BibTeX records: Kasper Bonne Rasmussen

download as .bib file

@article{DBLP:journals/taes/RogersR24,
  author       = {Matthew Rogers and
                  Kasper Rasmussen},
  title        = {Targeted Detection for Attacks on the {MIL-STD-1553} Bus},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {60},
  number       = {1},
  pages        = {548--557},
  year         = {2024},
  url          = {https://doi.org/10.1109/TAES.2023.3325423},
  doi          = {10.1109/TAES.2023.3325423},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taes/RogersR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GedenR23,
  author       = {Munir Geden and
                  Kasper Rasmussen},
  title        = {RegGuard: Leveraging {CPU} registers for mitigation of control- and
                  data-oriented attacks},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103213},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103213},
  doi          = {10.1016/J.COSE.2023.103213},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GedenR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/GedenR23,
  author       = {Munir Geden and
                  Kasper Rasmussen},
  title        = {Hardware-assisted remote attestation design for critical embedded
                  systems},
  journal      = {{IET} Inf. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {518--533},
  year         = {2023},
  url          = {https://doi.org/10.1049/ise2.12113},
  doi          = {10.1049/ISE2.12113},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/GedenR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/StojilovicRRTT23,
  author       = {Mirjana Stojilovic and
                  Kasper Rasmussen and
                  Francesco Regazzoni and
                  Mehdi B. Tahoori and
                  Russell Tessier},
  title        = {A Visionary Look at the Security of Reconfigurable Cloud Computing},
  journal      = {Proc. {IEEE}},
  volume       = {111},
  number       = {12},
  pages        = {1548--1571},
  year         = {2023},
  url          = {https://doi.org/10.1109/JPROC.2023.3330729},
  doi          = {10.1109/JPROC.2023.3330729},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pieee/StojilovicRRTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RogersWHR23,
  author       = {Matthew Rogers and
                  Phillip Weigand and
                  Jassim Happa and
                  Kasper Rasmussen},
  title        = {Detecting {CAN} Attacks on {J1939} and {NMEA} 2000 Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2406--2420},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3182481},
  doi          = {10.1109/TDSC.2022.3182481},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RogersWHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ImandaR23,
  author       = {Hayyu Imanda and
                  Kasper Rasmussen},
  title        = {Nakula: Coercion Resistant Data Storage against Time-Limited Adversary},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {4:1--4:11},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3600175},
  doi          = {10.1145/3600160.3600175},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ImandaR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TengR23,
  author       = {Wil Liam Teng and
                  Kasper Rasmussen},
  title        = {Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine
                  Communication},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {7:1--7:11},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3600165},
  doi          = {10.1145/3600160.3600165},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TengR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ZhangR23,
  author       = {Youqian Zhang and
                  Kasper Rasmussen},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Electromagnetic Signal Injection Attacks on Differential Signaling},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {314--325},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3590326},
  doi          = {10.1145/3579856.3590326},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ZhangR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/RogersR23,
  author       = {Matthew Rogers and
                  Kasper Rasmussen},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {An Evaluation Framework for Intrusion Prevention Systems on Serial
                  Data Bus Networks},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {481--493},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3582810},
  doi          = {10.1145/3579856.3582810},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/RogersR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-03237,
  author       = {Hayyu Imanda and
                  Kasper Rasmussen},
  title        = {Ask for Alice: Online Covert Distress Signal in the Presence of a
                  Strong Adversary},
  journal      = {CoRR},
  volume       = {abs/2310.03237},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.03237},
  doi          = {10.48550/ARXIV.2310.03237},
  eprinttype    = {arXiv},
  eprint       = {2310.03237},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-03237.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-19634,
  author       = {Angeliki Aktypi and
                  Kasper Rasmussen},
  title        = {Iris: Dynamic Privacy Preserving Search in Structured Peer-to-Peer
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2310.19634},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.19634},
  doi          = {10.48550/ARXIV.2310.19634},
  eprinttype    = {arXiv},
  eprint       = {2310.19634},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-19634.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/GiechaskielRE22,
  author       = {Ilias Giechaskiel and
                  Kasper Rasmussen and
                  Ken Eguro},
  title        = {Long-Wire Leakage: The Threat of Crosstalk},
  journal      = {{IEEE} Des. Test},
  volume       = {39},
  number       = {4},
  pages        = {41--48},
  year         = {2022},
  url          = {https://doi.org/10.1109/MDAT.2022.3142199},
  doi          = {10.1109/MDAT.2022.3142199},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/GiechaskielRE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AktypiKVR22,
  author       = {Angeliki Aktypi and
                  Dimitris Karnikis and
                  Nikos Vasilakis and
                  Kasper Rasmussen},
  title        = {Themis: {A} Secure Decentralized Framework for Microservice Interaction
                  in Serverless Computing},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {10:1--10:11},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3538983},
  doi          = {10.1145/3538969.3538983},
  timestamp    = {Fri, 19 Aug 2022 09:45:12 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AktypiKVR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/AntonioliTRP22,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen and
                  Mathias Payer},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth
                  Classic and Bluetooth Low Energy},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {196--207},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3523258},
  doi          = {10.1145/3488932.3523258},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/AntonioliTRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangR22,
  author       = {Youqian Zhang and
                  Kasper Rasmussen},
  title        = {Detection of Electromagnetic Signal Injection Attacks on Actuator
                  Systems},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {171--184},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545949},
  doi          = {10.1145/3545948.3545949},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-06362,
  author       = {Matthew Rogers and
                  Kasper Rasmussen},
  title        = {Silently Disabling ECUs and Enabling Blind Attacks on the {CAN} Bus},
  journal      = {CoRR},
  volume       = {abs/2201.06362},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.06362},
  eprinttype    = {arXiv},
  eprint       = {2201.06362},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-06362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-07102,
  author       = {Youqian Zhang and
                  Kasper Rasmussen},
  title        = {Detection of Electromagnetic Signal Injection Attacks on Actuator
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2203.07102},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.07102},
  doi          = {10.48550/ARXIV.2203.07102},
  eprinttype    = {arXiv},
  eprint       = {2203.07102},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-07102.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-10052,
  author       = {Thomas Burton and
                  Kasper Rasmussen},
  title        = {Orientation Estimation using Wireless Device Radiation Patterns},
  journal      = {CoRR},
  volume       = {abs/2203.10052},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.10052},
  doi          = {10.48550/ARXIV.2203.10052},
  eprinttype    = {arXiv},
  eprint       = {2203.10052},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-10052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-00343,
  author       = {Youqian Zhang and
                  Kasper Rasmussen},
  title        = {Electromagnetic Signal Injection Attacks on Differential Signaling},
  journal      = {CoRR},
  volume       = {abs/2208.00343},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.00343},
  doi          = {10.48550/ARXIV.2208.00343},
  eprinttype    = {arXiv},
  eprint       = {2208.00343},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-00343.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/GiechaskielER21,
  author       = {Ilias Giechaskiel and
                  Ken Eguro and
                  Kasper Rasmussen},
  title        = {Extended Abstract: Covert Channels and Data Exfiltration From FPGAs},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2021, Grenoble, France, February 1-5, 2021},
  pages        = {1638},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/DATE51398.2021.9474115},
  doi          = {10.23919/DATE51398.2021.9474115},
  timestamp    = {Wed, 21 Jul 2021 10:04:34 +0200},
  biburl       = {https://dblp.org/rec/conf/date/GiechaskielER21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BurtonR21,
  author       = {Thomas Burton and
                  Kasper Rasmussen},
  title        = {Private Data Exfiltration from Cyber-Physical Systems Using Channel
                  State Information},
  booktitle    = {{WPES} '21: Proceedings of the 20th Workshop on Workshop on Privacy
                  in the Electronic Society, Virtual Event, Korea, 15 November 2021},
  pages        = {223--235},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3463676.3485606},
  doi          = {10.1145/3463676.3485606},
  timestamp    = {Thu, 03 Nov 2022 11:11:48 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BurtonR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-10769,
  author       = {Munir Geden and
                  Kasper Rasmussen},
  title        = {RegGuard: Leveraging {CPU} Registers for Mitigation of Control- and
                  Data-Oriented Attacks},
  journal      = {CoRR},
  volume       = {abs/2110.10769},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.10769},
  eprinttype    = {arXiv},
  eprint       = {2110.10769},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-10769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KalkanR20,
  author       = {K{\"{u}}bra Kalkan and
                  Kasper Bonne Rasmussen},
  title        = {TruSD: Trust framework for service discovery among IoT devices},
  journal      = {Comput. Networks},
  volume       = {178},
  pages        = {107318},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107318},
  doi          = {10.1016/J.COMNET.2020.107318},
  timestamp    = {Fri, 25 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/KalkanR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/GiechaskielR20,
  author       = {Ilias Giechaskiel and
                  Kasper Rasmussen},
  title        = {Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and
                  Defenses},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {22},
  number       = {1},
  pages        = {645--670},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMST.2019.2952858},
  doi          = {10.1109/COMST.2019.2952858},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/GiechaskielR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AntonioliTR20,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen},
  title        = {Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {14:1--14:28},
  year         = {2020},
  url          = {https://doi.org/10.1145/3394497},
  doi          = {10.1145/3394497},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AntonioliTR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AktypiKR20,
  author       = {Angeliki Aktypi and
                  K{\"{u}}bra Kalkan and
                  Kasper Bonne Rasmussen},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured
                  {P2P} Network},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {271--282},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3375739},
  doi          = {10.1145/3374664.3375739},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AktypiKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/Tian0GRS20,
  author       = {Shanquan Tian and
                  Wenjie Xiong and
                  Ilias Giechaskiel and
                  Kasper Rasmussen and
                  Jakub Szefer},
  editor       = {Stephen Neuendorffer and
                  Lesley Shannon},
  title        = {Fingerprinting Cloud {FPGA} Infrastructures},
  booktitle    = {{FPGA} '20: The 2020 {ACM/SIGDA} International Symposium on Field-Programmable
                  Gate Arrays, Seaside, CA, USA, February 23-25, 2020},
  pages        = {58--64},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3373087.3375322},
  doi          = {10.1145/3373087.3375322},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpga/Tian0GRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangR20,
  author       = {Youqian Zhang and
                  Kasper Rasmussen},
  title        = {Detection of Electromagnetic Interference Attacks on Sensor Systems},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {203--216},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00001},
  doi          = {10.1109/SP40000.2020.00001},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AntonioliTR20,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen},
  title        = {{BIAS:} Bluetooth Impersonation AttackS},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {549--562},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00093},
  doi          = {10.1109/SP40000.2020.00093},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AntonioliTR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GiechaskielRS20,
  author       = {Ilias Giechaskiel and
                  Kasper Bonne Rasmussen and
                  Jakub Szefer},
  title        = {C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit
                  Leakage},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1728--1741},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00070},
  doi          = {10.1109/SP40000.2020.00070},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GiechaskielRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GedenR20,
  author       = {Munir Geden and
                  Kasper Rasmussen},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {{TRUVIN:} Lightweight Detection of Data-Oriented Attacks Through Trusted
                  Value Integrity},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {174--181},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00035},
  doi          = {10.1109/TRUSTCOM50675.2020.00035},
  timestamp    = {Fri, 30 Apr 2021 12:35:40 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GedenR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-11776,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen and
                  Mathias Payer},
  title        = {BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth
                  Classic and Bluetooth Low Energy},
  journal      = {CoRR},
  volume       = {abs/2009.11776},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.11776},
  eprinttype    = {arXiv},
  eprint       = {2009.11776},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-11776.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AvoineBBCHKKLMM19,
  author       = {Gildas Avoine and
                  Muhammed Ali Bing{\"{o}}l and
                  Ioana Boureanu and
                  Srdjan Capkun and
                  Gerhard P. Hancke and
                  S{\"{u}}leyman Kardas and
                  Chong Hee Kim and
                  C{\'{e}}dric Lauradoux and
                  Benjamin Martin and
                  Jorge Munilla and
                  Alberto Peinado and
                  Kasper Bonne Rasmussen and
                  Dave Singel{\'{e}}e and
                  Aslan Tchamkerten and
                  Rolando Trujillo{-}Rasua and
                  Serge Vaudenay},
  title        = {Security of Distance-Bounding: {A} Survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {51},
  number       = {5},
  pages        = {94:1--94:33},
  year         = {2019},
  url          = {https://doi.org/10.1145/3264628},
  doi          = {10.1145/3264628},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/AvoineBBCHKKLMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SluganovicRRM18,
  author       = {Ivo Sluganovic and
                  Marc Roeschlin and
                  Kasper Bonne Rasmussen and
                  Ivan Martinovic},
  title        = {Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric
                  Authentication},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {4:1--4:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3281745},
  doi          = {10.1145/3281745},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SluganovicRRM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trets/GiechaskielER19,
  author       = {Ilias Giechaskiel and
                  Ken Eguro and
                  Kasper Bonne Rasmussen},
  title        = {Leakier Wires: Exploiting {FPGA} Long Wires for Covert- and Side-channel
                  Attacks},
  journal      = {{ACM} Trans. Reconfigurable Technol. Syst.},
  volume       = {12},
  number       = {3},
  pages        = {11:1--11:29},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322483},
  doi          = {10.1145/3322483},
  timestamp    = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trets/GiechaskielER19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EberzLRLM19,
  author       = {Simon Eberz and
                  Giulio Lovisotto and
                  Kasper Bonne Rasmussen and
                  Vincent Lenders and
                  Ivan Martinovic},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1187--1199},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354233},
  doi          = {10.1145/3319535.3354233},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EberzLRLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GiechaskielZR19,
  author       = {Ilias Giechaskiel and
                  Youqian Zhang and
                  Kasper Bonne Rasmussen},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {A Framework for Evaluating Security in the Presence of Signal Injection
                  Attacks},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {512--532},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_25},
  doi          = {10.1007/978-3-030-29959-0\_25},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GiechaskielZR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/GiechaskielRS19,
  author       = {Ilias Giechaskiel and
                  Kasper Bonne Rasmussen and
                  Jakub Szefer},
  editor       = {Ioannis Sourdis and
                  Christos{-}Savvas Bouganis and
                  Carlos {\'{A}}lvarez and
                  Leonel Antonio Toledo D{\'{\i}}az and
                  Pedro Valero{-}Lara and
                  Xavier Martorell},
  title        = {Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs},
  booktitle    = {29th International Conference on Field Programmable Logic and Applications,
                  {FPL} 2019, Barcelona, Spain, September 8-12, 2019},
  pages        = {45--50},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/FPL.2019.00017},
  doi          = {10.1109/FPL.2019.00017},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/GiechaskielRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/GiechaskielRS19,
  author       = {Ilias Giechaskiel and
                  Kasper Rasmussen and
                  Jakub Szefer},
  title        = {Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant
                  Cloud FPGAs},
  booktitle    = {37th {IEEE} International Conference on Computer Design, {ICCD} 2019,
                  Abu Dhabi, United Arab Emirates, November 17-20, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCD46524.2019.00010},
  doi          = {10.1109/ICCD46524.2019.00010},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccd/GiechaskielRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AntonioliTR19,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen},
  title        = {Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby
                  Connections' on Android},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/nearby-threats-reversing-analyzing-and-attacking-googles-nearby-connections-on-android/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AntonioliTR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/GedenR19,
  author       = {Munir Geden and
                  Kasper Rasmussen},
  title        = {Hardware-assisted Remote Runtime Attestation for Critical Embedded
                  Systems},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949036},
  doi          = {10.1109/PST47121.2019.8949036},
  timestamp    = {Mon, 13 Jan 2020 18:37:30 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/GedenR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AntonioliTR19,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {The {KNOB} is Broken: Exploiting Low Entropy in the Encryption Key
                  Negotiation Of Bluetooth {BR/EDR}},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1047--1061},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AntonioliTR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-03675,
  author       = {Ilias Giechaskiel and
                  Youqian Zhang and
                  Kasper Bonne Rasmussen},
  title        = {A Framework for Evaluating Security in the Presence of Signal Injection
                  Attacks},
  journal      = {CoRR},
  volume       = {abs/1901.03675},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.03675},
  eprinttype    = {arXiv},
  eprint       = {1901.03675},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-03675.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-06935,
  author       = {Ilias Giechaskiel and
                  Kasper Bonne Rasmussen},
  title        = {SoK: Taxonomy and Challenges of Out-of-Band Signal Injection Attacks
                  and Defenses},
  journal      = {CoRR},
  volume       = {abs/1901.06935},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.06935},
  eprinttype    = {arXiv},
  eprint       = {1901.06935},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-06935.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AntonioliTR19,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen},
  title        = {Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low
                  Energy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {933},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/933},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AntonioliTR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlashwaliR19,
  author       = {Eman Salem Alashwali and
                  Kasper Rasmussen},
  title        = {What's in a Downgrade? {A} Taxonomy of Downgrade Attacks in the {TLS}
                  Protocol and Application Protocols Using {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1083},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlashwaliR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlashwaliR19a,
  author       = {Eman Salem Alashwali and
                  Kasper Rasmussen},
  title        = {On the Feasibility of Fine-Grained {TLS} Security Configurations in
                  Web Browsers Based on the Requested Domain Name},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1099},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlashwaliR19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GiechaskielCR18,
  author       = {Ilias Giechaskiel and
                  Cas Cremers and
                  Kasper Bonne Rasmussen},
  title        = {When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under
                  Broken Primitives},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {4},
  pages        = {46--56},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.3111253},
  doi          = {10.1109/MSP.2018.3111253},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GiechaskielCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GiechaskielRE18,
  author       = {Ilias Giechaskiel and
                  Kasper Bonne Rasmussen and
                  Ken Eguro},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Leaky Wires: Information Leakage and Covert Communication Between
                  {FPGA} Long Wires},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {15--27},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196518},
  doi          = {10.1145/3196494.3196518},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GiechaskielRE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RoeschlinMR18,
  author       = {Marc Roeschlin and
                  Ivan Martinovic and
                  Kasper Bonne Rasmussen},
  title        = {Device Pairing at the Touch of an Electrode},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03B-4\_Roeschlin\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/RoeschlinMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/RasmussenG18,
  author       = {Kasper Bonne Rasmussen and
                  Paolo Gasti},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {Weak and Strong Deniable Authenticated Encryption: On their Relationship
                  and Applications},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514181},
  doi          = {10.1109/PST.2018.8514181},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/RasmussenG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AlashwaliR18,
  author       = {Eman Salem Alashwali and
                  Kasper Rasmussen},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {On the Feasibility of Fine-Grained {TLS} Security Configurations in
                  Web Browsers Based on the Requested Domain Name},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  pages        = {213--228},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0\_12},
  doi          = {10.1007/978-3-030-01704-0\_12},
  timestamp    = {Fri, 11 Jan 2019 16:16:24 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AlashwaliR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AlashwaliR18a,
  author       = {Eman Salem Alashwali and
                  Kasper Rasmussen},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {What's in a Downgrade? {A} Taxonomy of Downgrade Attacks in the {TLS}
                  Protocol and Application Protocols Using {TLS}},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  pages        = {468--487},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0\_27},
  doi          = {10.1007/978-3-030-01704-0\_27},
  timestamp    = {Fri, 11 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AlashwaliR18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/RoeschlinVRM18,
  author       = {Marc Roeschlin and
                  Christian Vaas and
                  Kasper Bonne Rasmussen and
                  Ivan Martinovic},
  title        = {Bionyms: Driver-centric Message Authentication using Biometric Measurements},
  booktitle    = {2018 {IEEE} Vehicular Networking Conference, {VNC} 2018, Taipei, Taiwan,
                  December 5-7, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/VNC.2018.8628359},
  doi          = {10.1109/VNC.2018.8628359},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/vnc/RoeschlinVRM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-05681,
  author       = {Eman Salem Alashwali and
                  Kasper Rasmussen},
  title        = {What's in a Downgrade? {A} Taxonomy of Downgrade Attacks in the {TLS}
                  Protocol and Application Protocols Using {TLS}},
  journal      = {CoRR},
  volume       = {abs/1809.05681},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.05681},
  eprinttype    = {arXiv},
  eprint       = {1809.05681},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-05681.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-05686,
  author       = {Eman Salem Alashwali and
                  Kasper Rasmussen},
  title        = {On the Feasibility of Fine-Grained {TLS} Security Configurations in
                  Web Browsers Based on the Requested Domain Name},
  journal      = {CoRR},
  volume       = {abs/1809.05686},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.05686},
  eprinttype    = {arXiv},
  eprint       = {1809.05686},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-05686.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/MartinovicRRT17,
  author       = {Ivan Martinovic and
                  Kasper Bonne Rasmussen and
                  Marc Roeschlin and
                  Gene Tsudik},
  title        = {Authentication using pulse-response biometrics},
  journal      = {Commun. {ACM}},
  volume       = {60},
  number       = {2},
  pages        = {108--115},
  year         = {2017},
  url          = {https://doi.org/10.1145/3023359},
  doi          = {10.1145/3023359},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/MartinovicRRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MartinovicRRT17,
  author       = {Ivan Martinovic and
                  Kasper Bonne Rasmussen and
                  Marc Roeschlin and
                  Gene Tsudik},
  title        = {Pulse-Response: Exploring Human Body Impedance for Biometric Recognition},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {6:1--6:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/3064645},
  doi          = {10.1145/3064645},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MartinovicRRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EberzRLM17,
  author       = {Simon Eberz and
                  Kasper Bonne Rasmussen and
                  Vincent Lenders and
                  Ivan Martinovic},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Evaluating Behavioral Biometrics for Continuous Authentication: Challenges
                  and Metrics},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {386--399},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053032},
  doi          = {10.1145/3052973.3053032},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EberzRLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/TippenhauerRC16,
  author       = {Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Physical-layer integrity for wireless messages},
  journal      = {Comput. Networks},
  volume       = {109},
  pages        = {31--38},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.021},
  doi          = {10.1016/J.COMNET.2016.06.021},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/TippenhauerRC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/EberzRLM16,
  author       = {Simon Eberz and
                  Kasper Bonne Rasmussen and
                  Vincent Lenders and
                  Ivan Martinovic},
  title        = {Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {1:1--1:31},
  year         = {2016},
  url          = {https://doi.org/10.1145/2904018},
  doi          = {10.1145/2904018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/EberzRLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SluganovicRRM16,
  author       = {Ivo Sluganovic and
                  Marc Roeschlin and
                  Kasper Bonne Rasmussen and
                  Ivan Martinovic},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Using Reflexive Eye Movements for Fast Challenge-Response Authentication},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1056--1067},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978311},
  doi          = {10.1145/2976749.2978311},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SluganovicRRM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/BrasserRST16,
  author       = {Ferdinand Brasser and
                  Kasper Bonne Rasmussen and
                  Ahmad{-}Reza Sadeghi and
                  Gene Tsudik},
  title        = {Remote attestation for low-end embedded devices: the prover's perspective},
  booktitle    = {Proceedings of the 53rd Annual Design Automation Conference, {DAC}
                  2016, Austin, TX, USA, June 5-9, 2016},
  pages        = {91:1--91:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897937.2898083},
  doi          = {10.1145/2897937.2898083},
  timestamp    = {Thu, 26 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/BrasserRST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GiechaskielCR16,
  author       = {Ilias Giechaskiel and
                  Cas Cremers and
                  Kasper Bonne Rasmussen},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {On Bitcoin Security in the Presence of Broken Cryptographic Primitives},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  pages        = {201--222},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3\_11},
  doi          = {10.1007/978-3-319-45741-3\_11},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GiechaskielCR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/JavaliRRHJ16,
  author       = {Chitra Javali and
                  Girish Revadigar and
                  Kasper Bonne Rasmussen and
                  Wen Hu and
                  Sanjay Jha},
  title        = {I Am Alice, {I} Was in Wonderland: Secure Location Proof Generation
                  and Verification Protocol},
  booktitle    = {41st {IEEE} Conference on Local Computer Networks, {LCN} 2016, Dubai,
                  United Arab Emirates, November 7-10, 2016},
  pages        = {477--485},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/LCN.2016.126},
  doi          = {10.1109/LCN.2016.126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/JavaliRRHJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/RoeschlinSMTR16,
  author       = {Marc Roeschlin and
                  Ivo Sluganovic and
                  Ivan Martinovic and
                  Gene Tsudik and
                  Kasper Bonne Rasmussen},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Sabrina De Capitani di Vimercati},
  title        = {Generating Secret Keys from Biometric Body Impedance Measurements},
  booktitle    = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  pages        = {59--69},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994626},
  timestamp    = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/RoeschlinSMTR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiechaskielCR16,
  author       = {Ilias Giechaskiel and
                  Cas Cremers and
                  Kasper Bonne Rasmussen},
  title        = {On Bitcoin Security in the Presence of Broken Crypto Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiechaskielCR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bodynets/RevadigarJARJ15,
  author       = {Girish Revadigar and
                  Chitra Javali and
                  Hassan Jameel Asghar and
                  Kasper Bonne Rasmussen and
                  Sanjay Jha},
  editor       = {Eryk Dutkiewicz and
                  Ren Ping Liu and
                  Honggang Wang and
                  Qi Zhang and
                  Giancarlo Fortino and
                  Ladislau Matekovits and
                  Matti H{\"{a}}m{\"{a}}l{\"{a}}inen and
                  Wei Ni},
  title        = {Mobility Independent Secret Key Generation for Wearable Health-care
                  Devices},
  booktitle    = {10th {EAI} International Conference on Body Area Networks, {BODYNETS}
                  2015, Sydney, Australia, September 28-30, 2015},
  publisher    = {{ICST}},
  year         = {2015},
  url          = {https://doi.org/10.4108/eai.28-9-2015.2261446},
  doi          = {10.4108/EAI.28-9-2015.2261446},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bodynets/RevadigarJARJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RevadigarJARJ15,
  author       = {Girish Revadigar and
                  Chitra Javali and
                  Hassan Jameel Asghar and
                  Kasper Bonne Rasmussen and
                  Sanjay Jha},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {iARC: Secret Key Generation for Resource Constrained Devices by Inducing
                  Artificial Randomness in the Channel},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {669},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714644},
  doi          = {10.1145/2714576.2714644},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RevadigarJARJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/SimpsonMCFMR15,
  author       = {Andrew C. Simpson and
                  Andrew P. Martin and
                  Cas Cremers and
                  Ivan Flechais and
                  Ivan Martinovic and
                  Kasper Bonne Rasmussen},
  editor       = {Antonia Bertolino and
                  Gerardo Canfora and
                  Sebastian G. Elbaum},
  title        = {Experiences in Developing and Delivering a Programme of Part-Time
                  Education in Software and Systems Security},
  booktitle    = {37th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 2},
  pages        = {435--444},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICSE.2015.176},
  doi          = {10.1109/ICSE.2015.176},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/SimpsonMCFMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/EberzRLM15,
  author       = {Simon Eberz and
                  Kasper Bonne Rasmussen and
                  Vincent Lenders and
                  Ivan Martinovic},
  title        = {Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement
                  Biometrics},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/preventing-lunchtime-attacks-fighting-insider-threats-eye-movement-biometrics},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/EberzRLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GastiR15,
  author       = {Paolo Gasti and
                  Kasper Bonne Rasmussen},
  editor       = {Indrajit Ray and
                  Nicholas Hopper and
                  Rob Jansen},
  title        = {Privacy-preserving User Matching},
  booktitle    = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {111--120},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808138.2808148},
  doi          = {10.1145/2808138.2808148},
  timestamp    = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/GastiR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/FrancillonNRT14,
  author       = {Aur{\'{e}}lien Francillon and
                  Quan Nguyen and
                  Kasper Bonne Rasmussen and
                  Gene Tsudik},
  editor       = {Gerhard P. Fettweis and
                  Wolfgang Nebel},
  title        = {A minimalist approach to Remote Attestation},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2014, Dresden, Germany, March 24-28, 2014},
  pages        = {1--6},
  publisher    = {European Design and Automation Association},
  year         = {2014},
  url          = {https://doi.org/10.7873/DATE.2014.257},
  doi          = {10.7873/DATE.2014.257},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/FrancillonNRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RasmussenRMT14,
  author       = {Kasper Bonne Rasmussen and
                  Marc Roeschlin and
                  Ivan Martinovic and
                  Gene Tsudik},
  title        = {Authentication Using Pulse-Response Biometrics},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/authentication-using-pulse-response-biometrics},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RasmussenRMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BeatoCR14,
  author       = {Filipe Beato and
                  Emiliano De Cristofaro and
                  Kasper Bonne Rasmussen},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Undetectable communication: The Online Social Networks case},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {19--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890919},
  doi          = {10.1109/PST.2014.6890919},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/BeatoCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GastiR12,
  author       = {Paolo Gasti and
                  Kasper Bonne Rasmussen},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {On the Security of Password Manager Database Formats},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {770--787},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_44},
  doi          = {10.1007/978-3-642-33167-1\_44},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GastiR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CremersRC12,
  author       = {Cas Cremers and
                  Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Distance Hijacking Attacks on Distance Bounding Protocols},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/distance-hijacking-attacks-distance-bounding-protocols},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/CremersRC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CremersRSC12,
  author       = {Cas Cremers and
                  Kasper Bonne Rasmussen and
                  Benedikt Schmidt and
                  Srdjan Capkun},
  title        = {Distance Hijacking Attacks on Distance Bounding Protocols},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {113--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.17},
  doi          = {10.1109/SP.2012.17},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CremersRSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancillonNRT12,
  author       = {Aur{\'{e}}lien Francillon and
                  Quan Nguyen and
                  Kasper Bonne Rasmussen and
                  Gene Tsudik},
  title        = {Systematic Treatment of Remote Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {713},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/713},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancillonNRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TippenhauerPRC11,
  author       = {Nils Ole Tippenhauer and
                  Christina P{\"{o}}pper and
                  Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {On the requirements for successful {GPS} spoofing attacks},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046719},
  doi          = {10.1145/2046707.2046719},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TippenhauerPRC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CremersRC11,
  author       = {Cas Cremers and
                  Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Distance Hijacking Attacks on Distance Bounding Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/129},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CremersRC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/networks/StidsenPSZR10,
  author       = {Thomas R. Stidsen and
                  Bj{\o}rn Petersen and
                  Simon Spoorendonk and
                  Martin Zachariasen and
                  Kasper Bonne Rasmussen},
  title        = {Optimal routing with failure-independent path protection},
  journal      = {Networks},
  volume       = {55},
  number       = {2},
  pages        = {125--137},
  year         = {2010},
  url          = {https://doi.org/10.1002/net.20323},
  doi          = {10.1002/NET.20323},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/networks/StidsenPSZR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RasmussenC10,
  author       = {Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Realization of {RF} Distance Bounding},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {389--402},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Rasmussen.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RasmussenC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RasmussenCHC09,
  author       = {Kasper Bonne Rasmussen and
                  Claude Castelluccia and
                  Thomas S. Heydt{-}Benjamin and
                  Srdjan Capkun},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Proximity-based access control for implantable medical devices},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {410--419},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653712},
  doi          = {10.1145/1653662.1653712},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RasmussenCHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/TippenhauerRPC09,
  author       = {Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen and
                  Christina P{\"{o}}pper and
                  Srdjan Capkun},
  editor       = {Krzysztof Zielinski and
                  Adam Wolisz and
                  Jason Flinn and
                  Anthony LaMarca},
  title        = {Attacks on public WLAN-based positioning systems},
  booktitle    = {Proceedings of the 7th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2009), Krak{\'{o}}w, Poland,
                  June 22-25, 2009},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1555816.1555820},
  doi          = {10.1145/1555816.1555820},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/TippenhauerRPC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TippenhauerRC09,
  author       = {Nils Ole Tippenhauer and
                  Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Secure Ranging With Message Temporal Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/602},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TippenhauerRC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/CapkunRCS08,
  author       = {Srdjan Capkun and
                  Kasper Bonne Rasmussen and
                  Mario Cagalj and
                  Mani B. Srivastava},
  title        = {Secure Location Verification with Hidden and Mobile Base Stations},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {470--483},
  year         = {2008},
  url          = {https://doi.org/10.1109/TMC.2007.70782},
  doi          = {10.1109/TMC.2007.70782},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/CapkunRCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RasmussenC08,
  author       = {Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Location privacy of distance bounding protocols},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {149--160},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455791},
  doi          = {10.1145/1455770.1455791},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RasmussenC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/RasmussenCC07,
  author       = {Kasper Bonne Rasmussen and
                  Srdjan Capkun and
                  Mario Cagalj},
  editor       = {Evangelos Kranakis and
                  Jennifer C. Hou and
                  Ram Ramanathan},
  title        = {SecNav: secure broadcast localization and time synchronization in
                  wireless networks},
  booktitle    = {Proceedings of the 13th Annual International Conference on Mobile
                  Computing and Networking, {MOBICOM} 2007, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada, September 9-14, 2007},
  pages        = {310--313},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1287853.1287892},
  doi          = {10.1145/1287853.1287892},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/RasmussenCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RasmussenC07,
  author       = {Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Implications of radio fingerprinting on the security of sensor networks},
  booktitle    = {Third International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
                  2007},
  pages        = {331--340},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECCOM.2007.4550352},
  doi          = {10.1109/SECCOM.2007.4550352},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/RasmussenC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics