Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kasper Bonne Rasmussen
@article{DBLP:journals/taes/RogersR24, author = {Matthew Rogers and Kasper Rasmussen}, title = {Targeted Detection for Attacks on the {MIL-STD-1553} Bus}, journal = {{IEEE} Trans. Aerosp. Electron. Syst.}, volume = {60}, number = {1}, pages = {548--557}, year = {2024}, url = {https://doi.org/10.1109/TAES.2023.3325423}, doi = {10.1109/TAES.2023.3325423}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/taes/RogersR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GedenR23, author = {Munir Geden and Kasper Rasmussen}, title = {RegGuard: Leveraging {CPU} registers for mitigation of control- and data-oriented attacks}, journal = {Comput. Secur.}, volume = {129}, pages = {103213}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103213}, doi = {10.1016/J.COSE.2023.103213}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GedenR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/GedenR23, author = {Munir Geden and Kasper Rasmussen}, title = {Hardware-assisted remote attestation design for critical embedded systems}, journal = {{IET} Inf. Secur.}, volume = {17}, number = {3}, pages = {518--533}, year = {2023}, url = {https://doi.org/10.1049/ise2.12113}, doi = {10.1049/ISE2.12113}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/GedenR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/StojilovicRRTT23, author = {Mirjana Stojilovic and Kasper Rasmussen and Francesco Regazzoni and Mehdi B. Tahoori and Russell Tessier}, title = {A Visionary Look at the Security of Reconfigurable Cloud Computing}, journal = {Proc. {IEEE}}, volume = {111}, number = {12}, pages = {1548--1571}, year = {2023}, url = {https://doi.org/10.1109/JPROC.2023.3330729}, doi = {10.1109/JPROC.2023.3330729}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pieee/StojilovicRRTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RogersWHR23, author = {Matthew Rogers and Phillip Weigand and Jassim Happa and Kasper Rasmussen}, title = {Detecting {CAN} Attacks on {J1939} and {NMEA} 2000 Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2406--2420}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3182481}, doi = {10.1109/TDSC.2022.3182481}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RogersWHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ImandaR23, author = {Hayyu Imanda and Kasper Rasmussen}, title = {Nakula: Coercion Resistant Data Storage against Time-Limited Adversary}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {4:1--4:11}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3600175}, doi = {10.1145/3600160.3600175}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ImandaR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TengR23, author = {Wil Liam Teng and Kasper Rasmussen}, title = {Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine Communication}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {7:1--7:11}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3600165}, doi = {10.1145/3600160.3600165}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/TengR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ZhangR23, author = {Youqian Zhang and Kasper Rasmussen}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Electromagnetic Signal Injection Attacks on Differential Signaling}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {314--325}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3590326}, doi = {10.1145/3579856.3590326}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ZhangR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/RogersR23, author = {Matthew Rogers and Kasper Rasmussen}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {481--493}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3582810}, doi = {10.1145/3579856.3582810}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/RogersR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-03237, author = {Hayyu Imanda and Kasper Rasmussen}, title = {Ask for Alice: Online Covert Distress Signal in the Presence of a Strong Adversary}, journal = {CoRR}, volume = {abs/2310.03237}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.03237}, doi = {10.48550/ARXIV.2310.03237}, eprinttype = {arXiv}, eprint = {2310.03237}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-03237.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-19634, author = {Angeliki Aktypi and Kasper Rasmussen}, title = {Iris: Dynamic Privacy Preserving Search in Structured Peer-to-Peer Networks}, journal = {CoRR}, volume = {abs/2310.19634}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.19634}, doi = {10.48550/ARXIV.2310.19634}, eprinttype = {arXiv}, eprint = {2310.19634}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-19634.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/GiechaskielRE22, author = {Ilias Giechaskiel and Kasper Rasmussen and Ken Eguro}, title = {Long-Wire Leakage: The Threat of Crosstalk}, journal = {{IEEE} Des. Test}, volume = {39}, number = {4}, pages = {41--48}, year = {2022}, url = {https://doi.org/10.1109/MDAT.2022.3142199}, doi = {10.1109/MDAT.2022.3142199}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/GiechaskielRE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AktypiKVR22, author = {Angeliki Aktypi and Dimitris Karnikis and Nikos Vasilakis and Kasper Rasmussen}, title = {Themis: {A} Secure Decentralized Framework for Microservice Interaction in Serverless Computing}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {10:1--10:11}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3538983}, doi = {10.1145/3538969.3538983}, timestamp = {Fri, 19 Aug 2022 09:45:12 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AktypiKVR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/AntonioliTRP22, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen and Mathias Payer}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {196--207}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3523258}, doi = {10.1145/3488932.3523258}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/AntonioliTRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangR22, author = {Youqian Zhang and Kasper Rasmussen}, title = {Detection of Electromagnetic Signal Injection Attacks on Actuator Systems}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {171--184}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545949}, doi = {10.1145/3545948.3545949}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-06362, author = {Matthew Rogers and Kasper Rasmussen}, title = {Silently Disabling ECUs and Enabling Blind Attacks on the {CAN} Bus}, journal = {CoRR}, volume = {abs/2201.06362}, year = {2022}, url = {https://arxiv.org/abs/2201.06362}, eprinttype = {arXiv}, eprint = {2201.06362}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-06362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-07102, author = {Youqian Zhang and Kasper Rasmussen}, title = {Detection of Electromagnetic Signal Injection Attacks on Actuator Systems}, journal = {CoRR}, volume = {abs/2203.07102}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.07102}, doi = {10.48550/ARXIV.2203.07102}, eprinttype = {arXiv}, eprint = {2203.07102}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-07102.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-10052, author = {Thomas Burton and Kasper Rasmussen}, title = {Orientation Estimation using Wireless Device Radiation Patterns}, journal = {CoRR}, volume = {abs/2203.10052}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.10052}, doi = {10.48550/ARXIV.2203.10052}, eprinttype = {arXiv}, eprint = {2203.10052}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-10052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-00343, author = {Youqian Zhang and Kasper Rasmussen}, title = {Electromagnetic Signal Injection Attacks on Differential Signaling}, journal = {CoRR}, volume = {abs/2208.00343}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.00343}, doi = {10.48550/ARXIV.2208.00343}, eprinttype = {arXiv}, eprint = {2208.00343}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-00343.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/GiechaskielER21, author = {Ilias Giechaskiel and Ken Eguro and Kasper Rasmussen}, title = {Extended Abstract: Covert Channels and Data Exfiltration From FPGAs}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2021, Grenoble, France, February 1-5, 2021}, pages = {1638}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/DATE51398.2021.9474115}, doi = {10.23919/DATE51398.2021.9474115}, timestamp = {Wed, 21 Jul 2021 10:04:34 +0200}, biburl = {https://dblp.org/rec/conf/date/GiechaskielER21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BurtonR21, author = {Thomas Burton and Kasper Rasmussen}, title = {Private Data Exfiltration from Cyber-Physical Systems Using Channel State Information}, booktitle = {{WPES} '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, Virtual Event, Korea, 15 November 2021}, pages = {223--235}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3463676.3485606}, doi = {10.1145/3463676.3485606}, timestamp = {Thu, 03 Nov 2022 11:11:48 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BurtonR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-10769, author = {Munir Geden and Kasper Rasmussen}, title = {RegGuard: Leveraging {CPU} Registers for Mitigation of Control- and Data-Oriented Attacks}, journal = {CoRR}, volume = {abs/2110.10769}, year = {2021}, url = {https://arxiv.org/abs/2110.10769}, eprinttype = {arXiv}, eprint = {2110.10769}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-10769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KalkanR20, author = {K{\"{u}}bra Kalkan and Kasper Bonne Rasmussen}, title = {TruSD: Trust framework for service discovery among IoT devices}, journal = {Comput. Networks}, volume = {178}, pages = {107318}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107318}, doi = {10.1016/J.COMNET.2020.107318}, timestamp = {Fri, 25 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/KalkanR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/GiechaskielR20, author = {Ilias Giechaskiel and Kasper Rasmussen}, title = {Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {1}, pages = {645--670}, year = {2020}, url = {https://doi.org/10.1109/COMST.2019.2952858}, doi = {10.1109/COMST.2019.2952858}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/GiechaskielR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AntonioliTR20, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen}, title = {Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {3}, pages = {14:1--14:28}, year = {2020}, url = {https://doi.org/10.1145/3394497}, doi = {10.1145/3394497}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AntonioliTR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AktypiKR20, author = {Angeliki Aktypi and K{\"{u}}bra Kalkan and Kasper Bonne Rasmussen}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured {P2P} Network}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {271--282}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3375739}, doi = {10.1145/3374664.3375739}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AktypiKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/Tian0GRS20, author = {Shanquan Tian and Wenjie Xiong and Ilias Giechaskiel and Kasper Rasmussen and Jakub Szefer}, editor = {Stephen Neuendorffer and Lesley Shannon}, title = {Fingerprinting Cloud {FPGA} Infrastructures}, booktitle = {{FPGA} '20: The 2020 {ACM/SIGDA} International Symposium on Field-Programmable Gate Arrays, Seaside, CA, USA, February 23-25, 2020}, pages = {58--64}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3373087.3375322}, doi = {10.1145/3373087.3375322}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpga/Tian0GRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangR20, author = {Youqian Zhang and Kasper Rasmussen}, title = {Detection of Electromagnetic Interference Attacks on Sensor Systems}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {203--216}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00001}, doi = {10.1109/SP40000.2020.00001}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhangR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AntonioliTR20, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen}, title = {{BIAS:} Bluetooth Impersonation AttackS}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {549--562}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00093}, doi = {10.1109/SP40000.2020.00093}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AntonioliTR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GiechaskielRS20, author = {Ilias Giechaskiel and Kasper Bonne Rasmussen and Jakub Szefer}, title = {C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1728--1741}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00070}, doi = {10.1109/SP40000.2020.00070}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GiechaskielRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GedenR20, author = {Munir Geden and Kasper Rasmussen}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {{TRUVIN:} Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {174--181}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00035}, doi = {10.1109/TRUSTCOM50675.2020.00035}, timestamp = {Fri, 30 Apr 2021 12:35:40 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GedenR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-11776, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen and Mathias Payer}, title = {BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy}, journal = {CoRR}, volume = {abs/2009.11776}, year = {2020}, url = {https://arxiv.org/abs/2009.11776}, eprinttype = {arXiv}, eprint = {2009.11776}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-11776.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AvoineBBCHKKLMM19, author = {Gildas Avoine and Muhammed Ali Bing{\"{o}}l and Ioana Boureanu and Srdjan Capkun and Gerhard P. Hancke and S{\"{u}}leyman Kardas and Chong Hee Kim and C{\'{e}}dric Lauradoux and Benjamin Martin and Jorge Munilla and Alberto Peinado and Kasper Bonne Rasmussen and Dave Singel{\'{e}}e and Aslan Tchamkerten and Rolando Trujillo{-}Rasua and Serge Vaudenay}, title = {Security of Distance-Bounding: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {51}, number = {5}, pages = {94:1--94:33}, year = {2019}, url = {https://doi.org/10.1145/3264628}, doi = {10.1145/3264628}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/AvoineBBCHKKLMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SluganovicRRM18, author = {Ivo Sluganovic and Marc Roeschlin and Kasper Bonne Rasmussen and Ivan Martinovic}, title = {Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {4:1--4:30}, year = {2019}, url = {https://doi.org/10.1145/3281745}, doi = {10.1145/3281745}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SluganovicRRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/GiechaskielER19, author = {Ilias Giechaskiel and Ken Eguro and Kasper Bonne Rasmussen}, title = {Leakier Wires: Exploiting {FPGA} Long Wires for Covert- and Side-channel Attacks}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {12}, number = {3}, pages = {11:1--11:29}, year = {2019}, url = {https://doi.org/10.1145/3322483}, doi = {10.1145/3322483}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/GiechaskielER19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EberzLRLM19, author = {Simon Eberz and Giulio Lovisotto and Kasper Bonne Rasmussen and Vincent Lenders and Ivan Martinovic}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1187--1199}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354233}, doi = {10.1145/3319535.3354233}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EberzLRLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GiechaskielZR19, author = {Ilias Giechaskiel and Youqian Zhang and Kasper Bonne Rasmussen}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {A Framework for Evaluating Security in the Presence of Signal Injection Attacks}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {512--532}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_25}, doi = {10.1007/978-3-030-29959-0\_25}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GiechaskielZR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/GiechaskielRS19, author = {Ilias Giechaskiel and Kasper Bonne Rasmussen and Jakub Szefer}, editor = {Ioannis Sourdis and Christos{-}Savvas Bouganis and Carlos {\'{A}}lvarez and Leonel Antonio Toledo D{\'{\i}}az and Pedro Valero{-}Lara and Xavier Martorell}, title = {Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs}, booktitle = {29th International Conference on Field Programmable Logic and Applications, {FPL} 2019, Barcelona, Spain, September 8-12, 2019}, pages = {45--50}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/FPL.2019.00017}, doi = {10.1109/FPL.2019.00017}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/GiechaskielRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/GiechaskielRS19, author = {Ilias Giechaskiel and Kasper Rasmussen and Jakub Szefer}, title = {Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs}, booktitle = {37th {IEEE} International Conference on Computer Design, {ICCD} 2019, Abu Dhabi, United Arab Emirates, November 17-20, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCD46524.2019.00010}, doi = {10.1109/ICCD46524.2019.00010}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccd/GiechaskielRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AntonioliTR19, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Bonne Rasmussen}, title = {Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/nearby-threats-reversing-analyzing-and-attacking-googles-nearby-connections-on-android/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AntonioliTR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/GedenR19, author = {Munir Geden and Kasper Rasmussen}, title = {Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--10}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949036}, doi = {10.1109/PST47121.2019.8949036}, timestamp = {Mon, 13 Jan 2020 18:37:30 +0100}, biburl = {https://dblp.org/rec/conf/pst/GedenR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AntonioliTR19, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Bonne Rasmussen}, editor = {Nadia Heninger and Patrick Traynor}, title = {The {KNOB} is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth {BR/EDR}}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1047--1061}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/AntonioliTR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-03675, author = {Ilias Giechaskiel and Youqian Zhang and Kasper Bonne Rasmussen}, title = {A Framework for Evaluating Security in the Presence of Signal Injection Attacks}, journal = {CoRR}, volume = {abs/1901.03675}, year = {2019}, url = {http://arxiv.org/abs/1901.03675}, eprinttype = {arXiv}, eprint = {1901.03675}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-03675.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-06935, author = {Ilias Giechaskiel and Kasper Bonne Rasmussen}, title = {SoK: Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses}, journal = {CoRR}, volume = {abs/1901.06935}, year = {2019}, url = {http://arxiv.org/abs/1901.06935}, eprinttype = {arXiv}, eprint = {1901.06935}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-06935.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AntonioliTR19, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen}, title = {Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {933}, year = {2019}, url = {https://eprint.iacr.org/2019/933}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AntonioliTR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlashwaliR19, author = {Eman Salem Alashwali and Kasper Rasmussen}, title = {What's in a Downgrade? {A} Taxonomy of Downgrade Attacks in the {TLS} Protocol and Application Protocols Using {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1083}, year = {2019}, url = {https://eprint.iacr.org/2019/1083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlashwaliR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlashwaliR19a, author = {Eman Salem Alashwali and Kasper Rasmussen}, title = {On the Feasibility of Fine-Grained {TLS} Security Configurations in Web Browsers Based on the Requested Domain Name}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1099}, year = {2019}, url = {https://eprint.iacr.org/2019/1099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlashwaliR19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GiechaskielCR18, author = {Ilias Giechaskiel and Cas Cremers and Kasper Bonne Rasmussen}, title = {When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {46--56}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111253}, doi = {10.1109/MSP.2018.3111253}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GiechaskielCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GiechaskielRE18, author = {Ilias Giechaskiel and Kasper Bonne Rasmussen and Ken Eguro}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Leaky Wires: Information Leakage and Covert Communication Between {FPGA} Long Wires}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {15--27}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196518}, doi = {10.1145/3196494.3196518}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GiechaskielRE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RoeschlinMR18, author = {Marc Roeschlin and Ivan Martinovic and Kasper Bonne Rasmussen}, title = {Device Pairing at the Touch of an Electrode}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03B-4\_Roeschlin\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/RoeschlinMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/RasmussenG18, author = {Kasper Bonne Rasmussen and Paolo Gasti}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514181}, doi = {10.1109/PST.2018.8514181}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/RasmussenG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AlashwaliR18, author = {Eman Salem Alashwali and Kasper Rasmussen}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {On the Feasibility of Fine-Grained {TLS} Security Configurations in Web Browsers Based on the Requested Domain Name}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, pages = {213--228}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0\_12}, doi = {10.1007/978-3-030-01704-0\_12}, timestamp = {Fri, 11 Jan 2019 16:16:24 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/AlashwaliR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AlashwaliR18a, author = {Eman Salem Alashwali and Kasper Rasmussen}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {What's in a Downgrade? {A} Taxonomy of Downgrade Attacks in the {TLS} Protocol and Application Protocols Using {TLS}}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, pages = {468--487}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0\_27}, doi = {10.1007/978-3-030-01704-0\_27}, timestamp = {Fri, 11 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/AlashwaliR18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/RoeschlinVRM18, author = {Marc Roeschlin and Christian Vaas and Kasper Bonne Rasmussen and Ivan Martinovic}, title = {Bionyms: Driver-centric Message Authentication using Biometric Measurements}, booktitle = {2018 {IEEE} Vehicular Networking Conference, {VNC} 2018, Taipei, Taiwan, December 5-7, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VNC.2018.8628359}, doi = {10.1109/VNC.2018.8628359}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/vnc/RoeschlinVRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-05681, author = {Eman Salem Alashwali and Kasper Rasmussen}, title = {What's in a Downgrade? {A} Taxonomy of Downgrade Attacks in the {TLS} Protocol and Application Protocols Using {TLS}}, journal = {CoRR}, volume = {abs/1809.05681}, year = {2018}, url = {http://arxiv.org/abs/1809.05681}, eprinttype = {arXiv}, eprint = {1809.05681}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-05681.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-05686, author = {Eman Salem Alashwali and Kasper Rasmussen}, title = {On the Feasibility of Fine-Grained {TLS} Security Configurations in Web Browsers Based on the Requested Domain Name}, journal = {CoRR}, volume = {abs/1809.05686}, year = {2018}, url = {http://arxiv.org/abs/1809.05686}, eprinttype = {arXiv}, eprint = {1809.05686}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-05686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MartinovicRRT17, author = {Ivan Martinovic and Kasper Bonne Rasmussen and Marc Roeschlin and Gene Tsudik}, title = {Authentication using pulse-response biometrics}, journal = {Commun. {ACM}}, volume = {60}, number = {2}, pages = {108--115}, year = {2017}, url = {https://doi.org/10.1145/3023359}, doi = {10.1145/3023359}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MartinovicRRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MartinovicRRT17, author = {Ivan Martinovic and Kasper Bonne Rasmussen and Marc Roeschlin and Gene Tsudik}, title = {Pulse-Response: Exploring Human Body Impedance for Biometric Recognition}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {2}, pages = {6:1--6:31}, year = {2017}, url = {https://doi.org/10.1145/3064645}, doi = {10.1145/3064645}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MartinovicRRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EberzRLM17, author = {Simon Eberz and Kasper Bonne Rasmussen and Vincent Lenders and Ivan Martinovic}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {386--399}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053032}, doi = {10.1145/3052973.3053032}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EberzRLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TippenhauerRC16, author = {Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Physical-layer integrity for wireless messages}, journal = {Comput. Networks}, volume = {109}, pages = {31--38}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.021}, doi = {10.1016/J.COMNET.2016.06.021}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TippenhauerRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/EberzRLM16, author = {Simon Eberz and Kasper Bonne Rasmussen and Vincent Lenders and Ivan Martinovic}, title = {Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics}, journal = {{ACM} Trans. Priv. Secur.}, volume = {19}, number = {1}, pages = {1:1--1:31}, year = {2016}, url = {https://doi.org/10.1145/2904018}, doi = {10.1145/2904018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/EberzRLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SluganovicRRM16, author = {Ivo Sluganovic and Marc Roeschlin and Kasper Bonne Rasmussen and Ivan Martinovic}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Using Reflexive Eye Movements for Fast Challenge-Response Authentication}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1056--1067}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978311}, doi = {10.1145/2976749.2978311}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SluganovicRRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/BrasserRST16, author = {Ferdinand Brasser and Kasper Bonne Rasmussen and Ahmad{-}Reza Sadeghi and Gene Tsudik}, title = {Remote attestation for low-end embedded devices: the prover's perspective}, booktitle = {Proceedings of the 53rd Annual Design Automation Conference, {DAC} 2016, Austin, TX, USA, June 5-9, 2016}, pages = {91:1--91:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897937.2898083}, doi = {10.1145/2897937.2898083}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/BrasserRST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GiechaskielCR16, author = {Ilias Giechaskiel and Cas Cremers and Kasper Bonne Rasmussen}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {On Bitcoin Security in the Presence of Broken Cryptographic Primitives}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, pages = {201--222}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3\_11}, doi = {10.1007/978-3-319-45741-3\_11}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GiechaskielCR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/JavaliRRHJ16, author = {Chitra Javali and Girish Revadigar and Kasper Bonne Rasmussen and Wen Hu and Sanjay Jha}, title = {I Am Alice, {I} Was in Wonderland: Secure Location Proof Generation and Verification Protocol}, booktitle = {41st {IEEE} Conference on Local Computer Networks, {LCN} 2016, Dubai, United Arab Emirates, November 7-10, 2016}, pages = {477--485}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/LCN.2016.126}, doi = {10.1109/LCN.2016.126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/JavaliRRHJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/RoeschlinSMTR16, author = {Marc Roeschlin and Ivo Sluganovic and Ivan Martinovic and Gene Tsudik and Kasper Bonne Rasmussen}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Sabrina De Capitani di Vimercati}, title = {Generating Secret Keys from Biometric Body Impedance Measurements}, booktitle = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016}, pages = {59--69}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994626}, timestamp = {Tue, 06 Nov 2018 16:59:07 +0100}, biburl = {https://dblp.org/rec/conf/wpes/RoeschlinSMTR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiechaskielCR16, author = {Ilias Giechaskiel and Cas Cremers and Kasper Bonne Rasmussen}, title = {On Bitcoin Security in the Presence of Broken Crypto Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2016}, url = {http://eprint.iacr.org/2016/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiechaskielCR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bodynets/RevadigarJARJ15, author = {Girish Revadigar and Chitra Javali and Hassan Jameel Asghar and Kasper Bonne Rasmussen and Sanjay Jha}, editor = {Eryk Dutkiewicz and Ren Ping Liu and Honggang Wang and Qi Zhang and Giancarlo Fortino and Ladislau Matekovits and Matti H{\"{a}}m{\"{a}}l{\"{a}}inen and Wei Ni}, title = {Mobility Independent Secret Key Generation for Wearable Health-care Devices}, booktitle = {10th {EAI} International Conference on Body Area Networks, {BODYNETS} 2015, Sydney, Australia, September 28-30, 2015}, publisher = {{ICST}}, year = {2015}, url = {https://doi.org/10.4108/eai.28-9-2015.2261446}, doi = {10.4108/EAI.28-9-2015.2261446}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bodynets/RevadigarJARJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RevadigarJARJ15, author = {Girish Revadigar and Chitra Javali and Hassan Jameel Asghar and Kasper Bonne Rasmussen and Sanjay Jha}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {669}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714644}, doi = {10.1145/2714576.2714644}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RevadigarJARJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/SimpsonMCFMR15, author = {Andrew C. Simpson and Andrew P. Martin and Cas Cremers and Ivan Flechais and Ivan Martinovic and Kasper Bonne Rasmussen}, editor = {Antonia Bertolino and Gerardo Canfora and Sebastian G. Elbaum}, title = {Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security}, booktitle = {37th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 2}, pages = {435--444}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICSE.2015.176}, doi = {10.1109/ICSE.2015.176}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/SimpsonMCFMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/EberzRLM15, author = {Simon Eberz and Kasper Bonne Rasmussen and Vincent Lenders and Ivan Martinovic}, title = {Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/preventing-lunchtime-attacks-fighting-insider-threats-eye-movement-biometrics}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/EberzRLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GastiR15, author = {Paolo Gasti and Kasper Bonne Rasmussen}, editor = {Indrajit Ray and Nicholas Hopper and Rob Jansen}, title = {Privacy-preserving User Matching}, booktitle = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {111--120}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808138.2808148}, doi = {10.1145/2808138.2808148}, timestamp = {Tue, 06 Nov 2018 16:59:07 +0100}, biburl = {https://dblp.org/rec/conf/wpes/GastiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/FrancillonNRT14, author = {Aur{\'{e}}lien Francillon and Quan Nguyen and Kasper Bonne Rasmussen and Gene Tsudik}, editor = {Gerhard P. Fettweis and Wolfgang Nebel}, title = {A minimalist approach to Remote Attestation}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2014, Dresden, Germany, March 24-28, 2014}, pages = {1--6}, publisher = {European Design and Automation Association}, year = {2014}, url = {https://doi.org/10.7873/DATE.2014.257}, doi = {10.7873/DATE.2014.257}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/FrancillonNRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RasmussenRMT14, author = {Kasper Bonne Rasmussen and Marc Roeschlin and Ivan Martinovic and Gene Tsudik}, title = {Authentication Using Pulse-Response Biometrics}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/authentication-using-pulse-response-biometrics}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RasmussenRMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BeatoCR14, author = {Filipe Beato and Emiliano De Cristofaro and Kasper Bonne Rasmussen}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Undetectable communication: The Online Social Networks case}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {19--26}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890919}, doi = {10.1109/PST.2014.6890919}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/BeatoCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GastiR12, author = {Paolo Gasti and Kasper Bonne Rasmussen}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {On the Security of Password Manager Database Formats}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {770--787}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_44}, doi = {10.1007/978-3-642-33167-1\_44}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GastiR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CremersRC12, author = {Cas Cremers and Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Distance Hijacking Attacks on Distance Bounding Protocols}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/distance-hijacking-attacks-distance-bounding-protocols}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/CremersRC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CremersRSC12, author = {Cas Cremers and Kasper Bonne Rasmussen and Benedikt Schmidt and Srdjan Capkun}, title = {Distance Hijacking Attacks on Distance Bounding Protocols}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {113--127}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.17}, doi = {10.1109/SP.2012.17}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/CremersRSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancillonNRT12, author = {Aur{\'{e}}lien Francillon and Quan Nguyen and Kasper Bonne Rasmussen and Gene Tsudik}, title = {Systematic Treatment of Remote Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {713}, year = {2012}, url = {http://eprint.iacr.org/2012/713}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrancillonNRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TippenhauerPRC11, author = {Nils Ole Tippenhauer and Christina P{\"{o}}pper and Kasper Bonne Rasmussen and Srdjan Capkun}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {On the requirements for successful {GPS} spoofing attacks}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {75--86}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046719}, doi = {10.1145/2046707.2046719}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TippenhauerPRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CremersRC11, author = {Cas Cremers and Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Distance Hijacking Attacks on Distance Bounding Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2011}, url = {http://eprint.iacr.org/2011/129}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CremersRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/networks/StidsenPSZR10, author = {Thomas R. Stidsen and Bj{\o}rn Petersen and Simon Spoorendonk and Martin Zachariasen and Kasper Bonne Rasmussen}, title = {Optimal routing with failure-independent path protection}, journal = {Networks}, volume = {55}, number = {2}, pages = {125--137}, year = {2010}, url = {https://doi.org/10.1002/net.20323}, doi = {10.1002/NET.20323}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/networks/StidsenPSZR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RasmussenC10, author = {Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Realization of {RF} Distance Bounding}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {389--402}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Rasmussen.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RasmussenC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RasmussenCHC09, author = {Kasper Bonne Rasmussen and Claude Castelluccia and Thomas S. Heydt{-}Benjamin and Srdjan Capkun}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Proximity-based access control for implantable medical devices}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {410--419}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653712}, doi = {10.1145/1653662.1653712}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RasmussenCHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/TippenhauerRPC09, author = {Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Christina P{\"{o}}pper and Srdjan Capkun}, editor = {Krzysztof Zielinski and Adam Wolisz and Jason Flinn and Anthony LaMarca}, title = {Attacks on public WLAN-based positioning systems}, booktitle = {Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Krak{\'{o}}w, Poland, June 22-25, 2009}, pages = {29--40}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1555816.1555820}, doi = {10.1145/1555816.1555820}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/TippenhauerRPC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TippenhauerRC09, author = {Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Secure Ranging With Message Temporal Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2009}, url = {http://eprint.iacr.org/2009/602}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TippenhauerRC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/CapkunRCS08, author = {Srdjan Capkun and Kasper Bonne Rasmussen and Mario Cagalj and Mani B. Srivastava}, title = {Secure Location Verification with Hidden and Mobile Base Stations}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {7}, number = {4}, pages = {470--483}, year = {2008}, url = {https://doi.org/10.1109/TMC.2007.70782}, doi = {10.1109/TMC.2007.70782}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/CapkunRCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RasmussenC08, author = {Kasper Bonne Rasmussen and Srdjan Capkun}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Location privacy of distance bounding protocols}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {149--160}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455791}, doi = {10.1145/1455770.1455791}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RasmussenC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/RasmussenCC07, author = {Kasper Bonne Rasmussen and Srdjan Capkun and Mario Cagalj}, editor = {Evangelos Kranakis and Jennifer C. Hou and Ram Ramanathan}, title = {SecNav: secure broadcast localization and time synchronization in wireless networks}, booktitle = {Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, {MOBICOM} 2007, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, September 9-14, 2007}, pages = {310--313}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1287853.1287892}, doi = {10.1145/1287853.1287892}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/RasmussenCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RasmussenC07, author = {Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Implications of radio fingerprinting on the security of sensor networks}, booktitle = {Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007}, pages = {331--340}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SECCOM.2007.4550352}, doi = {10.1109/SECCOM.2007.4550352}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/RasmussenC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.