Publications

The provided PDFs are typically preprint versions. The final publications are available through the publisher online archives.

2024

 

 

2023

  • Claudio Anliker, Giovanni Camurati, Srdjan Čapkun
    Time for Change: How Clocks Break UWB Secure Ranging,
    in Usenix Security, 2023 [external pagePDF] (to appear)
  • Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, Srdjan Capkun
    EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems
    in Network and Distributed System Security Symposium (NDSS) 2023 (to appear)

  • Giovanni Camurati, Matteo Dell'Amico, François-Xavier Standaert
    MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
    in IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES) 2023
    [external pagePDF | external pageDOI | external pageCODE]
  • Giovanni Camurati, Aurélien Francillon
    Screaming Channels
    in Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg.
    [external pageDOI]

2022

2021

2020

2019

2018

2017

  • Aritra Dhar, Der-Yeuan Yu, Srdjan Capkun
    IntegriKey: End-to-End Integrity Protection of User Input
    in ePrint Archive: Report 2017/1245
    [external pageBIB | external pagePDF | external pageDOI]
  • Mridula Singh, Patrick Leu, Srdjan Capkun
    UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks
    EPrint Archive 2017/1240 [external pagePDF]
  • Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
    On the Security of Carrier Phase-based Ranging
    in Proceedings of Cryptographic Hardware and Embedded Systems (CHES), 2017 (to appear)
    Arxiv e-print (arXiv:1610.06077) [external pagePDF]
  • Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun
    μchain: How to Forget without Hard Forks
    in ePrint Archive: Report 2017/106
    [DownloadBIB (BIB, 340 Bytes) | external pagePDF | external pageDOI]
  • Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
    Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
    Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017 [DownloadPDF (PDF, 910 KB)]
  • Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
    ROTE: Rollback Protection for Trusted Execution
    26th USENIX Security Symposium, August 2017 (To appear)
  • Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi
    Software Grand Exposure: SGX Cache Attacks Are Practical
    USENIX Workshop on Offensive Technologies (WOOT'17), August 2017 [external pagePDF]
  • Aanjhan Ranganathan, Srdjan Capkun
    Are We Really Close? Verifying Proximity in Wireless Systems  
    in IEEE Security & Privacy Magazine, May-June 2017 edition [DownloadPDF (PDF, 523 KB)]
  • Ghassan Karame, Matthias Neugschwandtner, Melek Önen, Hubert Ritzdorf
    Reconciling Security and Functional Requirements in Multi-tenant Clouds     
    in Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing (SCC), 2017 [DownloadPDF (PDF, 239 KB) |external pageBibtex]
  • Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders and Ivan Martinovic
    Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
    in Financial Cryptography and Data Security (FC'17), 2017 [DownloadPDF (PDF, 2.1 MB)]
  • Luka Malisa, Kari Kostiainen, and Srdjan Capkun
    Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
    6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2017 [DownloadPDF (PDF, 3.2 MB) | Downloadtech. report (PDF, 3.6 MB)]
  • Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, and Srdjan Capkun
    Using Hover to Compromise the Confidentiality of User Input on Android
    Proc. ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017 [DownloadPDF (PDF, 1.5 MB)]

 

2016

2015

2014

2013

2012

2011

2010

2009

2008

2007

  • Kasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj
    SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks (extended abstract),
    in Proceedings of ACM MobiCom 2007 [DownloadPDF (PDF, 664 KB)]
    (related Technical Report 546, ETH Zürich, IFW, February 7, 2007. [DownloadPDF (PDF, 1.2 MB)]
  • Kasper Bonne Rasmussen, Srdjan Capkun
    Implications of Radio Fingerprinting on the Security of Sensor Networks,
    in Proceedings of IEEE SecureComm, 2007 [DownloadPDF (PDF, 262 KB)]
  • Patrick Schaller, Srdjan Capkun, David Basin
    BAP: Broadcast Authentication Using Cryptographic Puzzles
    in Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS) [DownloadPDF (PDF, 288 KB)]
  • Mario Cagalj, Srdjan Capkun and Jean-Pierre Hubaux
    Wormhole-Based Antijamming Techniques in Sensor Networks
    ,
    in IEEE Transactions on Mobile Computing (TMC), January 2007. [DownloadPDF (PDF, 1.7 MB)]
  • Security and Privacy in Ad-hoc and Sensor Networks
    4th European Workshop, ESAS 2007
    , Cambridge, UK, July 2-3, 2007, Proceedings
    Series: Lecture Notes in Computer Science , Vol. 4572
    Stajano, F.; Meadows, C.; Capkun, S.; Moore, T. (Eds.)
    2007, X, 247 p., Softcover
    ISBN: 978-3-540-73274-7
  • Book chapters in Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks,
    Poovendran, Wang, Roy (ed.), Advances in Information Security series, Vol. 30, Springer, 2007, ISBN 978-0-387-32721-1 [Downloadbook contents (PDF, 40 KB)]

2006

pre-ETH Zürich

2006

  • Mario Cagalj, Srdjan Capkun, RamKumar Rengaswamy, Ilias Tsigkogiannis, Mani Srivastava and Jean-Pierre Hubaux,
    Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels,
    in Proceeding of the IEEE Symposium on Security and Privacy (S&P), 2006. [DownloadPDF (PDF, 260 KB)]
  • S.Capkun, M. Cagalj, M. Srivastava,
    Securing Localization With Hidden and Mobile Base Stations,
    in Proceedings of IEEE INFOCOM 2006 [DownloadPDF (PDF, 249 KB)]
  • S. Capkun, J. P. Hubaux, L. Buttyan, 
    Mobility Helps Peer-to-Peer Security
    IEEE Transactions on Mobile Computing (TMC), January 2006 [DownloadPDF (PDF, 300 KB)]
  • M. Cagalj, S. Capkun, J. P. Hubaux,
    Key agreement in peer-to-peer wireless networks
    Proceedings of the IEEE (Special Issue on Cryptography and Security), 2006. [DownloadPDF (PDF, 456 KB)]
  • S. Capkun,  J. P. Hubaux,
    Secure positioning in wireless networks
    IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Security in Wireless Ad Hoc Networks, February 2006. [DownloadPDF (PDF, 639 KB)]

2005

2004

2003

  • S. Capkun, J. P. Hubaux and L. Buttyán,
    Mobility Helps Security in Ad Hoc Networks,
    In Proceedings of the 4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2003). [DownloadPDF (PDF, 203 KB)]
  • S. Capkun, L. Buttyán and  J. P. Hubaux,
    SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 2003.  [DownloadPDF (PDF, 164 KB)]
  • S. Capkun and J. P. Hubaux,
    BISS: Building Secure Routing out of an Incomplete Set of  Security Associations, In Proceedings of the Wireless Security Workshop (WISE) 2003, San Diego, September 2003  [DownloadPDF (PDF, 175 KB)]
  • S. Capkun, L. Buttyan, J. P. Hubaux,
    Self-Organized Public-Key Management for Mobile Ad-Hoc Networks,
    IEEE Transactions on Mobile Computing (January-March 2003). [DownloadPDF (PDF, 2.1 MB)]
  • S. Capkun, L. Buttyan and J-P. Hubaux,
    Self-Organized Public-Key Management for Mobile Ad-Hoc Networks - Abstract,
    in Report on a Working Session on Security in Wireless Ad Hoc Networks, L. Buttyan and J.-P. Hubaux (eds.), ACM Mobile Computing and Communications Review (MC2R), Vol. 7, No. 1, 2003. [DownloadPDF (PDF, 401 KB)]

2002

  • L. Buttyán, J. P. Hubaux and S. Capkun,
    A Formal Analysis of Syverson`s Rational Exchange Protocol,
    In Proceedings of IEEE Computer Security Foundations Workshop (CSFW), Cape Breton, Nova Scotia, Canada, June 2002, pp. [DownloadPDF (PDF, 179 KB)]
  • S. Capkun, L. Buttyan, J. P. Hubaux,
    Self-Organized Public-Key Management for Mobile Ad-Hoc Networks,
    Poster in Wireless Security Workshop (WISE), Atlanta 2002.
  • S. Capkun, L. Buttyán and  J. P. Hubaux,
    Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph, In Proceedings of ACM New Security Paradigms Workshop (NSPW), September 2002.  [DownloadPDF (PDF, 1.2 MB)]
  • S. Capkun, M. Hamdi, J. P. Hubaux,
    GPS-free Positioning in Mobile Ad-Hoc Networks,
    Cluster Computing Journal, April 2002. [DownloadPDF (PDF, 422 KB)]

2001

  • J.-P. Hubaux, L. Buttyán, and S. Capkun,
    The Quest for Security in Mobile Ad Hoc Networks,
    In Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2001), Long Beach, CA, USA, 4-5. October 2001. [DownloadPDF (PDF, 205 KB)]
  • S. Capkun, M. Hamdi and J. P. Hubaux,
    GPS-free Positioning in Mobile Ad-Hoc Networks,
    In Proceedings of 34'th HICSS, January 2001. (best paper award)  [DownloadPDF (PDF, 197 KB)]
  • Lj. Blazevic, L.Buttyan, S. Capkun, S. Giordano, J. P. Hubaux, J. Y. Le Boudec
    Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes, IEEE Communications Magazine, June 2001. [DownloadPDF (PDF, 1022 KB)]
JavaScript has been disabled in your browser