Based Antijamming Techniques in Sensor Networks
    ,
    in IEEE Transactions on Mobile Computing (TMC), January 2007. [Download PDF (PDF, 1.7 MB)]
  • Security and Privacy in Ad-hoc and Sensor Networks
    4th European Workshop, ESAS 2007
    , Cambridge, UK, July 2-3, 2007, Proceedings
    Series: Lecture Notes in Computer Science , Vol. 4572
    Stajano, F.; Meadows, C.; Capkun, S.; Moore, T. (Eds.)
    2007, X, 247 p., Softcover
    ISBN: 978-3-540-73274-7
  • Book chapters in Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks,
    Poovendran, Wang, Roy (ed.), Advances in Information Security series, Vol. 30, Springer, 2007, ISBN 978-0-387-32721-1 [Download book contents (PDF, 40 KB)]

2006

  • Srdjan Capkun, Saurabh Ganeriwal, Farooq Anjum and Mani Srivastava,
    Secure RSS-based Localization in Sensor Networks,
    Technical Reports 529, ETH Zürich, 09 2006. [Download PDF (PDF, 151 KB)]
  • Srdjan Capkun and Mario Cagalj
    Integrity Regions: Authentication Through Presence in Wireless Networks
    ACM Workshop on Wireless Security (WiSe) 2006 [Download PDF (PDF, 174 KB)]

pre-ETH Zürich

2006

  • Mario Cagalj, Srdjan Capkun, RamKumar Rengaswamy, Ilias Tsigkogiannis, Mani Srivastava and Jean-Pierre Hubaux,
    Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels,
    in Proceeding of the IEEE Symposium on Security and Privacy (S&P), 2006. [Download PDF (PDF, 260 KB)]
  • S.Capkun, M. Cagalj, M. Srivastava,
    Securing Localization With Hidden and Mobile Base Stations,
    in Proceedings of IEEE INFOCOM 2006 [Download PDF (PDF, 249 KB)]
  • S. Capkun, J. P. Hubaux, L. Buttyan, 
    Mobility Helps Peer-to-Peer Security
    IEEE Transactions on Mobile Computing (TMC), January 2006 [Download PDF (PDF, 300 KB)]
  • M. Cagalj, S. Capkun, J. P. Hubaux,
    Key agreement in peer-to-peer wireless networks
    Proceedings of the IEEE (Special Issue on Cryptography and Security), 2006. [Download PDF (PDF, 456 KB)]
  • S. Capkun,  J. P. Hubaux,
    Secure positioning in wireless networks
    IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Security in Wireless Ad Hoc Networks, February 2006. [Download PDF (PDF, 639 KB)]

2005

  • S.Sedihpour, S.Capkun, S.Ganeriwal and M.Srivastava,
    Implementation of Attacks on Ultrasonic Ranging Systems, demo
    ,
    ACM SENSYS 2005. Demo description [Download PDF (PDF, 61 KB)], Poster [Download PDF (PDF, 89 KB)]
  • S. Ganeriwal, S. Capkun, S. Han, M. Srivastava,
    Secure Time Synchronization Service for Sensor Networks,
    in Proceedings of Wireless Security Workshop (WISE) 2005. [Download PDF (PDF, 271 KB)]
  • S.Capkun, J.P. Hubaux,
    Secure positioning of wireless devices with application to sensor networks,
    in Proceedings of IEEE INFOCOM 2005 [Download PDF (PDF, 541 KB)]
    (first appeared as "Secure Positioning in Sensor Networks", Technical report, EPFL/IC/200444, May 2004)
  • L. Lazos, R. Poovendran, S. Capkun
    ROPE: Robust Position Estimation in Wireless Sensor Networks
    ,
    in Proceedings of IPSN 2005 [Download PDF (PDF, 954 KB)]

2004

  • M. Felegyhazi, S. Capkun, J. P. Hubaux,
    SOWER: Self-Organizing Wireless Network for Messaging
    ,
    In Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) 2004. [Download PDF (PDF, 406 KB)]
  • J. P. Hubaux, S. Capkun, J.Luo,
    The Security and Privacy of Smart Vehicles,
    IEEE Security & Privacy (May-June 2004). [Download PDF (PDF, 569 KB)]
  • L. Buttyán, J. P. Hubaux and S. Capkun,
    A Formal Analysis of Syverson`s Rational Exchange Protocol,
    Journal of Computer Security (2004). [Download PDF (PDF, 219 KB)]
  • Srdjan Capkun, Jean-Pierre Hubaux, Markus Jakobsson,
    Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks,
    Technical report. – 2004 [200410] [LCA-REPORT-2004-015] [Download PDF (PDF, 218 KB)]

2003

  • S. Capkun, J. P. Hubaux and L. Buttyán,
    Mobility Helps Security in Ad Hoc Networks,
    In Proceedings of the 4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2003). [Download PDF (PDF, 203 KB)]
  • S. Capkun, L. Buttyán and  J. P. Hubaux,
    SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 2003.  [Download PDF (PDF, 164 KB)]
  • S. Capkun and J. P. Hubaux,
    BISS: Building Secure Routing out of an Incomplete Set of  Security Associations, In Proceedings of the Wireless Security Workshop (WISE) 2003, San Diego, September 2003  [Download PDF (PDF, 175 KB)]
  • S. Capkun, L. Buttyan, J. P. Hubaux,
    Self-Organized Public-Key Management for Mobile Ad-Hoc Networks,
    IEEE Transactions on Mobile Computing (January-March 2003). [Download PDF (PDF, 2.1 MB)]
  • S. Capkun, L. Buttyan and J-P. Hubaux,
    Self-Organized Public-Key Management for Mobile Ad-Hoc Networks - Abstract,
    in Report on a Working Session on Security in Wireless Ad Hoc Networks, L. Buttyan and J.-P. Hubaux (eds.), ACM Mobile Computing and Communications Review (MC2R), Vol. 7, No. 1, 2003. [Download PDF (PDF, 401 KB)]

2002

  • L. Buttyán, J. P. Hubaux and S. Capkun,
    A Formal Analysis of Syverson`s Rational Exchange Protocol,
    In Proceedings of IEEE Computer Security Foundations Workshop (CSFW), Cape Breton, Nova Scotia, Canada, June 2002, pp. [Download PDF (PDF, 179 KB)]
  • S. Capkun, L. Buttyan, J. P. Hubaux,
    Self-Organized Public-Key Management for Mobile Ad-Hoc Networks,
    Poster in Wireless Security Workshop (WISE), Atlanta 2002.
  • S. Capkun, L. Buttyán and  J. P. Hubaux,
    Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph, In Proceedings of ACM New Security Paradigms Workshop (NSPW), September 2002.  [Download PDF (PDF, 1.2 MB)]
  • S. Capkun, M. Hamdi, J. P. Hubaux,
    GPS-free Positioning in Mobile Ad-Hoc Networks,
    Cluster Computing Journal, April 2002. [Download PDF (PDF, 422 KB)]

2001

  • J.-P. Hubaux, L. Buttyán, and S. Capkun,
    The Quest for Security in Mobile Ad Hoc Networks,
    In Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2001), Long Beach, CA, USA, 4-5. October 2001. [Download PDF (PDF, 205 KB)]
  • S. Capkun, M. Hamdi and J. P. Hubaux,
    GPS-free Positioning in Mobile Ad-Hoc Networks,
    In Proceedings of 34'th HICSS, January 2001. (best paper award)  [Download PDF (PDF, 197 KB)]
  • Lj. Blazevic, L.Buttyan, S. Capkun, S. Giordano, J. P. Hubaux, J. Y. Le Boudec
    Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes, IEEE Communications Magazine, June 2001. [Download PDF (PDF, 1022 KB)]
JavaScript has been disabled in your browser