Publications
The provided PDFs are typically preprint versions. The final publications are available through the publisher online archives.
2024
2023
- Claudio Anliker, Giovanni Camurati, Srdjan Čapkun
Time for Change: How Clocks Break UWB Secure Ranging,
in Usenix Security, 2023 [external pagePDFcall_made] (to appear)
- Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, Srdjan Capkun
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems
in Network and Distributed System Security Symposium (NDSS) 2023 (to appear)
- Giovanni Camurati, Matteo Dell'Amico, François-Xavier Standaert
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
in IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES) 2023
[external pagePDFcall_made | external pageDOIcall_made | external pageCODEcall_made]
- Giovanni Camurati, Aurélien Francillon
Screaming Channels
in Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
[external pageDOIcall_made]
2022
- Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Čapkun
On (the Lack of) Code Confidentiality in Trusted Execution Environments
in arXiv preprint (arXiv:2212.07899)
[DownloadBIB (BIB, 465 Bytes)vertical_align_bottom | external pagePDFcall_made | external pageDOIcall_made] - Friederike Groschupp, Mark Kuhne, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun
It's TEEtime: Bringing User Sovereignty to Smartphones
in arXiv preprint (arXiv:2211.05206)
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made] - Simon Erni, Martin Kotuliak, Patrick Leu, Marc Roeschlin, Srdjan Capkun
AdaptOver: Adaptive Overshadowing Attacks in Cellular Networks
In The 28th Annual International Conference On Mobile Computing And Networking (ACM MobiCom ’22) (to appear)
[external pagePDFcall_made | external pageBIBcall_made | external pageDOIcall_made] - Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulationcall_made
In ACM Conference on Computer and Communications Security (CCS), 2022
[external pagePDFcall_made | external pageBIBcall_made | external pageDOIcall_made]
- Giulia Fanti, Kari Kostiainen, William Howlett, Josh Lipsky, Ole Moehr, John Paul Schnapper-Casteras, and Josephine Wolff
Missing Key: The challenge of cybersecurity and central bank digital currency
Atlantic Council Report, June 2022
[external pagePDFcall_made, external pagewebcall_made] - Patrick Leu*, Giovanni Camurati*, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, and Jiska Classen
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
in USENIX Security 2022 *equal contributions
https://securepositioning.com/ghost-peak/
[external pageBIBcall_made | PDF | external pageDOIcall_made]
- Daniele Lain, Kari Kostiainen, Srdjan Čapkun
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
in IEEE Symposium on Security and Privacy (S&P), 2022
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made]
- Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Čapkun
LTrack: Stealthy Tracking of Mobile Phones in LTE
in USENIX Security 2022
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made] - Mridula Singh, Marc Roeschlin, Aanjhan Ranganathan, Srdjan Čapkun
V-Range: Enabling Secure Ranging in 5G Wireless Networks
In Proceedings of Network and Distributed System Security Symposium (NDSS) 2022 (to appear)
[external pageBIBcall_made | PDF | external pageDOIcall_made]
2021
- Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Čapkun
Composite Enclaves: Towards Disaggregated Trusted Execution
in Transactions on Cryptographic Hardware and Embedded Systems (CHES) 2021
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made]
- Patrick Leu, Martin Kotuliak, Marc Röschlin, Srdjan Čapkun
Security of Multicarrier Time-of-Flight Ranging
in ACSAC 2021
[DownloadBIB (BIB, 2 KB)vertical_align_bottom | DownloadPDF (PDF, 908 KB)vertical_align_bottom | external pageDOIcall_made]
- Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Čapkun
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
in USENIX Security 2021
[DownloadBIB (BIB, 343 Bytes)vertical_align_bottom | external pagePDFcall_made | external pageDOIcall_made]
- Enis Ulqinaku and Hala Assal and AbdelRahman Abdou and Sonia Chiasson and Srdjan Čapkun
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols
in Usenix Security 2021
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made]
- Mridula Singh*, Marc Röschlin*, Ezzat Zalzala*, Patrick Leu, Srdjan Čapkun
Security Analysis of IEEE 802.15.4z/HRP UWB Time-of-Flight
in ACM WiSec 2021 *equal contribution
[BIB | DownloadPDF (PDF, 503 KB)vertical_align_bottom | external pageDOIcall_made] - Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Čapkun
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones
in Arxiv e-print (arXiv:2102.02743)
[external pageBIBcall_made | external pagePDFcall_made]
- Lois Orosa, Yaohua Wang, Mohammad Sadrosadati, Jeremie S. Kim, Minesh Patel, Ivan Puddu, Haocong Luo, Kaveh Razavi, Juan Gómez-Luna, Hasan Hassan, Nika Mansouri-Ghiasi, Saugata Ghose, Onur Mutlu
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations
in ACM/IEEE International Symposium on Computer Architecture (ISCA), 2021
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made]
- Jawad Haj-Yahya, Jeremie Kim, A. Giray Yaglikci, Ivan Puddu, Mohammed Alser, Lois Orosa, Juan-Gomez Luna, Onur Mutlu
IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern Processors
in ACM/IEEE International Symposium on Computer Architecture (ISCA), 2021
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made] - Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains
in Network and Distributed Systems Security (NDSS) Symposium 2021
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made]
- Irina Calciu, M. Talha Imran, Ivan Puddu, Sanidhya Kashyap, Hasan Al Maruf, Onur Mutlu, Aasheesh Kolli
Rethinking Software Runtimes for Disaggregated Memory
in ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2021
[external pageBIBcall_made | DownloadPDF (PDF, 1 MB)vertical_align_bottom | external pageDOIcall_made]
2020
- Decentralized Privacy-Preserving Proximity Tracing.
Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Capkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira.
in arXiv, 2020
[DownloadBIB (BIB, 847 Bytes)vertical_align_bottom | external pagePDFcall_made| external pageDOIcall_made]
- Design choices for central bank digital currency: Policy and technical considerations
Sarah Allen, Srdjan Capkun, Ittay Eyal, Giulia Fanti, Bryan Ford, James Grimmelmann, Ari Juels, Kari Kostiainen, Sarah Meiklejohn, Andrew Miller, Eswar Prasad, Karl Wüst, and Fan Zhang
in Brookings, Working Paper, July, 2020
[DownloadBIB (BIB, 609 Bytes)vertical_align_bottom | external pagePDFcall_made | external pageDOIcall_made]
- Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
in ACM Conference on Computer and Communication Security (CCS), 2020
[DownloadBIB (BIB, 2 KB)vertical_align_bottom | external pagePDFcall_made | external pageDOIcall_made]
- Kari Kostiainen, Aritra Dhar, Srdjan Capkun
Dedicated Security Chips in the Age of Secure Enclaves
in IEEE Security & Privacy magazine, 2020
[DownloadBIB (BIB, 316 Bytes)vertical_align_bottom | external pagePDFcall_made | external pageDOIcall_made]
- Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement
in IEEE Symposium on Security and Privacy (S&P), 2020
[DownloadBIB (BIB, 2 KB)vertical_align_bottom | PDF | external pageDOIcall_made] - Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun
Snappy: Fast On-chain Payments with Practical Collaterals
in Network and Distributed Systems Security (NDSS) Symposium 2020
[DownloadBIB (PDF, 1.4 MB)vertical_align_bottom | DownloadPDF (PDF, 707 KB)vertical_align_bottom | external pageDOIcall_made] - Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
in Network and Distributed Systems Security (NDSS) Symposium 2020
[DownloadBIB (BIB, 765 Bytes)vertical_align_bottom | DownloadPDF (PDF, 4.4 MB)vertical_align_bottom | external pageDOIcall_made] - Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun
ProximiTEE: Hardened SGX Attestation byProximity Verification
in ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2020
[DownloadBIB (BIB, 350 Bytes)vertical_align_bottom | DownloadPDF (PDF, 2.6 MB)vertical_align_bottom | external pageDOIcall_made]
2019
- Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization
in Annual Computer Security Applications Conference (ACSAC), 2019 (to appear) [BIB | external pagePDFcall_made| DOI]
- Irina Calciu, Ivan Puddu, Aasheesh Kolli, Andreas Nowatzyk, Jayneel Gandhi, Onur Mutlu, Pratap Subrahmanyam
Project PBerry: FPGA Acceleration for Remote Memory
in Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS), 2019 [external pageBIBcall_made | PDF | external pageDOIcall_made]
- Moritz Schneider, Sinisa Matetic, Ari Juels, Andrew Miller, Srdjan Capkun
Secure Brokered Delegation through DelegaTEE
in IEEE Security & Privacy, 2019 [DownloadBIB (BIB, 563 Bytes)vertical_align_bottom | DownloadPDF (PDF, 238 KB)vertical_align_bottom | external pageDOIcall_made]
- Ivan Puddu, Daniele Lain, Moritz Schneider, Elizaveta Tretiakova, Sinisa Matetic, Srdjan Capkun
TEEvil: Identity Lease via Trusted Execution Environments
in Arxiv e-print (arXiv:1903.00449)
[DownloadBIB (BIB, 281 Bytes)vertical_align_bottom | external pagePDFcall_made | external pageDOIcall_made]
- Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
in Usenix Security Symposium, 2019 [external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made]
- Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
in Usenix Security Symposium, 2019 [DownloadBIB (BIB, 472 Bytes)vertical_align_bottom | DownloadPDF (PDF, 781 KB)vertical_align_bottom | external pageDOIcall_made]
- David Sommer, Sebastian Meiser, and Esfandiar Mohammadi
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy.
in Proceedings on Privacy Enhancing Technologies 2 (PoPETS), 2019 [DownloadBIB (BIB, 487 Bytes)vertical_align_bottom | DownloadPDF (PDF, 1.9 MB)vertical_align_bottom | external pageDOIcall_made | external pageeprintcall_made]
- Mridula Singh, Patrick Leu, Srdjan Capkun
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
in Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019 [DownloadBIB (BIB, 564 Bytes)vertical_align_bottom | DownloadPDF (PDF, 951 KB)vertical_align_bottom | external pageDOIcall_made]
- Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun
PRCash: Fast, Private and Regulated Transactions for Digital Currencies
in Proceedings of the International Conference on Financial Cryptography and Data Security (FC). 2019 [DownloadBIB (BIB, 299 Bytes)vertical_align_bottom | DownloadPDF (PDF, 455 KB)vertical_align_bottom| external pageDOIcall_made]
- Karl Wüst*, Sinisa Matetic*, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun [*equally contributing authors]
ZLiTE: Zcash Lightweight Clients using Trusted Execution
in Proceedings of the International Conference on Financial Cryptography and Data Security (FC). 2019 [DownloadBIB (BIB, 348 Bytes)vertical_align_bottom | DownloadPDF (PDF, 454 KB)vertical_align_bottom| external pageDOIcall_made]
- David Sommer, Aritra Dhar, Esfandiar Mohammadi, Daniel Ronzani, and Srdjan Capkun
Deniable Upload and Download via Passive Participation
in USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston USA, 2019 [external pageBIBcall_made | DownloadPDF (PDF, 1.9 MB)vertical_align_bottom | external pageDOIcall_made]
2018
- Ghassan Karame, Srdjan Capkun
Blockchain Security and Privacy, Guest Editors' Introduction
in IEEE Security & Privacy, Volume 16, Issue 4, 2018.
[DownloadBIB (BIB, 670 Bytes)vertical_align_bottom | DownloadPDF (PDF, 1.4 MB)vertical_align_bottom | external pageDOIcall_made] - Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun
Towards Shared Ownership in the Cloud
in IEEE Transactions on Information Forensics and Security, Volume 13, Issue 12, 2018.
[DownloadBIB (PDF, 2.3 MB)vertical_align_bottom | DownloadPDF (PDF, 2.3 MB)vertical_align_bottom | external pageDOIcall_made] - Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made]
- Garvita Allabadi, Aritra Dhar, Ambreen Bashir and Rahul Purandare
METIS: Resource- and Context-Aware Monitoring of Finite State Properties
in 18th International Conference on Runtime Verification (RV 2018)
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made] - AbdelRahman Abdou, Paul C van Oorschot, Tao Wan
Comparative Analysis of Control Plane Security of SDN and Conventional Networks
in IEEE Communication Surveys and Tutorials, 2018
[DownloadBIB (BIB, 670 Bytes)vertical_align_bottom | DownloadPDF (PDF, 724 KB)vertical_align_bottom | external pageDOIcall_made]
- Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks
in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2018
[DownloadBIB (BIB, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 767 KB)vertical_align_bottom | external pageDOIcall_made]
- Der-Yeuan Yu, Elizabeth Stobert, David A. Basin, Srdjan Capkun
Exploring Website Location as a Security Indicator
in Proceedings of the NDSS Workshop on Usable Security (USEC), Internet Society, 2018
[DownloadBIB (BIB, 337 Bytes)vertical_align_bottom | DownloadPDF (PDF, 684 KB)vertical_align_bottom | external pageDOIcall_made]
- Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)
in Privacy Enhancing Technologies Symposium (PETS), 2018
[DownloadBIB (BIB, 740 Bytes)vertical_align_bottom | DownloadPDF (PDF, 4.9 MB)vertical_align_bottom | external pageDOIcall_made]
- Martin Strohmeier, Matthew Smith, Daniel Moser, Matthias Schäfer, Vincent Lenders, Ivan Martinovic
Utilizing Air Traffic Communications for OSINT on State and Government Aircraft
in NATO CCD COE 10th International Conference on Cyber Conflict (CyCon), 2018
[DownloadBIB (BIB, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 2.2 MB)vertical_align_bottom | external pageDOIcall_made]
- Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens Schmitt
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
in IEEE Symposium on Security and Privacy (S&P), 2018
[DownloadBIB (BIB, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 1.7 MB)vertical_align_bottom | external pageDOIcall_made]
- Roman Trüb, Daniel Moser, Matthias Schäfer, Rui Pinheiro, Vincent Lenders
Monitoring Meteorological Parameters With Crowdsourced Air Traffic Control Data
in ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2018
[DownloadBIB (BIB, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 1.2 MB)vertical_align_bottom | external pageDOIcall_made] - Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
DelegaTEE: Brokered Delegation using Trusted Execution Environments
in Usenix Security Symposium, 2018
[DownloadBIB (BIB, 1 KB)vertical_align_bottom | DownloadPDF (PDF, 574 KB)vertical_align_bottom | external pageDOIcall_made] - Karl Wüst, Arthur Gervais
Do you need a Blockchain?
in Crypto Valley Conference on Blockchain Technology (CVCBT), 2018
[BIB | DownloadPDF (PDF, 175 KB)vertical_align_bottom | external pageDOIcall_made]
- Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun
TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing
in Proceedings of the Network and Distributed System Security Symposium (NDSS), 2018
[DownloadBIB (BIB, 257 Bytes)vertical_align_bottom | DownloadPDF (PDF, 370 KB)vertical_align_bottom | external pageDOIcall_made]
2017
- Aritra Dhar, Der-Yeuan Yu, Srdjan Capkun
IntegriKey: End-to-End Integrity Protection of User Input
in ePrint Archive: Report 2017/1245
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made] - Mridula Singh, Patrick Leu, Srdjan Capkun
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
EPrint Archive 2017/1240 [external pagePDFcall_made] - Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
On the Security of Carrier Phase-based Ranging
in Proceedings of Cryptographic Hardware and Embedded Systems (CHES), 2017 (to appear)
Arxiv e-print (arXiv:1610.06077) [external pagePDFcall_made] - Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
μchain: How to Forget without Hard Forks
in ePrint Archive: Report 2017/106
[DownloadBIB (BIB, 340 Bytes)vertical_align_bottom | external pagePDFcall_made | external pageDOIcall_made] - Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017 [DownloadPDF (PDF, 910 KB)vertical_align_bottom]
- Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
ROTE: Rollback Protection for Trusted Execution
26th USENIX Security Symposium, August 2017 (To appear)
- Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi
Software Grand Exposure: SGX Cache Attacks Are Practical
USENIX Workshop on Offensive Technologies (WOOT'17), August 2017 [external pagePDFcall_made] - Aanjhan Ranganathan, Srdjan Capkun
Are We Really Close? Verifying Proximity in Wireless Systems
in IEEE Security & Privacy Magazine, May-June 2017 edition [DownloadPDF (PDF, 523 KB)vertical_align_bottom] - Ghassan Karame, Matthias Neugschwandtner, Melek Önen, Hubert Ritzdorf
Reconciling Security and Functional Requirements in Multi-tenant Clouds
in Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing (SCC), 2017 [DownloadPDF (PDF, 239 KB)vertical_align_bottom |external pageBibtexcall_made] - Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders and Ivan Martinovic
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
in Financial Cryptography and Data Security (FC'17), 2017 [DownloadPDF (PDF, 2.1 MB)vertical_align_bottom] - Luka Malisa, Kari Kostiainen, and Srdjan Capkun
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2017 [DownloadPDF (PDF, 3.2 MB)vertical_align_bottom | Downloadtech. report (PDF, 3.6 MB)vertical_align_bottom] - Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, and Srdjan Capkun
Using Hover to Compromise the Confidentiality of User Input on Android
Proc. ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017 [DownloadPDF (PDF, 1.5 MB)vertical_align_bottom]
2016
- Hubert Ritzdorf, Ghassan O. Karame, Claudio Soriente, Srdjan Čapkun
On Information Leakage in Deduplicated Storage Systems
in 8th ACM Cloud Computing Secruity Workshop (CCSW), 2016 [DownloadPDF (PDF, 550 KB)vertical_align_bottom | external pageDOIcall_made | DownloadBibtex (BIB, 437 Bytes)vertical_align_bottom] - Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
Quantifying Web Adblocker Privacy
EPrint Archive 2016/900 [external pagePDFcall_made] - Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun
On the Security and Performance of Proof of Work Blockchains
in ACM Conference on Computer and Communication Security (CCS), 2016 [DownloadPDF (PDF, 393 KB)vertical_align_bottom | external pageDOIcall_made] - Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
Quantifying Location Privacy Leakage from Transaction Prices
In Proceedings of the 21th European Symposium on Research in Computer Security (ESORICS), 2016 [DownloadPDF (PDF, 353 KB)vertical_align_bottom | external pageDOIcall_made] - Luka Malisa, Kari Kostiainen, Michael Och, and Srdjan Capkun
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
21st European Symposium on Research in Computer Security (ESORICS), 2016 [DownloadPDF (PDF, 569 KB)vertical_align_bottom | external pageDOIcall_made | Downloadbibtex (BIB, 889 Bytes)vertical_align_bottom] - Aanjhan Ranganathan, Hildur Olafsdottir and Srdjan Capkun
SPREE: Spoofing Resistant GPS Receiver
22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [DownloadPDF (PDF, 1.1 MB)vertical_align_bottom | external pageDOIcall_made] - Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente and Srdjan Capkun
SALVE: Server Authentication with Location VErification
22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [external pagePDFcall_made | external pageDOIcall_made] - Daniel Moser, Patrick Leu, Vincent Lenders, Aanjhan Ranganathan, Fabio Ricciato and Srdjan Capkun
Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures
22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [DownloadPDF (PDF, 756 KB)vertical_align_bottom | external pageDOIcall_made] - Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa and Srdjan Capkun
Verena: End-to-End Integrity Protection for Web Applications
37th IEEE Symposium on Security and Privacy (S&P), 2016 [DownloadPDF (PDF, 526 KB)vertical_align_bottom | external pageDOIcall_made | Downloadbibtex (BIB, 330 Bytes)vertical_align_bottom | external pagevideocall_made] - Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun
Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications
SIGCHI Conference on Human Factors in Computing Systems (CHI), 2016 [DownloadPDF (PDF, 2.2 MB)vertical_align_bottom | external pageDOIcall_made | Downloadbibtex (BIB, 409 Bytes)vertical_align_bottom] - Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun
Physical-Layer Integrity for Wireless Messages
Computer Networks (COMNET), 2016 [DownloadPDF (PDF, 464 KB)vertical_align_bottom | external pageDOIcall_made]
2015
- Julien Bringer, Beatriz Gallego, Ghassan Karame, Mathias Kohler, Panos Louridas, Melek Önen, Hubert Ritzdorf, Alessandro Sorniotti, David Vallejo
TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud
E-Democracy – Citizen Rights in the World of the New Computing Paradigms, 2015 [external pageDOIcall_made | Downloadbibtex (BIB, 764 Bytes)vertical_align_bottom]
- Luka Malisa, Kari Kostiainen, Srdjan Capkun
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
IACR Cryptology ePrint Archive, 2015 [external pageURLcall_made]
- Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
W-SPS: Designing a Wide-Area Secure Positioning System
IACR Cryptology ePrint Archive, 2015 [external pageURLcall_made]
- Claudio Marforio; Ramya Jayaram Masti; Claudio Soriente; Kari Kostiainen; Srdjan Capkun
Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms
CoRR 2015 [external pageURLcall_made]
- Wade Trappe,Lalitha Sankar Sankar, Radha Poovendran, Heejo Lee, Srdjan Capkun
Introduction to the Issue on Signal and Information Processing for Privacy
IEEE Journal of Selected Topics in Signal Processing, 2015 [external pageDOIcall_made]
- Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun
Logical Partitions on Many-core Platforms
31st Annual Computer Security Applications Conference (ACSAC), 2015 (to appear) [DownloadPDF (PDF, 272 KB)vertical_align_bottom] - Aanjhan Ranganathan, Boris Danev and Srdjan Capkun
Proximity Verification for Contactless Access Control and Authentication Systems
31st Annual Computer Security Applications Conference (ACSAC), 2015 [DownloadPDF (PDF, 5.1 MB)vertical_align_bottom] - Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
Tampering with the Delivery of Blocks and Transactions in Bitcoin
ACM Conference on Computer and Communication Security (CCS), 2015 [external pagePreprintcall_made] - Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
Quantifying Location Privacy Leakage from Transaction Prices
Cryptology ePrint Archive: Report 2015/496 [external pagePapercall_made] - Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele and Srdjan Capkun
Thermal Covert Channels on Multi-core Platforms
24rd USENIX Security Symposium, 2015
arXiv:1503.07000, 2015 [DownloadPDF (PDF, 2.1 MB)vertical_align_bottom] - Nikolaos Karapanos, Claudio Marforio, Claudio Soriente and Srdjan Capkun
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
24th USENIX Security Symposium, 2015 [DownloadPDF (PDF, 1.7 MB)vertical_align_bottom | Downloadbibtex (BIB, 517 Bytes)vertical_align_bottom | external pagevideocall_made | external pagedemo videocall_made | external pageproject websitecall_made]
arXiv:1503.03790, 2015 [external pagePDFcall_made] - Claudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun
Commune: Shared Ownership in an Agnostic Cloud
20th ACM Symposium on Access Control Models and Technologies, SACMAT 2015 [DownloadPDF (PDF, 458 KB)vertical_align_bottom | Downloadbibtex (BIB, 691 Bytes)vertical_align_bottom] - Justine Sherry, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy
BlindBox: Deep Packet Inspection for Encrypted Traffic
SIGCOMM 2015 [PDF | bibtex | external pageDOIcall_made]
- Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser
Machine Learning Classification Over Encrypted Data
NDSS 2015 [external pagePDFcall_made | external pageURLcall_made]
- Nils Ole Tippenhauer, Heinrich Luecken, Marc Kuhn and Srdjan Capkun
UWB Rapid-Bit-Exchange System for Distance Bounding
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015 [DownloadPDFvertical_align_bottom]
- Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais,
Srdjan Capkun
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
in ACM Transactions on Information and System Security (TISSEC), 2015 [DownloadPDF (PDF, 703 KB)vertical_align_bottom]
2014
- N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, and Christian Wachsmann.
Mobile Trusted Computing.
Proceedings of the IEEE, 2014. - Arthur Gervais, Ghassan Karame, Damian Gruber, Srdjan Capkun
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), 2014 [DownloadPaper (PDF, 379 KB)vertical_align_bottom | DownloadBibTeX (BIB, 330 Bytes)vertical_align_bottom | DownloadSlides (PDF, 3.9 MB)vertical_align_bottom] - Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Čapkun
Assisted Deletion of Related Content
In Proceedings of 30th Annual Computer Security Applications Conference (ACSAC), 2014 [DownloadPaper (PDF, 375 KB)vertical_align_bottom | DownloadBibTeX (BIB, 507 Bytes)vertical_align_bottom | DownloadSlides (PDF, 2.8 MB)vertical_align_bottom | external pageDOIcall_made] - Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun and Vincent Lenders
Quantifying Web-Search Privacy
in Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2014 [DownloadPaper (PDF, 466 KB)vertical_align_bottom | DownloadBibTeX (BIB, 342 Bytes)vertical_align_bottom | DownloadSlides (PDF, 8.6 MB)vertical_align_bottom] - Naveed Ahmed, Christina Poepper and Srdjan Capkun
Enabling Short Fragments for Uncoordinated Spread Spectrum Communication
In Proceedings of 19th European Symposium on Research in Computer Security (ESORICS), 2014 [DownloadPDF (PDF, 637 KB)vertical_align_bottom] - Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun and David Basin.
Detection of GPS Spoofing Attacks in Power Grids (short paper)
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014 [DownloadPDF (PDF, 256 KB)vertical_align_bottom | Downloadbibtex (BIB, 374 Bytes)vertical_align_bottom] - Nikolaos Karapanos and Srdjan Capkun
On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
In Proceedings of the 23rd USENIX Security Symposium, 2014 [DownloadPDF (PDF, 849 KB)vertical_align_bottom | Downloadbibtex (BIB, 485 Bytes)vertical_align_bottom | external pagevideocall_made] - Elli Androulaki, Claudio Soriente, Luka Malisa and Srdjan Capkun
Enforcing Location and Time-based Access Control on Cloud-stored Data
34th IEEE International Conference on Distributed Computing Systems (ICDCS), 2014 [DownloadPDFvertical_align_bottom | Downloadbibtexvertical_align_bottom] - Arthur Gervais, Ghassan O. Karame, Srdjan Capkun, Vedran Capkun
Is Bitcoin a Decentralized Currency?
IEEE Security and Privacy Magazine, 2014
[Preliminary version DownloadPDF (PDF, 154 KB)vertical_align_bottom | DownloadBibTeX (BIB, 232 Bytes)vertical_align_bottom] - Joel Reardon, David Basin, Srdjan Capkun
On Secure Data Deletion
IEEE Security and Privacy Magazine, 2014 - Ghassan O. Karame, Aurélien Francillon, Victor Budilivschi, Srdjan Capkun, Vedran Capkun
Microcomputations as Micropayments in Web-based Services
In ACM Transactions on Internet Technology (TOIT), 2014 (to appear) - Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun
Smartphones as Practical and Secure Location Verification Tokens for Payments
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014 [DownloadPDF (PDF, 865 KB)vertical_align_bottom | Downloadbibtex (BIB, 455 Bytes)vertical_align_bottom] - Jan-Erik Ekberg, Kari Kostiainen and N. Asokan.
The Untapped Potential of Trusted Execution Environments on Mobile Devices
IEEE Security & Privacy Magazine , 2014.
[Preliminary version DownloadPDF (PDF, 628 KB)vertical_align_bottom]
2013
- N. Asokan, Lucas Davi, Alexandra Dmitrienko, Kari Kostiainen, Elena Reshetova and Ahmad-Reza Sadeghi.
Mobile Platform Security
Synthesis Lectures on Information Security, Privacy and Trust (Morgan & Claypool), 2013. [external pageLinkcall_made] - Ramya Jayaram Masti, Claudio Marforio and Srdjan Capkun
An Architecture for Concurrent Execution of Secure Environments in Clouds
In Proceedings of the 2013 ACM Cloud Computing Security Workshop (CCSW), 2013, [DownloadPDF (PDF, 325 KB)vertical_align_bottom | Downloadbibtex (BIB, 2 KB)vertical_align_bottom] - Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun
Secure Enrollment and Practical Migration for Mobile Trusted Execution Environments
In Proceedings of the third ACM workshop on Security and privacy in smartphones and mobile devices (SPSM), 2013 [DownloadPDF (PDF, 230 KB)vertical_align_bottom | Downloadbibtex (BIB, 464 Bytes)vertical_align_bottom] - Joel Reardon, Hubert Ritzdorf, David Basin and Srdjan Capkun
Secure Data Deletion from Persistent Media
in Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2013 [DownloadPDF (PDF, 246 KB)vertical_align_bottom | Downloadbibtex (BIB, 485 Bytes)vertical_align_bottom | Downloadslides (PDF, 276 KB)vertical_align_bottom] - Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun
On Limitations of Friendly Jamming for Confidentiality
in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2013 [DownloadPDF (PDF, 1.4 MB)vertical_align_bottom] - Joel Reardon, Srdjan Capkun, David Basin
SoK: Secure Data Deletion
in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2013 [DownloadPDF (PDF, 163 KB)vertical_align_bottom | Downloadslides (PDF, 222 KB)vertical_align_bottom] - Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer and Srdjan Capkun
Evaluating User Privacy in Bitcoin
In Proceedings of the International Conference on Financial Cryptography and Data Security (FC), 2013 [Downloadbibtex (RTF, 767 Bytes)vertical_align_bottom] - Davide Zanetti, Ari Juels, Srdjan Capkun
Tailing RFID Tags for Clone Detection
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013 [DownloadPDF (PDF, 504 KB)vertical_align_bottom | Downloadbibtex (BIB, 246 Bytes)vertical_align_bottom] - Iulia Ion, Filipe Beato, Srdjan Capkun, Bart Preneel, and Marc Langheinrich
For Some Eyes Only: Protecting Online Information Sharing
In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2013 [Downloadbibtex (RTF, 1019 Bytes)vertical_align_bottom] - Ghassan Karame, Boris Danev, Cyrill Bannwart, Srdjan Capkun
On the Security of End-to-End Measurements based on Packet-Pair Dispersions
In IEEE Transactions on Information Forensics & Security (TIFS), 2013 [Downloadbibtex (RTF, 734 Bytes)vertical_align_bottom]
2012
- Boris Danev, Davide Zanetti, Srdjan Capkun
On Physical-layer Identification of Wireless Devices
In ACM Computing Surveys, 2012 [DownloadPDF (PDF, 378 KB)vertical_align_bottom | Downloadbibtex (BIB, 281 Bytes)vertical_align_bottom] - David Basin, Srdjan Capkun
Column: The Research Value of Publishing Attacks
Communications of the ACM, November 2012, Vol. 55 No. 11, Pages 22-24 - Elli Androulaki, Ghassan O. Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun
Evaluating User Privacy in Bitcoin
Technical report: Cryptology ePrint Archive Report 2012/596, 2012 [DownloadPDF (PDF, 940 KB)vertical_align_bottom] - Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, and Srdjan Capkun
Analysis of the Communication between Colluding Applications on Modern Smartphones
In Proceedings of 28th Annual Computer Security Applications Conference (ACSAC), 2012 [DownloadPDF (PDF, 286 KB)vertical_align_bottom | Downloadbibtex (BIB, 451 Bytes)vertical_align_bottom] - Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, and Srdjan Capkun
Enabling Trusted Scheduling in Embedded Systems
In Proceedings of 28th Annual Computer Security Applications Conference (ACSAC), 2012 [DownloadPDF (PDF, 404 KB)vertical_align_bottom] - Ghassan O. Karame, Elli Androulaki, Srdjan Capkun
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2012
Related technical report: Cryptology ePrint Archive Report 2012/248, 2012 [DownloadPDF (PDF, 529 KB)vertical_align_bottom] - Davide Zanetti, Vincent Lenders and Srdjan Capkun
Exploring the Physical-layer Identification of GSM Devices
Technical Report 763, ETH Zurich, Institute of Information Security, June 2012 [DownloadPDF (PDF, 837 KB)vertical_align_bottom | Downloadbibtex (BIB, 339 Bytes)vertical_align_bottom] - Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelee and Srdjan Capkun
Design and Implementation of a Terrorist-Fraud Resilient Distance Bounding System
In Proceedings of 17th European Symposium on Research in Computer Security (ESORICS), 2012 [DownloadPDF (PDF, 2.4 MB)vertical_align_bottom] - Joel Reardon, Srdjan Capkun, David Basin
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
In Proceedings of the 21st USENIX Security Symposium, 2012 [DownloadPDF (PDF, 404 KB)vertical_align_bottom | Downloadslides (PDF, 7.5 MB)vertical_align_bottom | external pagevideocall_made] - Joel Reardon, Claudio Marforio, Srdjan Capkun, David Basin
Secure Deletion on Log-structured File Systems
In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012 [DownloadPDF (PDF, 629 KB)vertical_align_bottom | Downloadslides (PDF, 1.2 MB)vertical_align_bottom] - Related Schweizer Fernsehen: external pageEinstein show 9.6.2011call_made
On-line Report and Secure Deletion Application Download: SHREDroid: Secure Deletion for Android - Aanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun
Physical-Layer Attacks on Chirp-based Ranging Systems
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2012 [DownloadPDF (PDF, 1.3 MB)vertical_align_bottom] - Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun
Distance Hijacking Attacks on Distance Bounding Protocols
in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2012 - Boris Danev, Srdjan Capkun, Ramya Jayaram Masti, Thomas S. Benjamin
Towards Practical Identification of HF RFID Devices
in ACM Transactions on Information and System Security (TISSEC) - Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun
Distance Hijacking Attacks on Distance Bounding Protocols (invited paper)
Abstract to appear In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012
Related technical report: Cryptology ePrint Archive: Report 2011/129, 2011 [DownloadPDF (PDF, 638 KB)vertical_align_bottom]
2011
- Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun
Enabling Secure VM-vTPM Migration in Private Clouds
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2011 [DownloadPDF (PDF, 430 KB)vertical_align_bottom | Downloadbibtex (BIB, 298 Bytes)vertical_align_bottom] - Ghassan Karame, Srdjan Capkun, Ueli Maurer
Privacy-Preserving Outsourcing of Brute-Force Key Searches
In Proceedings of the ACM Cloud Computing Security Workshop (CCSW); in conjunction with ACM CCS, 2011 [DownloadPDF (PDF, 474 KB)vertical_align_bottom | Downloadbibtex (BIB, 300 Bytes)vertical_align_bottom] - Claude Castelluccia, Emiliano De Cristofaro, Aurélien Francillon, Mohamed Ali Kaafar
EphPub: Toward Robust Ephemeral Publishing
In Proceedings of the IEEE International Conference on Network Protocols (ICNP), 2011 [external pagesoftwarecall_made] - Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
On the Requirements for Successful GPS Spoofing Attacks
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011 [DownloadPDF (PDF, 1.2 MB)vertical_align_bottom | Downloadbibtex (BIB, 328 Bytes)vertical_align_bottom] - Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, Srdjan Capkun
Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage
In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), 2011 - Joel Reardon, Claudio Marforio, Srdjan Capkun, David Basin
Secure Deletion on Log-structured File Systems
arXiv Technical Report arXiv:1106.0917 [DownloadPDF (PDF, 580 KB)vertical_align_bottom]
Related Schweizer Fernsehen: external pageEinstein show 9.6.2011call_made
On-line Report and Secure Deletion Application Download: external pageSHREDroid: Secure Deletion for Androidcall_made - Claudio Marforio, Aurélien Francillon, Srdjan Capkun
Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems
Technical Report 724, ETH Zürich, System Security Group, April 2011. [DownloadPDF (PDF, 446 KB)vertical_align_bottom | Downloadbibtex (BIB, 338 Bytes)vertical_align_bottom] - Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
Investigation of Signal and Message Manipulations on the Wireless Channel
In Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2011 [DownloadPDF (PDF, 454 KB)vertical_align_bottom | Downloadbibtex (BIB, 326 Bytes)vertical_align_bottom] - Patrick Schaller, Benedikt Schmidt, David Basin, Srdjan Capkun
Formal Reasoning about Physical Properties of Security Protocols
in ACM Transactions on Information and System Security (TISSEC), 2011 - Davide Zanetti, Pascal Sachs, Srdjan Capkun
On The Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?
In Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), 2011 [DownloadPDF (PDF, 455 KB)vertical_align_bottom | Downloadbibtex (BIB, 270 Bytes)vertical_align_bottom] - Srdjan Capkun, Karim El Defrawy, Gene Tsudik
Group Distance Bounding Protocols (short paper)
In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST), 2011
Related technical report: [DownloadPDF (PDF, 1.1 MB)vertical_align_bottom] - Ghassan Karame, Aurelien Francillon, Srdjan Capkun
Pay as you Browse: Microcomputations as Micropayments in Web-based Services
In Proceedings of the International World Wide Web Conference (WWW), 2011 [DownloadPDF (PDF, 1.3 MB)vertical_align_bottom | Downloadbibtex (BIB, 297 Bytes)vertical_align_bottom]. - Aurelien Francillon, Boris Danev, Srdjan Capkun
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2011
Preceding technical report: Cryptology ePrint Archive: Report 2010/332, 2010 [DownloadPDF (PDF, 1 MB)vertical_align_bottom | Downloadbibtex (BIB, 296 Bytes)vertical_align_bottom]
2010
- Daniel Bodmer, Srdjan Capkun
On the Security and Privacy in Cochlear Implants
ETH Zurich, D-INFK, Technical Report No. 677, 2010 [DownloadPDF (PDF, 57 KB)vertical_align_bottom | Downloadbibtex (BIB, 287 Bytes)vertical_align_bottom] - Christina Pöpper, David Basin, Srdjan Capkun, Cas Cremers
Keeping Data Secret under Full Compromise using Porter Devices
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2010 [DownloadPDF (PDF, 307 KB)vertical_align_bottom | Downloadbibtex (BIB, 526 Bytes)vertical_align_bottom] - Ghassan Karame, Srdjan Capkun and Ueli Maurer
Privacy-Preserving Outsourcing of Brute-Force Key Searches
ETH Zurich, D-INFK, Technical Report No. 662, 2010. - Davide Zanetti, Boris Danev, Srdjan Capkun
Physical-layer Identification of UHF RFID Tags
In Proceedings of the ACM MobiCom (Annual International Conference on Mobile Computing and Networking), 2010 (to appear) [DownloadPDF (PDF, 665 KB)vertical_align_bottom | Downloadbibtex (BIB, 362 Bytes)vertical_align_bottom | Downloadposter* (PDF, 788 KB)vertical_align_bottom]
* Poster presented at the USENIX Security Symposium, 2010. - Ghassan Karame, Srdjan Capkun
Low-Cost Client Puzzles based on Modular Exponentiation
In Proceedings of ESORICS (European Symposium on Research in Computer Security), 2010 [DownloadPDF (PDF, 261 KB)vertical_align_bottom | Downloadbibtex (BIB, 270 Bytes)vertical_align_bottom] - Kasper Bonne Rasmussen, Srdjan Capkun
Realization of RF Distance Bounding
In Proceedings of the USENIX Security Symposium, 2010 [DownloadPDF (PDF, 946 KB)vertical_align_bottom | Downloadbibtex (BIB, 228 Bytes)vertical_align_bottom] - Iulia Ion, Marc Langheinrich, Ponnurangam Kumaraguru, Srdjan Capkun
Influence of User Perception, Security Needs, and Social Factors on Device Pairing Method Choices
In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), 2010 [DownloadPDF (PDF, 1.5 MB)vertical_align_bottom | Downloadbibtex (BIB, 346 Bytes)vertical_align_bottom] - Srdjan Capkun, Mario Cagalj, Ghassan Karame, Nils Ole Tippenhauer
Integrity Regions: Authentication Through Presence in Wireless Networks
IEEE Transactions on Mobile Computing (TMC), 2010 [Downloadbibtex (BIB, 314 Bytes)vertical_align_bottom] - Marc Kuhn, Heinrich Luecken, Nils Ole Tippenhauer,
UWB Impulse Radio Based Distance Bounding
In Proceedings of WPNC (Workshop on Positioning, Navigation and Communication), 2010 [DownloadPDF (PDF, 5 KB)vertical_align_bottom | Downloadbibtex (BIB, 5 KB)vertical_align_bottom] - Mario Strasser, Boris Danev, Srdjan Capkun
Detection of Reactive Jamming in Sensor Networks
In ACM Transactions on Sensor Networks (TOSN), 2010 [DownloadPDF (PDF, 726 KB)vertical_align_bottom | Downloadbibtex (BIB, 390 Bytes)vertical_align_bottom] - Davide Zanetti, Leo Fellmann, Srdjan Capkun
Privacy-preserving Clone Detection for RFID-enabled Supply Chains
IEEE International Conference on RFID, 2010 [DownloadPDF (PDF, 250 KB)vertical_align_bottom | Downloadbibtex (BIB, 290 Bytes)vertical_align_bottom] - Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim El Defrawy
Attacks on Physical-layer Identification
In Proceedings of ACM Conference on Wireless Network Security (WiSec), 2010 [DownloadPDF (PDF, 225 KB)vertical_align_bottom | Downloadbibtex (BIB, 367 Bytes)vertical_align_bottom] - Christina Pöpper, Mario Strasser, Srdjan Capkun
Anti-jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques
IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Mission Critical Networking, 2010 [DownloadPDF (PDF, 418 KB)vertical_align_bottom | Downloadbibtex (BIB, 363 Bytes)vertical_align_bottom]
2009
- Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun
Secure Ranging With Message Temporal Integrity
Cryptology ePrint Archive: Report 2009/602, 2009 [DownloadPDF (PDF, 526 KB)vertical_align_bottom | Downloadbibtex (BIB, 255 Bytes)vertical_align_bottom] - Ghassan Karame, Mario Strasser, Srdjan Capkun
Secure Remote Execution of Sequential Computations
In Proceedings of ICICS (International Conference on Information and Communications Security), 2009 . [DownloadPDF (PDF, 238 KB)vertical_align_bottom | Downloadbibtex (BIB, 363 Bytes)vertical_align_bottom] - Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun
Proximity-based Access Control for Implantable Medical Devices
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2009 [DownloadPDF (PDF, 470 KB)vertical_align_bottom | Downloadbibtex (BIB, 399 Bytes)vertical_align_bottom]
Related media reports: external pageMIT Technology Review: Proximity-based Access Control for Implantable Medical Devicescall_made - Ghassan Karame, David Gubler and Srdjan Capkun
On the Security of Bottleneck Bandwidth Estimation Techniques
In Proceedings of SecureComm (International Conference on Security and Privacy in Communication Networks), 2009. [DownloadPDF (PDF, 916 KB)vertical_align_bottom | Downloadbibtex (BIB, 384 Bytes)vertical_align_bottom] - Ghassan Karame and Srdjan Capkun
Towards Secure End-to-End Network Measurements
ETH Zurich, D-INFK, Technical Report No. 628, June 2009. [DownloadPDF (PDF, 137 KB)vertical_align_bottom | Downloadbibtex (BIB, 298 Bytes)vertical_align_bottom] - Nils Ole Tippenhauer, Srdjan Capkun
ID-based Secure Distance Bounding and Localization
In Proceedings of ESORICS (European Symposium on Research in Computer Security), 2009 [DownloadPDF (PDF, 559 KB)vertical_align_bottom | Downloadbibtex (BIB, 5 KB)vertical_align_bottom] - David Basin, Srdjan Capkun, Patrick Schaller and Benedikt Schmidt
Let's get physical: models and methods for real-world security protocols
In Proceedings of the 22nd TPHols (International Conference on Theorem Proving in Higher Order Logics), 2009 (invited paper) [DownloadPDF (PDF, 332 KB)vertical_align_bottom | Downloadbibtex (BIB, 352 Bytes)vertical_align_bottom] - Ghassan Karame, Mario Cagalj, Srdjan Capkun
Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads
In Proceedings of the IEEE NCA (International Symposium on Network Computing and Applications), 2009. [DownloadPDF (PDF, 193 KB)vertical_align_bottom | Downloadbibtex (BIB, 378 Bytes)vertical_align_bottom] - Christina Pöpper, Mario Strasser, Srdjan Capkun
Jamming-resistant Broadcast Communication without Shared Keys
In Proceedings of the USENIX Security Symposium, 2009 [DownloadPDF (PDF, 625 KB)vertical_align_bottom | Downloadbibtex (BIB, 271 Bytes)vertical_align_bottom] - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun
Physical-layer Identification of RFID Devices
In Proceedings of the USENIX Security Symposium, 2009 [DownloadPDF (PDF, 913 KB)vertical_align_bottom | Downloadbibtex (BIB, 362 Bytes)vertical_align_bottom] - Patrick Schaller, Benedikt Schmidt, David Basin, Srdjan Capkun
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
In Proceedings of the IEEE Computer Security Foundations Symposium (CSF), 2009 [DownloadPDF (PDF, 277 KB)vertical_align_bottom | Downloadbibtex (BIB, 356 Bytes)vertical_align_bottom] - Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun
Attacks on Public WLAN-based Positioning Systems
In Proceedings of the ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009 [DownloadPDF (PDF, 1.7 MB)vertical_align_bottom | Downloadbibtex (BIB, 348 Bytes)vertical_align_bottom | Downloadtalk video (FLV, 128 MB)vertical_align_bottom]
Technical report and Related media reports: external pageLocation Spoofing Attacks on the iPhone and iPodcall_made - Mario Strasser, Christina Pöpper, Srdjan Capkun
Efficient Uncoordinated FHSS Anti-jamming Communication
In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2009 [DownloadPDF (PDF, 368 KB)vertical_align_bottom | Downloadbibtex (BIB, 328 Bytes)vertical_align_bottom] - Boris Danev, Srdjan Capkun
Transient-based Identification of Wireless Sensor Nodes
In Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2009 [DownloadPDF (PDF, 446 KB)vertical_align_bottom | Downloadbibtex (BIB, 363 Bytes)vertical_align_bottom]
2008
- Kasper Bonne Rasmussen, Srdjan Capkun
Location Privacy of Distance Bounding Protocols
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2008. [DownloadPDF (PDF, 309 KB)vertical_align_bottom] - Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava
Secure Time Synchronization in Sensor Networks
in ACM Transactions on Information and System Security (TISSEC), July 2008 [DownloadPDF (PDF, 479 KB)vertical_align_bottomDownload(BIB, 306 Bytes) (BIB, 306 Bytes)vertical_align_bottom] - Shouhuai Xu, Srdjan Capkun
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
in ACM Transactions on Information and System Security (TISSEC), 2008. [DownloadPDF (PDF, 391 KB)vertical_align_bottom | Downloadbibtex (BIB, 306 Bytes)vertical_align_bottom] - Zanetti Davide, Srdjan Capkun
Protecting Sensitive Business Information While Sharing Serial-Level Data,
International Workshop on Security and Privacy in Enterprise Computing (InSPEC), IEEE EDOC, 2008.
- Nils Ole Tippenhauer, Srdjan Capkun
UWB-based Secure Ranging and Localization
Technical Report 586, ETH Zürich, System Security Group, January 2008. [DownloadPDF (PDF, 248 KB)vertical_align_bottom | Downloadbibtex (BIB, 234 Bytes)vertical_align_bottom] - Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
in Proceedings of IEEE Symposium on Security and Privacy (S&P), 2008 [DownloadPDF (PDF, 353 KB)vertical_align_bottom] - Srdjan Capkun, Mario Cagalj, Ramkumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani Srivastava
Integrity Codes: Message Integrity Protection and Authentication Over Insecure Channels
in IEEE Transactions on Dependable and Secure Computing (TDSC), 2008 [DownloadPDF (PDF, 265 KB)vertical_align_bottom] - Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, Srdjan Capkun, Jean-Pierre Hubaux
Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking
in IEEE Communications Magazine, February 2008 [DownloadPDF (PDF, 279 KB)vertical_align_bottom] - Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj and Mani Srivastava
Secure Location Verification With Hidden and Mobile Base Stations
in IEEE Transactions on Mobile Computing (TMC), April 2008 [DownloadPDF (PDF, 1.9 MB)vertical_align_bottom]
2007
- Kasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj
SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks (extended abstract),
in Proceedings of ACM MobiCom 2007 [DownloadPDF (PDF, 664 KB)vertical_align_bottom]
(related Technical Report 546, ETH Zürich, IFW, February 7, 2007. [DownloadPDF (PDF, 1.2 MB)vertical_align_bottom] - Kasper Bonne Rasmussen, Srdjan Capkun
Implications of Radio Fingerprinting on the Security of Sensor Networks,
in Proceedings of IEEE SecureComm, 2007 [DownloadPDF (PDF, 262 KB)vertical_align_bottom] - Patrick Schaller, Srdjan Capkun, David Basin
BAP: Broadcast Authentication Using Cryptographic Puzzles
in Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS) [DownloadPDF (PDF, 288 KB)vertical_align_bottom] - Mario Cagalj, Srdjan Capkun and Jean-Pierre Hubaux
Wormhole-Based Antijamming Techniques in Sensor Networks,
in IEEE Transactions on Mobile Computing (TMC), January 2007. [DownloadPDF (PDF, 1.7 MB)vertical_align_bottom] - Security and Privacy in Ad-hoc and Sensor Networks
4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings
Series: Lecture Notes in Computer Science , Vol. 4572
Stajano, F.; Meadows, C.; Capkun, S.; Moore, T. (Eds.)
2007, X, 247 p., Softcover
ISBN: 978-3-540-73274-7 - Book chapters in Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks,
Poovendran, Wang, Roy (ed.), Advances in Information Security series, Vol. 30, Springer, 2007, ISBN 978-0-387-32721-1 [Downloadbook contents (PDF, 40 KB)vertical_align_bottom]
2006
- Srdjan Capkun, Saurabh Ganeriwal, Farooq Anjum and Mani Srivastava,
Secure RSS-based Localization in Sensor Networks,
Technical Reports 529, ETH Zürich, 09 2006. [DownloadPDF (PDF, 151 KB)vertical_align_bottom] - Srdjan Capkun and Mario Cagalj
Integrity Regions: Authentication Through Presence in Wireless Networks
ACM Workshop on Wireless Security (WiSe) 2006 [DownloadPDF (PDF, 174 KB)vertical_align_bottom]
pre-ETH Zürich
2006
- Mario Cagalj, Srdjan Capkun, RamKumar Rengaswamy, Ilias Tsigkogiannis, Mani Srivastava and Jean-Pierre Hubaux,
Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels,
in Proceeding of the IEEE Symposium on Security and Privacy (S&P), 2006. [DownloadPDF (PDF, 260 KB)vertical_align_bottom] - S.Capkun, M. Cagalj, M. Srivastava,
Securing Localization With Hidden and Mobile Base Stations,
in Proceedings of IEEE INFOCOM 2006 [DownloadPDF (PDF, 249 KB)vertical_align_bottom] - S. Capkun, J. P. Hubaux, L. Buttyan,
Mobility Helps Peer-to-Peer Security,
IEEE Transactions on Mobile Computing (TMC), January 2006 [DownloadPDF (PDF, 300 KB)vertical_align_bottom] - M. Cagalj, S. Capkun, J. P. Hubaux,
Key agreement in peer-to-peer wireless networks,
Proceedings of the IEEE (Special Issue on Cryptography and Security), 2006. [DownloadPDF (PDF, 456 KB)vertical_align_bottom] - S. Capkun, J. P. Hubaux,
Secure positioning in wireless networks,
IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Security in Wireless Ad Hoc Networks, February 2006. [DownloadPDF (PDF, 639 KB)vertical_align_bottom]
2005
- S.Sedihpour, S.Capkun, S.Ganeriwal and M.Srivastava,
Implementation of Attacks on Ultrasonic Ranging Systems, demo,
ACM SENSYS 2005. Demo description [DownloadPDF (PDF, 61 KB)vertical_align_bottom], Poster [DownloadPDF (PDF, 89 KB)vertical_align_bottom] - S. Ganeriwal, S. Capkun, S. Han, M. Srivastava,
Secure Time Synchronization Service for Sensor Networks,
in Proceedings of Wireless Security Workshop (WISE) 2005. [DownloadPDF (PDF, 271 KB)vertical_align_bottom] - S.Capkun, J.P. Hubaux,
Secure positioning of wireless devices with application to sensor networks,
in Proceedings of IEEE INFOCOM 2005 [DownloadPDF (PDF, 541 KB)vertical_align_bottom]
(first appeared as "Secure Positioning in Sensor Networks", Technical report, EPFL/IC/200444, May 2004) - L. Lazos, R. Poovendran, S. Capkun
ROPE: Robust Position Estimation in Wireless Sensor Networks,
in Proceedings of IPSN 2005 [DownloadPDF (PDF, 954 KB)vertical_align_bottom]
2004
- M. Felegyhazi, S. Capkun, J. P. Hubaux,
SOWER: Self-Organizing Wireless Network for Messaging,
In Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) 2004. [DownloadPDF (PDF, 406 KB)vertical_align_bottom] - J. P. Hubaux, S. Capkun, J.Luo,
The Security and Privacy of Smart Vehicles,
IEEE Security & Privacy (May-June 2004). [DownloadPDF (PDF, 569 KB)vertical_align_bottom] - L. Buttyán, J. P. Hubaux and S. Capkun,
A Formal Analysis of Syverson`s Rational Exchange Protocol,
Journal of Computer Security (2004). [DownloadPDF (PDF, 219 KB)vertical_align_bottom] - Srdjan Capkun, Jean-Pierre Hubaux, Markus Jakobsson,
Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks,
Technical report. – 2004 [200410] [LCA-REPORT-2004-015] [DownloadPDF (PDF, 218 KB)vertical_align_bottom]
2003
- S. Capkun, J. P. Hubaux and L. Buttyán,
Mobility Helps Security in Ad Hoc Networks,
In Proceedings of the 4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2003). [DownloadPDF (PDF, 203 KB)vertical_align_bottom] - S. Capkun, L. Buttyán and J. P. Hubaux,
SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 2003. [DownloadPDF (PDF, 164 KB)vertical_align_bottom] - S. Capkun and J. P. Hubaux,
BISS: Building Secure Routing out of an Incomplete Set of Security Associations, In Proceedings of the Wireless Security Workshop (WISE) 2003, San Diego, September 2003 [DownloadPDF (PDF, 175 KB)vertical_align_bottom] - S. Capkun, L. Buttyan, J. P. Hubaux,
Self-Organized Public-Key Management for Mobile Ad-Hoc Networks,
IEEE Transactions on Mobile Computing (January-March 2003). [DownloadPDF (PDF, 2.1 MB)vertical_align_bottom] - S. Capkun, L. Buttyan and J-P. Hubaux,
Self-Organized Public-Key Management for Mobile Ad-Hoc Networks - Abstract,
in Report on a Working Session on Security in Wireless Ad Hoc Networks, L. Buttyan and J.-P. Hubaux (eds.), ACM Mobile Computing and Communications Review (MC2R), Vol. 7, No. 1, 2003. [DownloadPDF (PDF, 401 KB)vertical_align_bottom]
2002
- L. Buttyán, J. P. Hubaux and S. Capkun,
A Formal Analysis of Syverson`s Rational Exchange Protocol,
In Proceedings of IEEE Computer Security Foundations Workshop (CSFW), Cape Breton, Nova Scotia, Canada, June 2002, pp. [DownloadPDF (PDF, 179 KB)vertical_align_bottom] - S. Capkun, L. Buttyan, J. P. Hubaux,
Self-Organized Public-Key Management for Mobile Ad-Hoc Networks,
Poster in Wireless Security Workshop (WISE), Atlanta 2002. - S. Capkun, L. Buttyán and J. P. Hubaux,
Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph, In Proceedings of ACM New Security Paradigms Workshop (NSPW), September 2002. [DownloadPDF (PDF, 1.2 MB)vertical_align_bottom] - S. Capkun, M. Hamdi, J. P. Hubaux,
GPS-free Positioning in Mobile Ad-Hoc Networks,
Cluster Computing Journal, April 2002. [DownloadPDF (PDF, 422 KB)vertical_align_bottom]
2001
- J.-P. Hubaux, L. Buttyán, and S. Capkun,
The Quest for Security in Mobile Ad Hoc Networks,
In Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2001), Long Beach, CA, USA, 4-5. October 2001. [DownloadPDF (PDF, 205 KB)vertical_align_bottom] - S. Capkun, M. Hamdi and J. P. Hubaux,
GPS-free Positioning in Mobile Ad-Hoc Networks,
In Proceedings of 34'th HICSS, January 2001. (best paper award) [DownloadPDF (PDF, 197 KB)vertical_align_bottom] - Lj. Blazevic, L.Buttyan, S. Capkun, S. Giordano, J. P. Hubaux, J. Y. Le Boudec
Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes, IEEE Communications Magazine, June 2001. [DownloadPDF (PDF, 1022 KB)vertical_align_bottom]