Publications
The provided PDFs are typically preprint versions. The final publications are available through the publisher online archives.
2025
2024
-Aritra Dhar, Supraja Sridhara Shweta Shinde Srdjan Capkun, Renzo Andri
Confidential Computing with Heterogeneous Devices at Cloud-Scale, Annual Computer Security Applications Conference (ACSAC 2024) (to appear)
-Daniele Lain, Tarek Jost, Sinisa Matetic, Kari Kostiainen, Srdjan Čapkun
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training, ACM CCS 2024 (to appear)
- FAST: Fast and Accurate Security Testing of HRP UWB ChipsGraciana Aad, Giovanni Camurati, Matteo Dell’Amico and Srdjan CapkunZurich: ETH Zurich, 2024.
High-Rate Pulse (HRP) Ultra-Wide Band (UWB) technology is used for secure distance measurement and was standardized by IEEE 802.15.4z in 2020. This standard is currently implemented in chips deployed in consumer devices such as Apple iPhones and Samsung smartphones. However, due to the use of proprietary algorithms and closed implementation, evaluating the security of such chips analytically is challenging. In this work, we therefore investigate how to evaluate the security of HRP UWB chips empirically. We propose FAST, a generic and efficient testing methodology that we use to accurately characterize the security of HRP UWB chips against distance reduction attacks. FAST relies on importance sampling and can accurately estimate very low success rates, for example, much smaller than 2^-10, using a small and practical number of tests. Using FAST, we characterize the security of a Qorvo DWM3000EVB chip across different settings and attack conditions. FAST revealed that different chip configurations affect the success rates (2^-10 to 2^-128) and that a well-designed attack signal can bypass the additional consistency checks offered by the chip.
- Breaking Bad: How Compilers Break Constant-Time ImplementationsMoritz Schneider, Daniele Lain, Ivan Puddu, Nicolas Dutly and Srdjan CapkunarXiv, pp. 2410.13489, Ithaca, NY: Cornell University, 2024.
The implementations of most hardened cryptographic libraries use defensive programming techniques for side-channel resistance. These techniques are usually specified as guidelines to developers on specific code patterns to use or avoid. Examples include performing arithmetic operations to choose between two variables instead of executing a secret-dependent branch. However, such techniques are only meaningful if they persist across compilation. In this paper, we investigate how optimizations used by modern compilers break the protections introduced by defensive programming techniques. Specifically, how compilers break high-level constant-time implementations used to mitigate timing side-channel attacks. We run a large-scale experiment to see if such compiler-induced issues manifest in state-of-the-art cryptographic libraries. We develop a tool that can profile virtually any architecture, and we use it to run trace-based dynamic analysis on 44,604 different targets. Particularly, we focus on the most widely deployed cryptographic libraries, which aim to provide side-channel resistance. We are able to evaluate whether their claims hold across various CPU architectures, including x86-64, x86-i386, armv7, aarch64, RISC-V, and MIPS-32. Our large-scale study reveals that several compiler-induced secret-dependent operations occur within some of the most highly regarded hardened cryptographic libraries. To the best of our knowledge, such findings represent the first time these issues have been observed in the wild. One of the key takeaways of this paper is that the state-of-the-art defensive programming techniques employed for side-channel resistance are still inadequate, incomplete, and bound to fail when paired with the optimizations that compilers continuously introduce.
- Aster: Fixing the Android TEE Ecosystem with Arm CCAMark Kuhne, Supraja Sridhara, Andrin Bertschi, Nicolas Dutly, Srdjan Capkun and Shweta ShindearXiv, pp. 2407.16694, Ithaca, NY: Cornell University, 2024.
The Android ecosystem relies on either TrustZone (e.g., OP-TEE, QTEE, Trusty) or trusted hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and Android bugs. TrustZone allows any secure world code to access the normal world that runs Android. Similarly, a trusted hypervisor has full access to Android running in one VM and security services in other VMs. In this paper, we motivate the need for mutual isolation, wherein Android, hypervisors, and the secure world are isolated from each other. Then, we propose a sandboxed service abstraction, such that a sandboxed execution cannot access any other sandbox, Android, hypervisor, or secure world memory. We present Aster which achieves these goals while ensuring that sandboxed execution can still communicate with Android to get inputs and provide outputs securely. Our main insight is to leverage the hardware isolation offered by Arm Confidential Computing Architecture (CCA). However, since CCA does not satisfy our sandboxing and mutual isolation requirements, Aster repurposes its hardware enforcement to meet its goals while addressing challenges such as secure interfaces, virtio, and protection against interrupts. We implement Aster to demonstrate its feasibility and assess its compatibility. We take three case studies, including one currently deployed on Android phones and insufficiently secured using a trusted hypervisor, to demonstrate that they can be protected by Aster.
- Scrappy: SeCure Rate Assuring Protocol with PrivacYKosei Akama, Yoshimichi Nakatsuka, Masaaki Sato and Keisuke Uehara31st Network and Distributed System Security Symposium (NDSS 2024), San Diego, CA, USA Reston, VA: Internet Society, February 26 - March 1, 2024.
Preventing abusive activities caused by adversaries accessing online services at a rate exceeding that expected by websites has become an ever-increasing problem. CAPTCHAs and SMS authentication are widely used to provide a solution by implementing rate limiting, although they are becoming less effective, and some are considered privacy-invasive. In light of this, many studies have proposed better rate-limiting systems that protect the privacy of legitimate users while blocking malicious actors. However, they suffer from one or more shortcomings: (1) assume trust in the underlying hardware and (2) are vulnerable to side-channel attacks. Motivated by the aforementioned issues, this paper proposes Scrappy: SeCure Rate Assuring Protocol with PrivacY. Scrappy allows clients to generate unforgeable yet unlinkable rate-assuring proofs, which provides the server with cryptographic guarantees that the client is not misbehaving. We design Scrappy using a combination of DAA and hardware security devices. Scrappy is implemented over three types of devices, including one that can immediately be deployed in the real world. Our baseline evaluation shows that the end-to-end latency of Scrappy is minimal, taking only 0.32 seconds, and uses only 679 bytes of bandwidth when transferring necessary data. We also conduct an extensive security evaluation, showing that the rate-limiting capability of Scrappy is unaffected even if the hardware security device is compromised.
- PURE: Payments with UWB RElay-protectionDaniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David Basin and Srdjan Capkun33rd USENIX Security Symposium (USENIX Security 2024), Philadelphia, PA, USA, pp.4553-4569, Berkeley, CA: USENIX Association, August 14-16, 2024.
Contactless payments are now widely used and are expected to reach $10 trillion worth of transactions by 2027. Although convenient, contactless payments are vulnerable to relay attacks that enable attackers to execute fraudulent payments. A number of countermeasures have been proposed to address this issue, including Mastercard’s relay protection mechanism. These countermeasures, although effective against some Commercial off-the-shelf (COTS) relays, fail to prevent physicallayer relay attacks. In this work, we leverage the Ultra-Wide Band (UWB) radios incorporated in major smartphones, smartwatches, tags and accessories, and introduce PURE, the first UWB-based relay protection that integrates smoothly into existing contactless payment standards, and prevents even the most sophisticated physical layer attacks. PURE extends EMV payment protocols that are executed between cards and terminals, and does not require any modification to the backend of the issuer, acquirer, or payment network. PURE further tailors UWB ranging to the payment environment (i.e., wireless channels) to achieve both reliability and resistance to all known physicallayer distance reduction attacks against UWB 802.15.4z. We implement PURE within the EMV standard on modern smartphones, and evaluate its performance in a realistic deployment. Our experiments show that PURE provides a sub-meter relay protection with minimal execution overhead (41 ms). We formally verify the security of PURE’s integration within Mastercard’s EMV protocol using the Tamarin prover.
- On (the Lack of) Code Confidentiality in Trusted Execution EnvironmentsIvan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto and Srdjan Capkun45th IEEE Symposium on Security and Privacy (SP 2024), San Francisco, CA, USA, pp.4125-4142, Piscataway, NJ: IEEE, May 20-23, 2024.
Trusted Execution Environments (TEEs) have been proposed as a solution to protect code confidentiality in scenarios where computation is outsourced to an untrusted operator. We study the resilience of such solutions to side-channel attacks in two commonly deployed scenarios: when the confidential code is a native binary that is shipped and executed within a TEE and when the confidential code is an intermediate representation (IR) executed on top of a runtime within a TEE. We show that executing IR code such as WASM bytecode on a runtime executing in a TEE leaks most IR instructions with high accuracy and therefore reveals the confidential code. Contrary to IR execution, native execution is much less susceptible to leakage and largely resists even the most powerful side-channel attacks. We evaluate native execution leakage in Intel SGX and AMD SEV and experimentally demonstrate end-to-end instruction extraction on Intel SGX, with WASM bytecode as IR executed within two popular WASM runtimes: WAMR and wasmi. Our experiments show that IR code leakage from such systems is practical and therefore question the security claims of several commercial solutions which rely on TEEs+WASM for code confidentiality.
2023
- Claudio Anliker, Giovanni Camurati, Srdjan Čapkun
Time for Change: How Clocks Break UWB Secure Ranging,
in Usenix Security, 2023 [external page PDF] (to appear)
- Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, Srdjan Capkun
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems
in Network and Distributed System Security Symposium (NDSS) 2023 (to appear)
- Giovanni Camurati, Matteo Dell'Amico, François-Xavier Standaert
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
in IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES) 2023
[external page PDF | external page DOI | external page CODE]
- Giovanni Camurati, Aurélien Francillon
Screaming Channels
in Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
[external page DOI]
2022
- Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Čapkun
On (the Lack of) Code Confidentiality in Trusted Execution Environments
in arXiv preprint (arXiv:2212.07899)
[Download BIB (BIB, 465 Bytes) | external page PDF | external page DOI] - Friederike Groschupp, Mark Kuhne, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun
It's TEEtime: Bringing User Sovereignty to Smartphones
in arXiv preprint (arXiv:2211.05206)
[external page BIB | external page PDF | external page DOI] - Simon Erni, Martin Kotuliak, Patrick Leu, Marc Roeschlin, Srdjan Capkun
AdaptOver: Adaptive Overshadowing Attacks in Cellular Networks
In The 28th Annual International Conference On Mobile Computing And Networking (ACM MobiCom ’22) (to appear)
[external page PDF | external page BIB | external page DOI] - Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulationcall_made
In ACM Conference on Computer and Communications Security (CCS), 2022
[external page PDF | external page BIB | external page DOI]
- Giulia Fanti, Kari Kostiainen, William Howlett, Josh Lipsky, Ole Moehr, John Paul Schnapper-Casteras, and Josephine Wolff
Missing Key: The challenge of cybersecurity and central bank digital currency
Atlantic Council Report, June 2022
[external page PDF, external page web] - Patrick Leu*, Giovanni Camurati*, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, and Jiska Classen
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
in USENIX Security 2022 *equal contributions
https://securepositioning.com/ghost-peak/
[external page BIB | PDF | external page DOI]
- Daniele Lain, Kari Kostiainen, Srdjan Čapkun
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
in IEEE Symposium on Security and Privacy (S&P), 2022
[external page BIB | external page PDF | external page DOI]
- Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun
LTrack: Stealthy Tracking of Mobile Phones in LTE
in USENIX Security 2022
[external page BIB | external page PDF | external page DOI] - Mridula Singh, Marc Roeschlin, Aanjhan Ranganathan, Srdjan Čapkun
V-Range: Enabling Secure Ranging in 5G Wireless Networks
In Proceedings of Network and Distributed System Security Symposium (NDSS) 2022 (to appear)
[external page BIB | PDF | external page DOI]
2021
- Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Čapkun
Composite Enclaves: Towards Disaggregated Trusted Execution
in Transactions on Cryptographic Hardware and Embedded Systems (CHES) 2021
[external page BIB | external page PDF | external page DOI]
- Patrick Leu, Martin Kotuliak, Marc Röschlin, Srdjan Čapkun
Security of Multicarrier Time-of-Flight Ranging
in ACSAC 2021
[Download BIB (BIB, 2 KB) | Download PDF (PDF, 908 KB) | external page DOI]
- Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Čapkun
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
in USENIX Security 2021
[Download BIB (BIB, 343 Bytes) | external page PDF | external page DOI]
- Enis Ulqinaku and Hala Assal and AbdelRahman Abdou and Sonia Chiasson and Srdjan Čapkun
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols
in Usenix Security 2021
[external page BIB | external page PDF | external page DOI]
- Mridula Singh*, Marc Röschlin*, Ezzat Zalzala*, Patrick Leu, Srdjan Čapkun
Security Analysis of IEEE 802.15.4z/HRP UWB Time-of-Flight
in ACM WiSec 2021 *equal contribution
[BIB | Download PDF (PDF, 503 KB) | external page DOI] - Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Čapkun
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones
in Arxiv e-print (arXiv:2102.02743)
[external page BIB | external page PDF]
- Lois Orosa, Yaohua Wang, Mohammad Sadrosadati, Jeremie S. Kim, Minesh Patel, Ivan Puddu, Haocong Luo, Kaveh Razavi, Juan Gómez-Luna, Hasan Hassan, Nika Mansouri-Ghiasi, Saugata Ghose, Onur Mutlu
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations
in ACM/IEEE International Symposium on Computer Architecture (ISCA), 2021
[external page BIB | external page PDF | external page DOI]
- Jawad Haj-Yahya, Jeremie Kim, A. Giray Yaglikci, Ivan Puddu, Mohammed Alser, Lois Orosa, Juan-Gomez Luna, Onur Mutlu
IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern Processors
in ACM/IEEE International Symposium on Computer Architecture (ISCA), 2021
[external page BIB | external page PDF | external page DOI] - Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains
in Network and Distributed Systems Security (NDSS) Symposium 2021
[external page BIB | external page PDF | external page DOI]
- Irina Calciu, M. Talha Imran, Ivan Puddu, Sanidhya Kashyap, Hasan Al Maruf, Onur Mutlu, Aasheesh Kolli
Rethinking Software Runtimes for Disaggregated Memory
in ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2021
[external page BIB | Download PDF (PDF, 1 MB) | external page DOI]
2020
- Decentralized Privacy-Preserving Proximity Tracing.
Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Capkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira.
in arXiv, 2020
[Download BIB (BIB, 847 Bytes) | external page PDF| external page DOI]
- Design choices for central bank digital currency: Policy and technical considerations
Sarah Allen, Srdjan Capkun, Ittay Eyal, Giulia Fanti, Bryan Ford, James Grimmelmann, Ari Juels, Kari Kostiainen, Sarah Meiklejohn, Andrew Miller, Eswar Prasad, Karl Wüst, and Fan Zhang
in Brookings, Working Paper, July, 2020
[Download BIB (BIB, 609 Bytes) | external page PDF | external page DOI]
- Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
in ACM Conference on Computer and Communication Security (CCS), 2020
[Download BIB (BIB, 2 KB) | external page PDF | external page DOI]
- Kari Kostiainen, Aritra Dhar, Srdjan Capkun
Dedicated Security Chips in the Age of Secure Enclaves
in IEEE Security & Privacy magazine, 2020
[Download BIB (BIB, 316 Bytes) | external page PDF | external page DOI]
- Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement
in IEEE Symposium on Security and Privacy (S&P), 2020
[Download BIB (BIB, 2 KB) | PDF | external page DOI] - Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun
Snappy: Fast On-chain Payments with Practical Collaterals
in Network and Distributed Systems Security (NDSS) Symposium 2020
[Download BIB (PDF, 1.4 MB) | Download PDF (PDF, 707 KB) | external page DOI] - Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
in Network and Distributed Systems Security (NDSS) Symposium 2020
[Download BIB (BIB, 765 Bytes) | Download PDF (PDF, 4.4 MB) | external page DOI] - Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun
ProximiTEE: Hardened SGX Attestation byProximity Verification
in ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2020
[Download BIB (BIB, 350 Bytes) | Download PDF (PDF, 2.6 MB) | external page DOI]
2019
- Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization
in Annual Computer Security Applications Conference (ACSAC), 2019 (to appear) [BIB | external page PDF| DOI]
- Irina Calciu, Ivan Puddu, Aasheesh Kolli, Andreas Nowatzyk, Jayneel Gandhi, Onur Mutlu, Pratap Subrahmanyam
Project PBerry: FPGA Acceleration for Remote Memory
in Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS), 2019 [external page BIB | PDF | external page DOI]
- Moritz Schneider, Sinisa Matetic, Ari Juels, Andrew Miller, Srdjan Capkun
Secure Brokered Delegation through DelegaTEE
in IEEE Security & Privacy, 2019 [Download BIB (BIB, 563 Bytes) | Download PDF (PDF, 238 KB) | external page DOI]
- Ivan Puddu, Daniele Lain, Moritz Schneider, Elizaveta Tretiakova, Sinisa Matetic, Srdjan Capkun
TEEvil: Identity Lease via Trusted Execution Environments
in Arxiv e-print (arXiv:1903.00449)
[Download BIB (BIB, 281 Bytes) | external page PDF | external page DOI]
- Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
in Usenix Security Symposium, 2019 [external page BIB | external page PDF | external page DOI]
- Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
in Usenix Security Symposium, 2019 [Download BIB (BIB, 472 Bytes) | Download PDF (PDF, 781 KB) | external page DOI]
- David Sommer, Sebastian Meiser, and Esfandiar Mohammadi
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy.
in Proceedings on Privacy Enhancing Technologies 2 (PoPETS), 2019 [Download BIB (BIB, 487 Bytes) | Download PDF (PDF, 1.9 MB) | external page DOI | external page eprint]
- Mridula Singh, Patrick Leu, Srdjan Capkun
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
in Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019 [Download BIB (BIB, 564 Bytes) | Download PDF (PDF, 951 KB) | external page DOI]
- Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun
PRCash: Fast, Private and Regulated Transactions for Digital Currencies
in Proceedings of the International Conference on Financial Cryptography and Data Security (FC). 2019 [Download BIB (BIB, 299 Bytes) | Download PDF (PDF, 455 KB)| external page DOI]
- Karl Wüst*, Sinisa Matetic*, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun [*equally contributing authors]
ZLiTE: Zcash Lightweight Clients using Trusted Execution
in Proceedings of the International Conference on Financial Cryptography and Data Security (FC). 2019 [Download BIB (BIB, 348 Bytes) | Download PDF (PDF, 454 KB)| external page DOI]
- David Sommer, Aritra Dhar, Esfandiar Mohammadi, Daniel Ronzani, and Srdjan Capkun
Deniable Upload and Download via Passive Participation
in USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston USA, 2019 [external page BIB | Download PDF (PDF, 1.9 MB) | external page DOI]
2018
- Ghassan Karame, Srdjan Capkun
Blockchain Security and Privacy, Guest Editors' Introduction
in IEEE Security & Privacy, Volume 16, Issue 4, 2018.
[Download BIB (BIB, 670 Bytes) | Download PDF (PDF, 1.4 MB) | external page DOI] - Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun
Towards Shared Ownership in the Cloud
in IEEE Transactions on Information Forensics and Security, Volume 13, Issue 12, 2018.
[Download BIB (PDF, 2.3 MB) | Download PDF (PDF, 2.3 MB) | external page DOI] - Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification
[external page BIB | external page PDF | external page DOI]
- Garvita Allabadi, Aritra Dhar, Ambreen Bashir and Rahul Purandare
METIS: Resource- and Context-Aware Monitoring of Finite State Properties
in 18th International Conference on Runtime Verification (RV 2018)
[external page BIB | external page PDF | external page DOI] - AbdelRahman Abdou, Paul C van Oorschot, Tao Wan
Comparative Analysis of Control Plane Security of SDN and Conventional Networks
in IEEE Communication Surveys and Tutorials, 2018
[Download BIB (BIB, 670 Bytes) | Download PDF (PDF, 724 KB) | external page DOI]
- Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks
in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2018
[Download BIB (BIB, 1 KB) | Download PDF (PDF, 767 KB) | external page DOI]
- Der-Yeuan Yu, Elizabeth Stobert, David A. Basin, Srdjan Capkun
Exploring Website Location as a Security Indicator
in Proceedings of the NDSS Workshop on Usable Security (USEC), Internet Society, 2018
[Download BIB (BIB, 337 Bytes) | Download PDF (PDF, 684 KB) | external page DOI]
- Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)
in Privacy Enhancing Technologies Symposium (PETS), 2018
[Download BIB (BIB, 740 Bytes) | Download PDF (PDF, 4.9 MB) | external page DOI]
- Martin Strohmeier, Matthew Smith, Daniel Moser, Matthias Schäfer, Vincent Lenders, Ivan Martinovic
Utilizing Air Traffic Communications for OSINT on State and Government Aircraft
in NATO CCD COE 10th International Conference on Cyber Conflict (CyCon), 2018
[Download BIB (BIB, 1 KB) | Download PDF (PDF, 2.2 MB) | external page DOI]
- Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens Schmitt
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
in IEEE Symposium on Security and Privacy (S&P), 2018
[Download BIB (BIB, 1 KB) | Download PDF (PDF, 1.7 MB) | external page DOI]
- Roman Trüb, Daniel Moser, Matthias Schäfer, Rui Pinheiro, Vincent Lenders
Monitoring Meteorological Parameters With Crowdsourced Air Traffic Control Data
in ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2018
[Download BIB (BIB, 1 KB) | Download PDF (PDF, 1.2 MB) | external page DOI] - Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
DelegaTEE: Brokered Delegation using Trusted Execution Environments
in Usenix Security Symposium, 2018
[Download BIB (BIB, 1 KB) | Download PDF (PDF, 574 KB) | external page DOI] - Karl Wüst, Arthur Gervais
Do you need a Blockchain?
in Crypto Valley Conference on Blockchain Technology (CVCBT), 2018
[BIB | Download PDF (PDF, 175 KB) | external page DOI]
- Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun
TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing
in Proceedings of the Network and Distributed System Security Symposium (NDSS), 2018
[Download BIB (BIB, 257 Bytes) | Download PDF (PDF, 370 KB) | external page DOI]
2017
- Aritra Dhar, Der-Yeuan Yu, Srdjan Capkun
IntegriKey: End-to-End Integrity Protection of User Input
in ePrint Archive: Report 2017/1245
[external page BIB | external page PDF | external page DOI] - Mridula Singh, Patrick Leu, Srdjan Capkun
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
EPrint Archive 2017/1240 [external page PDF] - Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
On the Security of Carrier Phase-based Ranging
in Proceedings of Cryptographic Hardware and Embedded Systems (CHES), 2017 (to appear)
Arxiv e-print (arXiv:1610.06077) [external page PDF] - Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
μchain: How to Forget without Hard Forks
in ePrint Archive: Report 2017/106
[Download BIB (BIB, 340 Bytes) | external page PDF | external page DOI] - Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017 [Download PDF (PDF, 910 KB)]
- Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
ROTE: Rollback Protection for Trusted Execution
26th USENIX Security Symposium, August 2017 (To appear)
- Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi
Software Grand Exposure: SGX Cache Attacks Are Practical
USENIX Workshop on Offensive Technologies (WOOT'17), August 2017 [external page PDF] - Aanjhan Ranganathan, Srdjan Capkun
Are We Really Close? Verifying Proximity in Wireless Systems
in IEEE Security & Privacy Magazine, May-June 2017 edition [Download PDF (PDF, 523 KB)] - Ghassan Karame, Matthias Neugschwandtner, Melek Önen, Hubert Ritzdorf
Reconciling Security and Functional Requirements in Multi-tenant Clouds
in Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing (SCC), 2017 [Download PDF (PDF, 239 KB) |external page Bibtex] - Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders and Ivan Martinovic
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
in Financial Cryptography and Data Security (FC'17), 2017 [Download PDF (PDF, 2.1 MB)] - Luka Malisa, Kari Kostiainen, and Srdjan Capkun
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2017 [Download PDF (PDF, 3.2 MB) | Download tech. report (PDF, 3.6 MB)] - Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, and Srdjan Capkun
Using Hover to Compromise the Confidentiality of User Input on Android
Proc. ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017 [Download PDF (PDF, 1.5 MB)]
2016
- Hubert Ritzdorf, Ghassan O. Karame, Claudio Soriente, Srdjan Čapkun
On Information Leakage in Deduplicated Storage Systems
in 8th ACM Cloud Computing Secruity Workshop (CCSW), 2016 [Download PDF (PDF, 550 KB) | external page DOI | Download Bibtex (BIB, 437 Bytes)] - Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
Quantifying Web Adblocker Privacy
EPrint Archive 2016/900 [external page PDF] - Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun
On the Security and Performance of Proof of Work Blockchains
in ACM Conference on Computer and Communication Security (CCS), 2016 [Download PDF (PDF, 393 KB) | external page DOI] - Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
Quantifying Location Privacy Leakage from Transaction Prices
In Proceedings of the 21th European Symposium on Research in Computer Security (ESORICS), 2016 [Download PDF (PDF, 353 KB) | external page DOI] - Luka Malisa, Kari Kostiainen, Michael Och, and Srdjan Capkun
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
21st European Symposium on Research in Computer Security (ESORICS), 2016 [Download PDF (PDF, 569 KB) | external page DOI | Download bibtex (BIB, 889 Bytes)] - Aanjhan Ranganathan, Hildur Olafsdottir and Srdjan Capkun
SPREE: Spoofing Resistant GPS Receiver
22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [Download PDF (PDF, 1.1 MB) | external page DOI] - Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente and Srdjan Capkun
SALVE: Server Authentication with Location VErification
22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [external page PDF | external page DOI] - Daniel Moser, Patrick Leu, Vincent Lenders, Aanjhan Ranganathan, Fabio Ricciato and Srdjan Capkun
Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures
22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [Download PDF (PDF, 756 KB) | external page DOI] - Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa and Srdjan Capkun
Verena: End-to-End Integrity Protection for Web Applications
37th IEEE Symposium on Security and Privacy (S&P), 2016 [Download PDF (PDF, 526 KB) | external page DOI | Download bibtex (BIB, 330 Bytes) | external page video] - Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun
Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications
SIGCHI Conference on Human Factors in Computing Systems (CHI), 2016 [Download PDF (PDF, 2.2 MB) | external page DOI | Download bibtex (BIB, 409 Bytes)] - Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun
Physical-Layer Integrity for Wireless Messages
Computer Networks (COMNET), 2016 [Download PDF (PDF, 464 KB) | external page DOI]
2015
- Julien Bringer, Beatriz Gallego, Ghassan Karame, Mathias Kohler, Panos Louridas, Melek Önen, Hubert Ritzdorf, Alessandro Sorniotti, David Vallejo
TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud
E-Democracy – Citizen Rights in the World of the New Computing Paradigms, 2015 [external page DOI | Download bibtex (BIB, 764 Bytes)]
- Luka Malisa, Kari Kostiainen, Srdjan Capkun
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
IACR Cryptology ePrint Archive, 2015 [external page URL]
- Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
W-SPS: Designing a Wide-Area Secure Positioning System
IACR Cryptology ePrint Archive, 2015 [external page URL]
- Claudio Marforio; Ramya Jayaram Masti; Claudio Soriente; Kari Kostiainen; Srdjan Capkun
Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms
CoRR 2015 [external page URL]
- Wade Trappe,Lalitha Sankar Sankar, Radha Poovendran, Heejo Lee, Srdjan Capkun
Introduction to the Issue on Signal and Information Processing for Privacy
IEEE Journal of Selected Topics in Signal Processing, 2015 [external page DOI]
- Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun
Logical Partitions on Many-core Platforms
31st Annual Computer Security Applications Conference (ACSAC), 2015 (to appear) [Download PDF (PDF, 272 KB)] - Aanjhan Ranganathan, Boris Danev and Srdjan Capkun
Proximity Verification for Contactless Access Control and Authentication Systems
31st Annual Computer Security Applications Conference (ACSAC), 2015 [Download PDF (PDF, 5.1 MB)] - Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
Tampering with the Delivery of Blocks and Transactions in Bitcoin
ACM Conference on Computer and Communication Security (CCS), 2015 [external page Preprint] - Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
Quantifying Location Privacy Leakage from Transaction Prices
Cryptology ePrint Archive: Report 2015/496 [external page Paper] - Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele and Srdjan Capkun
Thermal Covert Channels on Multi-core Platforms
24rd USENIX Security Symposium, 2015
arXiv:1503.07000, 2015 [Download PDF (PDF, 2.1 MB)] - Nikolaos Karapanos, Claudio Marforio, Claudio Soriente and Srdjan Capkun
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
24th USENIX Security Symposium, 2015 [Download PDF (PDF, 1.7 MB) | Download bibtex (BIB, 517 Bytes) | external page video | external page demo video | external page project website]
arXiv:1503.03790, 2015 [external page PDF] - Claudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun
Commune: Shared Ownership in an Agnostic Cloud
20th ACM Symposium on Access Control Models and Technologies, SACMAT 2015 [Download PDF (PDF, 458 KB) | Download bibtex (BIB, 691 Bytes)] - Justine Sherry, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy
BlindBox: Deep Packet Inspection for Encrypted Traffic
SIGCOMM 2015 [PDF | bibtex | external page DOI]
- Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser
Machine Learning Classification Over Encrypted Data
NDSS 2015 [external page PDF | external page URL]
- Nils Ole Tippenhauer, Heinrich Luecken, Marc Kuhn and Srdjan Capkun
UWB Rapid-Bit-Exchange System for Distance Bounding
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015 [Download PDF]
- Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais,
Srdjan Capkun
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
in ACM Transactions on Information and System Security (TISSEC), 2015 [Download PDF (PDF, 703 KB)]
2014
- N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, and Christian Wachsmann.
Mobile Trusted Computing.
Proceedings of the IEEE, 2014. - Arthur Gervais, Ghassan Karame, Damian Gruber, Srdjan Capkun
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), 2014 [Download Paper (PDF, 379 KB) | Download BibTeX (BIB, 330 Bytes) | Download Slides (PDF, 3.9 MB)] - Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Čapkun
Assisted Deletion of Related Content
In Proceedings of 30th Annual Computer Security Applications Conference (ACSAC), 2014 [Download Paper (PDF, 375 KB) | Download BibTeX (BIB, 507 Bytes) | Download Slides (PDF, 2.8 MB) | external page DOI] - Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun and Vincent Lenders
Quantifying Web-Search Privacy
in Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2014 [Download Paper (PDF, 466 KB) | Download BibTeX (BIB, 342 Bytes) | Download Slides (PDF, 8.6 MB)] - Naveed Ahmed, Christina Poepper and Srdjan Capkun
Enabling Short Fragments for Uncoordinated Spread Spectrum Communication
In Proceedings of 19th European Symposium on Research in Computer Security (ESORICS), 2014 [Download PDF (PDF, 637 KB)] - Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun and David Basin.
Detection of GPS Spoofing Attacks in Power Grids (short paper)
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014 [Download PDF (PDF, 256 KB) | Download bibtex (BIB, 374 Bytes)] - Nikolaos Karapanos and Srdjan Capkun
On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
In Proceedings of the 23rd USENIX Security Symposium, 2014 [Download PDF (PDF, 849 KB) | Download bibtex (BIB, 485 Bytes) | external page video] - Elli Androulaki, Claudio Soriente, Luka Malisa and Srdjan Capkun
Enforcing Location and Time-based Access Control on Cloud-stored Data
34th IEEE International Conference on Distributed Computing Systems (ICDCS), 2014 [Download PDF | Download bibtex] - Arthur Gervais, Ghassan O. Karame, Srdjan Capkun, Vedran Capkun
Is Bitcoin a Decentralized Currency?
IEEE Security and Privacy Magazine, 2014
[Preliminary version Download PDF (PDF, 154 KB) | Download BibTeX (BIB, 232 Bytes)] - Joel Reardon, David Basin, Srdjan Capkun
On Secure Data Deletion
IEEE Security and Privacy Magazine, 2014 - Ghassan O. Karame, Aurélien Francillon, Victor Budilivschi, Srdjan Capkun, Vedran Capkun
Microcomputations as Micropayments in Web-based Services
In ACM Transactions on Internet Technology (TOIT), 2014 (to appear) - Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun
Smartphones as Practical and Secure Location Verification Tokens for Payments
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014 [Download PDF (PDF, 865 KB) | Download bibtex (BIB, 455 Bytes)] - Jan-Erik Ekberg, Kari Kostiainen and N. Asokan.
The Untapped Potential of Trusted Execution Environments on Mobile Devices
IEEE Security & Privacy Magazine , 2014.
[Preliminary version Download PDF (PDF, 628 KB)]
2013
- N. Asokan, Lucas Davi, Alexandra Dmitrienko, Kari Kostiainen, Elena Reshetova and Ahmad-Reza Sadeghi.
Mobile Platform Security
Synthesis Lectures on Information Security, Privacy and Trust (Morgan & Claypool), 2013. [external page Link] - Ramya Jayaram Masti, Claudio Marforio and Srdjan Capkun
An Architecture for Concurrent Execution of Secure Environments in Clouds
In Proceedings of the 2013 ACM Cloud Computing Security Workshop (CCSW), 2013, [Download PDF (PDF, 325 KB) | Download bibtex (BIB, 2 KB)] - Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun
Secure Enrollment and Practical Migration for Mobile Trusted Execution Environments
In Proceedings of the third ACM workshop on Security and privacy in smartphones and mobile devices (SPSM), 2013 [Download PDF (PDF, 230 KB) | Download bibtex (BIB, 464 Bytes)] - Joel Reardon, Hubert Ritzdorf, David Basin and Srdjan Capkun
Secure Data Deletion from Persistent Media
in Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2013 [Download PDF (PDF, 246 KB) | Download bibtex (BIB, 485 Bytes) | Download slides (PDF, 276 KB)] - Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun
On Limitations of Friendly Jamming for Confidentiality
in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2013 [Download PDF (PDF, 1.4 MB)] - Joel Reardon, Srdjan Capkun, David Basin
SoK: Secure Data Deletion
in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2013 [Download PDF (PDF, 163 KB) | Download slides (PDF, 222 KB)] - Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer and Srdjan Capkun
Evaluating User Privacy in Bitcoin
In Proceedings of the International Conference on Financial Cryptography and Data Security (FC), 2013 [Download bibtex (RTF, 767 Bytes)] - Davide Zanetti, Ari Juels, Srdjan Capkun
Tailing RFID Tags for Clone Detection
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013 [Download PDF (PDF, 504 KB) | Download bibtex (BIB, 246 Bytes)] - Iulia Ion, Filipe Beato, Srdjan Capkun, Bart Preneel, and Marc Langheinrich
For Some Eyes Only: Protecting Online Information Sharing
In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2013 [Download bibtex (RTF, 1019 Bytes)] - Ghassan Karame, Boris Danev, Cyrill Bannwart, Srdjan Capkun
On the Security of End-to-End Measurements based on Packet-Pair Dispersions
In IEEE Transactions on Information Forensics & Security (TIFS), 2013 [Download bibtex (RTF, 734 Bytes)]
2012
- Boris Danev, Davide Zanetti, Srdjan Capkun
On Physical-layer Identification of Wireless Devices
In ACM Computing Surveys, 2012 [Download PDF (PDF, 378 KB) | Download bibtex (BIB, 281 Bytes)] - David Basin, Srdjan Capkun
Column: The Research Value of Publishing Attacks
Communications of the ACM, November 2012, Vol. 55 No. 11, Pages 22-24 - Elli Androulaki, Ghassan O. Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun
Evaluating User Privacy in Bitcoin
Technical report: Cryptology ePrint Archive Report 2012/596, 2012 [Download PDF (PDF, 940 KB)] - Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, and Srdjan Capkun
Analysis of the Communication between Colluding Applications on Modern Smartphones
In Proceedings of 28th Annual Computer Security Applications Conference (ACSAC), 2012 [Download PDF (PDF, 286 KB) | Download bibtex (BIB, 451 Bytes)] - Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, and Srdjan Capkun
Enabling Trusted Scheduling in Embedded Systems
In Proceedings of 28th Annual Computer Security Applications Conference (ACSAC), 2012 [Download PDF (PDF, 404 KB)] - Ghassan O. Karame, Elli Androulaki, Srdjan Capkun
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2012
Related technical report: Cryptology ePrint Archive Report 2012/248, 2012 [Download PDF (PDF, 529 KB)] - Davide Zanetti, Vincent Lenders and Srdjan Capkun
Exploring the Physical-layer Identification of GSM Devices
Technical Report 763, ETH Zurich, Institute of Information Security, June 2012 [Download PDF (PDF, 837 KB) | Download bibtex (BIB, 339 Bytes)] - Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelee and Srdjan Capkun
Design and Implementation of a Terrorist-Fraud Resilient Distance Bounding System
In Proceedings of 17th European Symposium on Research in Computer Security (ESORICS), 2012 [Download PDF (PDF, 2.4 MB)] - Joel Reardon, Srdjan Capkun, David Basin
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
In Proceedings of the 21st USENIX Security Symposium, 2012 [Download PDF (PDF, 404 KB) | Download slides (PDF, 7.5 MB) | external page video] - Joel Reardon, Claudio Marforio, Srdjan Capkun, David Basin
Secure Deletion on Log-structured File Systems
In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012 [Download PDF (PDF, 629 KB) | Download slides (PDF, 1.2 MB)] - Related Schweizer Fernsehen: external page Einstein show 9.6.2011
On-line Report and Secure Deletion Application Download: SHREDroid: Secure Deletion for Android - Aanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun
Physical-Layer Attacks on Chirp-based Ranging Systems
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2012 [Download PDF (PDF, 1.3 MB)] - Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun
Distance Hijacking Attacks on Distance Bounding Protocols
in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2012 - Boris Danev, Srdjan Capkun, Ramya Jayaram Masti, Thomas S. Benjamin
Towards Practical Identification of HF RFID Devices
in ACM Transactions on Information and System Security (TISSEC) - Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun
Distance Hijacking Attacks on Distance Bounding Protocols (invited paper)
Abstract to appear In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012
Related technical report: Cryptology ePrint Archive: Report 2011/129, 2011 [Download PDF (PDF, 638 KB)]
2011
- Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun
Enabling Secure VM-vTPM Migration in Private Clouds
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2011 [Download PDF (PDF, 430 KB) | Download bibtex (BIB, 298 Bytes)] - Ghassan Karame, Srdjan Capkun, Ueli Maurer
Privacy-Preserving Outsourcing of Brute-Force Key Searches
In Proceedings of the ACM Cloud Computing Security Workshop (CCSW); in conjunction with ACM CCS, 2011 [Download PDF (PDF, 474 KB) | Download bibtex (BIB, 300 Bytes)] - Claude Castelluccia, Emiliano De Cristofaro, Aurélien Francillon, Mohamed Ali Kaafar
EphPub: Toward Robust Ephemeral Publishing
In Proceedings of the IEEE International Conference on Network Protocols (ICNP), 2011 [external page software] - Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
On the Requirements for Successful GPS Spoofing Attacks
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011 [Download PDF (PDF, 1.2 MB) | Download bibtex (BIB, 328 Bytes)] - Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, Srdjan Capkun
Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage
In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), 2011 - Joel Reardon, Claudio Marforio, Srdjan Capkun, David Basin
Secure Deletion on Log-structured File Systems
arXiv Technical Report arXiv:1106.0917 [Download PDF (PDF, 580 KB)]
Related Schweizer Fernsehen: external page Einstein show 9.6.2011
On-line Report and Secure Deletion Application Download: external page SHREDroid: Secure Deletion for Android - Claudio Marforio, Aurélien Francillon, Srdjan Capkun
Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems
Technical Report 724, ETH Zürich, System Security Group, April 2011. [Download PDF (PDF, 446 KB) | Download bibtex (BIB, 338 Bytes)] - Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
Investigation of Signal and Message Manipulations on the Wireless Channel
In Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2011 [Download PDF (PDF, 454 KB) | Download bibtex (BIB, 326 Bytes)] - Patrick Schaller, Benedikt Schmidt, David Basin, Srdjan Capkun
Formal Reasoning about Physical Properties of Security Protocols
in ACM Transactions on Information and System Security (TISSEC), 2011 - Davide Zanetti, Pascal Sachs, Srdjan Capkun
On The Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?
In Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), 2011 [Download PDF (PDF, 455 KB) | Download bibtex (BIB, 270 Bytes)] - Srdjan Capkun, Karim El Defrawy, Gene Tsudik
Group Distance Bounding Protocols (short paper)
In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST), 2011
Related technical report: [Download PDF (PDF, 1.1 MB)] - Ghassan Karame, Aurelien Francillon, Srdjan Capkun
Pay as you Browse: Microcomputations as Micropayments in Web-based Services
In Proceedings of the International World Wide Web Conference (WWW), 2011 [Download PDF (PDF, 1.3 MB) | Download bibtex (BIB, 297 Bytes)]. - Aurelien Francillon, Boris Danev, Srdjan Capkun
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2011
Preceding technical report: Cryptology ePrint Archive: Report 2010/332, 2010 [Download PDF (PDF, 1 MB) | Download bibtex (BIB, 296 Bytes)]
2010
- Daniel Bodmer, Srdjan Capkun
On the Security and Privacy in Cochlear Implants
ETH Zurich, D-INFK, Technical Report No. 677, 2010 [Download PDF (PDF, 57 KB) | Download bibtex (BIB, 287 Bytes)] - Christina Pöpper, David Basin, Srdjan Capkun, Cas Cremers
Keeping Data Secret under Full Compromise using Porter Devices
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2010 [Download PDF (PDF, 307 KB) | Download bibtex (BIB, 526 Bytes)] - Ghassan Karame, Srdjan Capkun and Ueli Maurer
Privacy-Preserving Outsourcing of Brute-Force Key Searches
ETH Zurich, D-INFK, Technical Report No. 662, 2010. - Davide Zanetti, Boris Danev, Srdjan Capkun
Physical-layer Identification of UHF RFID Tags
In Proceedings of the ACM MobiCom (Annual International Conference on Mobile Computing and Networking), 2010 (to appear) [Download PDF (PDF, 665 KB) | Download bibtex (BIB, 362 Bytes) | Download poster* (PDF, 788 KB)]
* Poster presented at the USENIX Security Symposium, 2010. - Ghassan Karame, Srdjan Capkun
Low-Cost Client Puzzles based on Modular Exponentiation
In Proceedings of ESORICS (European Symposium on Research in Computer Security), 2010 [Download PDF (PDF, 261 KB) | Download bibtex (BIB, 270 Bytes)] - Kasper Bonne Rasmussen, Srdjan Capkun
Realization of RF Distance Bounding
In Proceedings of the USENIX Security Symposium, 2010 [Download PDF (PDF, 946 KB) | Download bibtex (BIB, 228 Bytes)] - Iulia Ion, Marc Langheinrich, Ponnurangam Kumaraguru, Srdjan Capkun
Influence of User Perception, Security Needs, and Social Factors on Device Pairing Method Choices
In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), 2010 [Download PDF (PDF, 1.5 MB) | Download bibtex (BIB, 346 Bytes)] - Srdjan Capkun, Mario Cagalj, Ghassan Karame, Nils Ole Tippenhauer
Integrity Regions: Authentication Through Presence in Wireless Networks
IEEE Transactions on Mobile Computing (TMC), 2010 [Download bibtex (BIB, 314 Bytes)] - Marc Kuhn, Heinrich Luecken, Nils Ole Tippenhauer,
UWB Impulse Radio Based Distance Bounding
In Proceedings of WPNC (Workshop on Positioning, Navigation and Communication), 2010 [Download PDF (PDF, 5 KB) | Download bibtex (BIB, 5 KB)] - Mario Strasser, Boris Danev, Srdjan Capkun
Detection of Reactive Jamming in Sensor Networks
In ACM Transactions on Sensor Networks (TOSN), 2010 [Download PDF (PDF, 726 KB) | Download bibtex (BIB, 390 Bytes)] - Davide Zanetti, Leo Fellmann, Srdjan Capkun
Privacy-preserving Clone Detection for RFID-enabled Supply Chains
IEEE International Conference on RFID, 2010 [Download PDF (PDF, 250 KB) | Download bibtex (BIB, 290 Bytes)] - Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim El Defrawy
Attacks on Physical-layer Identification
In Proceedings of ACM Conference on Wireless Network Security (WiSec), 2010 [Download PDF (PDF, 225 KB) | Download bibtex (BIB, 367 Bytes)] - Christina Pöpper, Mario Strasser, Srdjan Capkun
Anti-jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques
IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Mission Critical Networking, 2010 [Download PDF (PDF, 418 KB) | Download bibtex (BIB, 363 Bytes)]
2009
- Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun
Secure Ranging With Message Temporal Integrity
Cryptology ePrint Archive: Report 2009/602, 2009 [Download PDF (PDF, 526 KB) | Download bibtex (BIB, 255 Bytes)] - Ghassan Karame, Mario Strasser, Srdjan Capkun
Secure Remote Execution of Sequential Computations
In Proceedings of ICICS (International Conference on Information and Communications Security), 2009 . [Download PDF (PDF, 238 KB) | Download bibtex (BIB, 363 Bytes)] - Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun
Proximity-based Access Control for Implantable Medical Devices
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2009 [Download PDF (PDF, 470 KB) | Download bibtex (BIB, 399 Bytes)]
Related media reports: external page MIT Technology Review: Proximity-based Access Control for Implantable Medical Devices - Ghassan Karame, David Gubler and Srdjan Capkun
On the Security of Bottleneck Bandwidth Estimation Techniques
In Proceedings of SecureComm (International Conference on Security and Privacy in Communication Networks), 2009. [Download PDF (PDF, 916 KB) | Download bibtex (BIB, 384 Bytes)] - Ghassan Karame and Srdjan Capkun
Towards Secure End-to-End Network Measurements
ETH Zurich, D-INFK, Technical Report No. 628, June 2009. [Download PDF (PDF, 137 KB) | Download bibtex (BIB, 298 Bytes)] - Nils Ole Tippenhauer, Srdjan Capkun
ID-based Secure Distance Bounding and Localization
In Proceedings of ESORICS (European Symposium on Research in Computer Security), 2009 [Download PDF (PDF, 559 KB) | Download bibtex (BIB, 5 KB)] - David Basin, Srdjan Capkun, Patrick Schaller and Benedikt Schmidt
Let's get physical: models and methods for real-world security protocols
In Proceedings of the 22nd TPHols (International Conference on Theorem Proving in Higher Order Logics), 2009 (invited paper) [Download PDF (PDF, 332 KB) | Download bibtex (BIB, 352 Bytes)] - Ghassan Karame, Mario Cagalj, Srdjan Capkun
Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads
In Proceedings of the IEEE NCA (International Symposium on Network Computing and Applications), 2009. [Download PDF (PDF, 193 KB) | Download bibtex (BIB, 378 Bytes)] - Christina Pöpper, Mario Strasser, Srdjan Capkun
Jamming-resistant Broadcast Communication without Shared Keys
In Proceedings of the USENIX Security Symposium, 2009 [Download PDF (PDF, 625 KB) | Download bibtex (BIB, 271 Bytes)] - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun
Physical-layer Identification of RFID Devices
In Proceedings of the USENIX Security Symposium, 2009 [Download PDF (PDF, 913 KB) | Download bibtex (BIB, 362 Bytes)] - Patrick Schaller, Benedikt Schmidt, David Basin, Srdjan Capkun
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
In Proceedings of the IEEE Computer Security Foundations Symposium (CSF), 2009 [Download PDF (PDF, 277 KB) | Download bibtex (BIB, 356 Bytes)] - Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun
Attacks on Public WLAN-based Positioning Systems
In Proceedings of the ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009 [Download PDF (PDF, 1.7 MB) | Download bibtex (BIB, 348 Bytes) | Download talk video (FLV, 128 MB)]
Technical report and Related media reports: external page Location Spoofing Attacks on the iPhone and iPod - Mario Strasser, Christina Pöpper, Srdjan Capkun
Efficient Uncoordinated FHSS Anti-jamming Communication
In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2009 [Download PDF (PDF, 368 KB) | Download bibtex (BIB, 328 Bytes)] - Boris Danev, Srdjan Capkun
Transient-based Identification of Wireless Sensor Nodes
In Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2009 [Download PDF (PDF, 446 KB) | Download bibtex (BIB, 363 Bytes)]
2008
- Kasper Bonne Rasmussen, Srdjan Capkun
Location Privacy of Distance Bounding Protocols
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2008. [Download PDF (PDF, 309 KB)] - Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava
Secure Time Synchronization in Sensor Networks
in ACM Transactions on Information and System Security (TISSEC), July 2008 [Download PDF (PDF, 479 KB)Download (BIB, 306 Bytes) (BIB, 306 Bytes)] - Shouhuai Xu, Srdjan Capkun
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
in ACM Transactions on Information and System Security (TISSEC), 2008. [Download PDF (PDF, 391 KB) | Download bibtex (BIB, 306 Bytes)] - Zanetti Davide, Srdjan Capkun
Protecting Sensitive Business Information While Sharing Serial-Level Data,
International Workshop on Security and Privacy in Enterprise Computing (InSPEC), IEEE EDOC, 2008.
- Nils Ole Tippenhauer, Srdjan Capkun
UWB-based Secure Ranging and Localization
Technical Report 586, ETH Zürich, System Security Group, January 2008. [Download PDF (PDF, 248 KB) | Download bibtex (BIB, 234 Bytes)] - Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
in Proceedings of IEEE Symposium on Security and Privacy (S&P), 2008 [Download PDF (PDF, 353 KB)] - Srdjan Capkun, Mario Cagalj, Ramkumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani Srivastava
Integrity Codes: Message Integrity Protection and Authentication Over Insecure Channels
in IEEE Transactions on Dependable and Secure Computing (TDSC), 2008 [Download PDF (PDF, 265 KB)] - Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, Srdjan Capkun, Jean-Pierre Hubaux
Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking
in IEEE Communications Magazine, February 2008 [Download PDF (PDF, 279 KB)] - Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj and Mani Srivastava
Secure Location Verification With Hidden and Mobile Base Stations
in IEEE Transactions on Mobile Computing (TMC), April 2008 [Download PDF (PDF, 1.9 MB)]
2007
- Kasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj
SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks (extended abstract),
in Proceedings of ACM MobiCom 2007 [Download PDF (PDF, 664 KB)]
(related Technical Report 546, ETH Zürich, IFW, February 7, 2007. [Download PDF (PDF, 1.2 MB)] - Kasper Bonne Rasmussen, Srdjan Capkun
Implications of Radio Fingerprinting on the Security of Sensor Networks,
in Proceedings of IEEE SecureComm, 2007 [Download PDF (PDF, 262 KB)] - Patrick Schaller, Srdjan Capkun, David Basin
BAP: Broadcast Authentication Using Cryptographic Puzzles
in Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS) [Download PDF (PDF, 288 KB)] - Mario Cagalj, Srdjan Capkun and Jean-Pierre Hubaux
Wormhole-Based Antijamming Techniques in Sensor Networks,
in IEEE Transactions on Mobile Computing (TMC), January 2007. [Download PDF (PDF, 1.7 MB)] - Security and Privacy in Ad-hoc and Sensor Networks
4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings
Series: Lecture Notes in Computer Science , Vol. 4572
Stajano, F.; Meadows, C.; Capkun, S.; Moore, T. (Eds.)
2007, X, 247 p., Softcover
ISBN: 978-3-540-73274-7 - Book chapters in Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks,
Poovendran, Wang, Roy (ed.), Advances in Information Security series, Vol. 30, Springer, 2007, ISBN 978-0-387-32721-1 [Download book contents (PDF, 40 KB)]
2006
- Srdjan Capkun, Saurabh Ganeriwal, Farooq Anjum and Mani Srivastava,
Secure RSS-based Localization in Sensor Networks,
Technical Reports 529, ETH Zürich, 09 2006. [Download PDF (PDF, 151 KB)] - Srdjan Capkun and Mario Cagalj
Integrity Regions: Authentication Through Presence in Wireless Networks
ACM Workshop on Wireless Security (WiSe) 2006 [Download PDF (PDF, 174 KB)]
pre-ETH Zürich
2006
- Mario Cagalj, Srdjan Capkun, RamKumar Rengaswamy, Ilias Tsigkogiannis, Mani Srivastava and Jean-Pierre Hubaux,
Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels,
in Proceeding of the IEEE Symposium on Security and Privacy (S&P), 2006. [Download PDF (PDF, 260 KB)] - S.Capkun, M. Cagalj, M. Srivastava,
Securing Localization With Hidden and Mobile Base Stations,
in Proceedings of IEEE INFOCOM 2006 [Download PDF (PDF, 249 KB)] - S. Capkun, J. P. Hubaux, L. Buttyan,
Mobility Helps Peer-to-Peer Security,
IEEE Transactions on Mobile Computing (TMC), January 2006 [Download PDF (PDF, 300 KB)] - M. Cagalj, S. Capkun, J. P. Hubaux,
Key agreement in peer-to-peer wireless networks,
Proceedings of the IEEE (Special Issue on Cryptography and Security), 2006. [Download PDF (PDF, 456 KB)] - S. Capkun, J. P. Hubaux,
Secure positioning in wireless networks,
IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Security in Wireless Ad Hoc Networks, February 2006. [Download PDF (PDF, 639 KB)]
2005
- S.Sedihpour, S.Capkun, S.Ganeriwal and M.Srivastava,
Implementation of Attacks on Ultrasonic Ranging Systems, demo,
ACM SENSYS 2005. Demo description [Download PDF (PDF, 61 KB)], Poster [Download PDF (PDF, 89 KB)] - S. Ganeriwal, S. Capkun, S. Han, M. Srivastava,
Secure Time Synchronization Service for Sensor Networks,
in Proceedings of Wireless Security Workshop (WISE) 2005. [Download PDF (PDF, 271 KB)] - S.Capkun, J.P. Hubaux,
Secure positioning of wireless devices with application to sensor networks,
in Proceedings of IEEE INFOCOM 2005 [Download PDF (PDF, 541 KB)]
(first appeared as "Secure Positioning in Sensor Networks", Technical report, EPFL/IC/200444, May 2004) - L. Lazos, R. Poovendran, S. Capkun
ROPE: Robust Position Estimation in Wireless Sensor Networks,
in Proceedings of IPSN 2005 [Download PDF (PDF, 954 KB)]
2004
- M. Felegyhazi, S. Capkun, J. P. Hubaux,
SOWER: Self-Organizing Wireless Network for Messaging,
In Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) 2004. [Download PDF (PDF, 406 KB)] - J. P. Hubaux, S. Capkun, J.Luo,
The Security and Privacy of Smart Vehicles,
IEEE Security & Privacy (May-June 2004). [Download PDF (PDF, 569 KB)] - L. Buttyán, J. P. Hubaux and S. Capkun,
A Formal Analysis of Syverson`s Rational Exchange Protocol,
Journal of Computer Security (2004). [Download PDF (PDF, 219 KB)] - Srdjan Capkun, Jean-Pierre Hubaux, Markus Jakobsson,
Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks,
Technical report. – 2004 [200410] [LCA-REPORT-2004-015] [Download PDF (PDF, 218 KB)]
2003
- S. Capkun, J. P. Hubaux and L. Buttyán,
Mobility Helps Security in Ad Hoc Networks,
In Proceedings of the 4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2003). [Download PDF (PDF, 203 KB)] - S. Capkun, L. Buttyán and J. P. Hubaux,
SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 2003. [Download PDF (PDF, 164 KB)] - S. Capkun and J. P. Hubaux,
BISS: Building Secure Routing out of an Incomplete Set of Security Associations, In Proceedings of the Wireless Security Workshop (WISE) 2003, San Diego, September 2003 [Download PDF (PDF, 175 KB)] - S. Capkun, L. Buttyan, J. P. Hubaux,
Self-Organized Public-Key Management for Mobile Ad-Hoc Networks,
IEEE Transactions on Mobile Computing (January-March 2003). [Download PDF (PDF, 2.1 MB)] - S. Capkun, L. Buttyan and J-P. Hubaux,
Self-Organized Public-Key Management for Mobile Ad-Hoc Networks - Abstract,
in Report on a Working Session on Security in Wireless Ad Hoc Networks, L. Buttyan and J.-P. Hubaux (eds.), ACM Mobile Computing and Communications Review (MC2R), Vol. 7, No. 1, 2003. [Download PDF (PDF, 401 KB)]
2002
- L. Buttyán, J. P. Hubaux and S. Capkun,
A Formal Analysis of Syverson`s Rational Exchange Protocol,
In Proceedings of IEEE Computer Security Foundations Workshop (CSFW), Cape Breton, Nova Scotia, Canada, June 2002, pp. [Download PDF (PDF, 179 KB)] - S. Capkun, L. Buttyan, J. P. Hubaux,
Self-Organized Public-Key Management for Mobile Ad-Hoc Networks,
Poster in Wireless Security Workshop (WISE), Atlanta 2002. - S. Capkun, L. Buttyán and J. P. Hubaux,
Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph, In Proceedings of ACM New Security Paradigms Workshop (NSPW), September 2002. [Download PDF (PDF, 1.2 MB)] - S. Capkun, M. Hamdi, J. P. Hubaux,
GPS-free Positioning in Mobile Ad-Hoc Networks,
Cluster Computing Journal, April 2002. [Download PDF (PDF, 422 KB)]
2001
- J.-P. Hubaux, L. Buttyán, and S. Capkun,
The Quest for Security in Mobile Ad Hoc Networks,
In Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2001), Long Beach, CA, USA, 4-5. October 2001. [Download PDF (PDF, 205 KB)] - S. Capkun, M. Hamdi and J. P. Hubaux,
GPS-free Positioning in Mobile Ad-Hoc Networks,
In Proceedings of 34'th HICSS, January 2001. (best paper award) [Download PDF (PDF, 197 KB)] - Lj. Blazevic, L.Buttyan, S. Capkun, S. Giordano, J. P. Hubaux, J. Y. Le Boudec
Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes, IEEE Communications Magazine, June 2001. [Download PDF (PDF, 1022 KB)]