default search action
Ivan Martinovic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2009
- [b1]Ivan Martinovic:
Security in wireless networks: a fresh approach. University of Kaiserslautern, 2009, pp. 1-136
Journal Articles
- 2024
- [j28]Mostafa Abdelmoez Hassanin, Ivan Martinovic:
CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware. J. Cybersecur. 10(1) (2024) - 2022
- [j27]Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Generating identities with mixture models for speaker anonymization. Comput. Speech Lang. 72: 101318 (2022) - [j26]James Pavur, Ivan Martinovic:
Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight. J. Cybersecur. 8(1) (2022) - [j25]Simon Birnbach, Simon Eberz, Ivan Martinovic:
Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors. ACM Trans. Internet Things 3(3): 18:1-18:28 (2022) - 2021
- [j24]Simon Birnbach, Richard Baker, Simon Eberz, Ivan Martinovic:
#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones. ACM Trans. Priv. Secur. 24(4): 31:1-31:34 (2021) - [j23]Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic:
Classi-Fly: Inferring Aircraft Categories from Open Data. ACM Trans. Intell. Syst. Technol. 12(6): 79:1-79:23 (2021) - 2019
- [j22]Martin Strohmeier, Daniel Moser, Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
On the Applicability of Satellite-Based Air Traffic Control Communication for Security. IEEE Commun. Mag. 57(9): 79-85 (2019) - [j21]Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication. ACM Trans. Priv. Secur. 22(1): 4:1-4:30 (2019) - 2018
- [j20]Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS). Proc. Priv. Enhancing Technol. 2018(3): 105-122 (2018) - [j19]Michal Piskozub, Riccardo Spolaor, Ivan Martinovic:
MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features. SIGMETRICS Perform. Evaluation Rev. 46(3): 151-154 (2018) - [j18]Martin Strohmeier, Ivan Martinovic, Vincent Lenders:
A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks. IEEE Trans. Aerosp. Electron. Syst. 54(3): 1519-1529 (2018) - [j17]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification via Encrypted Network Traffic Analysis. IEEE Trans. Inf. Forensics Secur. 13(1): 63-78 (2018) - 2017
- [j16]Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Authentication using pulse-response biometrics. Commun. ACM 60(2): 108-115 (2017) - [j15]Chris Xiaoxuan Lu, Bowen Du, Hongkai Wen, Sen Wang, Andrew Markham, Ivan Martinovic, Yiran Shen, Niki Trigoni:
Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4): 152:1-152:29 (2017) - [j14]Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Pulse-Response: Exploring Human Body Impedance for Biometric Recognition. ACM Trans. Priv. Secur. 20(2): 6:1-6:31 (2017) - [j13]Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, Ivan Martinovic:
On Perception and Reality in Wireless Air Traffic Communication Security. IEEE Trans. Intell. Transp. Syst. 18(6): 1338-1357 (2017) - 2016
- [j12]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics. ACM Trans. Priv. Secur. 19(1): 1:1-1:31 (2016) - [j11]Daniel S. Berger, Francesco Gringoli, Nicolò Facchi, Ivan Martinovic, Jens B. Schmitt:
Friendly Jamming on Access Points: Analysis and Real-World Measurements. IEEE Trans. Wirel. Commun. 15(9): 6189-6202 (2016) - 2015
- [j10]Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. IEEE Commun. Surv. Tutorials 17(2): 1066-1087 (2015) - 2014
- [j9]Martin Strohmeier, Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Realities and challenges of nextgen air traffic management: the case of ADS-B. IEEE Commun. Mag. 52(5): 111-118 (2014) - 2013
- [j8]Paolo Barsocchi, Stefano Chessa, Ivan Martinovic, Gabriele Oligeri:
A cyber-physical approach to secret key generation in smart environments. J. Ambient Intell. Humaniz. Comput. 4(1): 1-16 (2013) - [j7]Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt:
Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels. IEEE J. Sel. Areas Commun. 31(9): 1779-1790 (2013) - [j6]Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song:
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Trans. Inf. Forensics Secur. 8(1): 136-148 (2013) - 2011
- [j5]Hao Wang, Jens B. Schmitt, Ivan Martinovic:
Dynamic demultiplexing in network calculus - Theory and application. Perform. Evaluation 68(2): 201-219 (2011) - [j4]Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders:
WiSec 2011 demo: RFReact - a real-time capable and channel-aware jamming platform. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(3): 41-42 (2011) - 2009
- [j3]Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, Jens B. Schmitt:
Bringing law and order to IEEE 802.11 networks - A case for DiscoSec. Pervasive Mob. Comput. 5(5): 510-525 (2009) - [j2]Ivan Martinovic, Nicos Gollan, Luc Cappellaro, Jens B. Schmitt:
Chaotic communication improves authentication: protecting WSNs against injection attacks. Secur. Commun. Networks 2(2): 117-132 (2009) - [j1]Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
Minimizing contention through cooperation between densely deployed wireless LANs. Wirel. Networks 15(6): 741-754 (2009)
Conference and Workshop Papers
- 2024
- [c124]Ivan Martinovic, Josip Saric, Sinisa Segvic:
MC-PanDA: Mask Confidence for Panoptic Domain Adaptation. ECCV (72) 2024: 167-185 - 2023
- [c123]Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic:
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting. CCS 2023: 608-621 - [c122]Yashovardhan Sharma, Eleonora Giunchiglia, Simon Birnbach, Ivan Martinovic:
To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection. CSR 2023: 8-15 - [c121]Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic:
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection. EICC 2023: 159-166 - [c120]Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic:
Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging. NDSS 2023 - [c119]Klaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic:
BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments. SECRYPT 2023: 135-146 - [c118]Frederick Rawlins, Richard Baker, Ivan Martinovic:
Death By A Thousand COTS: Disrupting Satellite Communications using Low Earth Orbit Constellations. SpaceSec 2023 - [c117]Edd Salkield, Sebastian Köhler, Simon Birnbach, Richard Baker, Martin Strohmeier, Ivan Martinovic:
Firefly: Spoofing Earth Observation Satellite Data through Radio Overshadowing. SpaceSec 2023 - [c116]Edd Salkield, Marcell Szakály, Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic:
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks. WISEC 2023: 341-352 - 2022
- [c115]Sebastian Köhler, Richard Baker, Ivan Martinovic:
Signal Injection Attacks against CCD Image Sensors. AsiaCCS 2022: 294-308 - [c114]Martin Georgiev, Simon Eberz, Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Common Evaluation Pitfalls in Touch-Based Authentication Systems. AsiaCCS 2022: 1049-1063 - [c113]Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic:
Demo: End-to-End Wireless Disruption of CCS EV Charging. CCS 2022: 3515-3517 - [c112]Georg Baselt, Martin Strohmeier, James Pavur, Vincent Lenders, Ivan Martinovic:
Security and Privacy Issues of Satellite Communication in the Avlatlon Domain. CyCom 2022: 285-307 - [c111]Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic:
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch. EuroS&P 2022: 377-391 - [c110]Martin Georgiev, Simon Eberz, Ivan Martinovic:
Techniques for Continuous Touch-Based Authentication. ISPEC 2022: 409-431 - [c109]Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic:
Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch. PerCom Workshops 2022: 775-780 - [c108]Frederick Barr-Smith, Tim Blazytko, Richard Baker, Ivan Martinovic:
Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains. SCORED@CCS 2022: 51-61 - [c107]Sebastian Köhler, Simon Birnbach, Richard Baker, Ivan Martinovic:
On the Security of the Wireless Electric Vehicle Charging Communication. SmartGridComm 2022: 393-398 - [c106]Klaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic:
Biometric Identification System based on Object Interactions in Internet of Things Environments. SP (Workshops) 2022: 215-221 - [c105]Bushra A. AlAhmadi, Louise Axon, Ivan Martinovic:
99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms. USENIX Security Symposium 2022: 2783-2800 - [c104]Martin Georgiev, Simon Eberz, Ivan Martinovic:
Fingerprinting and Personal Information Leakage from Touchscreen Interactions. WPES@CCS 2022: 145-157 - 2021
- [c103]Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic:
They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors. ACSAC 2021: 399-413 - [c102]James Pavur, Ivan Martinovic:
On Detecting Deception in Space Situational Awareness. AsiaCCS 2021: 280-291 - [c101]Michal Piskozub, Fabio De Gaspari, Freddie Barr-Smith, Luigi V. Mancini, Ivan Martinovic:
MalPhase: Fine-Grained Malware Detection Using Network Flow Data. AsiaCCS 2021: 774-786 - [c100]Arman Bhalla, Ivo Sluganovic, Klaudia Krawiecka, Ivan Martinovic:
MoveAR: Continuous Biometric Authentication for Augmented Reality Headsets. CPSS@AsiaCCS 2021: 41-52 - [c99]Joshua Smailes, Daniel Moser, Matthew Smith, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications. CPSS@AsiaCCS 2021: 53-64 - [c98]Martin Strohmeier, James Pavur, Ivan Martinovic, Vincent Lenders:
Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses. CRITIS 2021: 186-203 - [c97]James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
In the Same Boat: On Small Satellites, Big Rockets, and Cyber Trust. CyCon 2021: 151-169 - [c96]Klaudia Krawiecka, Jack Sturgess, Alina Petrova, Ivan Martinovic:
Plug-and-Play: Framework for Remote Experimentation in Cyber Security. EuroUSEC 2021: 48-58 - [c95]Kai Jansen, Liang Niu, Nian Xue, Ivan Martinovic, Christina Pöpper:
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance. NDSS 2021 - [c94]James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit. NDSS 2021 - [c93]Frederick Barr-Smith, Xabier Ugarte-Pedrero, Mariano Graziano, Riccardo Spolaor, Ivan Martinovic:
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land. SP 2021: 1557-1574 - [c92]Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic:
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations. USENIX Security Symposium 2021: 1865-1882 - 2020
- [c91]Bushra A. AlAhmadi, Enrico Mariconti, Riccardo Spolaor, Gianluca Stringhini, Ivan Martinovic:
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior. AsiaCCS 2020: 652-664 - [c90]Ivo Sluganovic, Mihael Liskij, Ante Derek, Ivan Martinovic:
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets. CODASPY 2020: 61-72 - [c89]Giulio Lovisotto, Henry Turner, Simon Eberz, Ivan Martinovic:
Seeing Red: PPG Biometrics Using Smartphone Cameras. CVPR Workshops 2020: 3565-3574 - [c88]Giulio Lovisotto, Simon Eberz, Ivan Martinovic:
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating. EuroS&P 2020: 184-197 - [c87]Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic:
A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems. NDSS 2020 - [c86]James Pavur, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
A Tale of Sea and Sky On the Security of Maritime VSAT Communications. SP 2020: 1384-1400 - 2019
- [c85]Michal Piskozub, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks. MTD@CCS 2019: 1-12 - [c84]Simon Eberz, Giulio Lovisotto, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics. CCS 2019: 1187-1199 - [c83]Simon Birnbach, Simon Eberz, Ivan Martinovic:
Peeves: Physical Event Verification in Smart Homes. CCS 2019: 1455-1467 - [c82]James Pavur, Ivan Martinovic:
The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space. CyCon 2019: 1-18 - [c81]Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Attacking Speaker Recognition Systems with Phoneme Morphing. ESORICS (1) 2019: 471-492 - [c80]Richard Baker, Ivan Martinovic:
Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging. USENIX Security Symposium 2019: 407-424 - [c79]James Pavur, Daniel Moser, Vincent Lenders, Ivan Martinovic:
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband. WiSec 2019: 277-284 - [c78]Michal Piskozub, Riccardo Spolaor, Ivan Martinovic:
CompactFlow: A Hybrid Binary Format for Network Flow Data. WISTP 2019: 185-201 - 2018
- [c77]Martin Strohmeier, Matthew Smith, Daniel Moser, Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Utilizing air traffic communications for OSINT on state and government aircraft. CyCon 2018: 299-320 - [c76]Bushra A. AlAhmadi, Ivan Martinovic:
MalClassifier: Malware family classification using network flow sequence behaviour. eCrime 2018: 1-13 - [c75]Martin Strohmeier, Anna K. Niedbala, Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Surveying Aviation Professionals on the Security of the Air Traffic Control System. ISSA/CSITS@ESORICS 2018: 135-152 - [c74]Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic:
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication. EuroS&P 2018: 107-121 - [c73]Christian Vaas, Mika Juuti, N. Asokan, Ivan Martinovic:
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories. EuroS&P 2018: 199-213 - [c72]Vesna Mandic, Ivan Martinovic:
Biomedical signals reconstruction under the compressive sensing approach. MECO 2018: 1-4 - [c71]Marc Roeschlin, Ivan Martinovic, Kasper Bonne Rasmussen:
Device Pairing at the Touch of an Electrode. NDSS 2018 - [c70]Richard Baker, Ivan Martinovic:
EMPower: Detecting Malicious Power Line Networks from EM Emissions. SEC 2018: 108-121 - [c69]Simon Eberz, Giulio Lovisotto, Andrea Patane, Marta Kwiatkowska, Vincent Lenders, Ivan Martinovic:
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts. IEEE Symposium on Security and Privacy 2018: 889-905 - [c68]Marc Roeschlin, Christian Vaas, Kasper Bonne Rasmussen, Ivan Martinovic:
Bionyms: Driver-centric Message Authentication using Biometric Measurements. VNC 2018: 1-8 - [c67]Christian Vaas, Mohammad Khodaei, Panos Papadimitratos, Ivan Martinovic:
Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles. VNC 2018: 1-8 - [c66]Christian Vaas, Marc Roeschlin, Panos Papadimitratos, Ivan Martinovic:
Poster: Tracking Vehicles Through Encrypted Mix-Zones Using Physical Layer Properties. VNC 2018: 1-2 - [c65]Christian Vaas, Panos Papadimitratos, Ivan Martinovic:
Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages. WISEC 2018: 287-288 - 2017
- [c64]Ivo Sluganovic, Matej Serbec, Ante Derek, Ivan Martinovic:
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens. ACSAC 2017: 250-261 - [c63]Jack Sturgess, Ivan Martinovic:
VisAuth: Authentication over a Visual Channel Using an Embedded Image. CANS 2017: 537-546 - [c62]Vincent F. Taylor, Ivan Martinovic:
To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution. AsiaCCS 2017: 45-57 - [c61]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. AsiaCCS 2017: 386-399 - [c60]Martin Strohmeier, Matthew Smith, Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Crowdsourcing security for wireless air traffic communications. CyCon 2017: 1-18 - [c59]Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS. Financial Cryptography 2017: 285-301 - [c58]Vincent F. Taylor, Ivan Martinovic:
Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store. Financial Cryptography 2017: 302-309 - [c57]Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik:
FADEWICH: Fast Deauthentication Over the Wireless Channel. ICDCS 2017: 2294-2301 - [c56]Simon Birnbach, Richard Baker, Ivan Martinovic:
Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones. NDSS 2017 - [c55]Simon Eberz, Nicola Paoletti, Marc Roeschlin, Andrea Patané, Marta Kwiatkowska, Ivan Martinovic:
Broken Hearted: How To Attack ECG Biometrics. NDSS 2017 - [c54]Mika Juuti, Christian Vaas, Hans Liljestrand, Ivo Sluganovic, N. Asokan, Ivan Martinovic:
Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication. SECON 2017: 1-2 - [c53]Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N. Asokan, Ivan Martinovic:
STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification. SECON 2017: 1-9 - [c52]Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic:
There are many apps for that: quantifying the availability of privacy-preserving apps. WISEC 2017: 247-252 - [c51]Mario Frank, Tiffany Hwu, Sakshi Jain, Robert T. Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Ivo Sluganovic, Dawn Song:
Using EEG-Based BCI Devices to Subliminally Probe for Private Information. WPES@CCS 2017: 133-136 - 2016
- [c50]Richard Baker, Ivan Martinovic:
Secure Location Verification with a Mobile Receiver. CPS-SPC@CCS 2016: 35-46 - [c49]Vincent F. Taylor, Ivan Martinovic:
SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis. SPSM@CCS 2016: 43-52 - [c48]Mai Ben-Adar Bessos, Simon Birnbach, Amir Herzberg, Ivan Martinovic:
Exposing Transmitters in Mobile Multi-Agent Games. CPS-SPC@CCS 2016: 125-136 - [c47]Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Using Reflexive Eye Movements for Fast Challenge-Response Authentication. CCS 2016: 1056-1067 - [c46]Vincent F. Taylor, Ivan Martinovic:
DEMO: Starving Permission-Hungry Android Apps Using SecuRank. CCS 2016: 1850-1852 - [c45]Martin Strohmeier, Matthias Schäfer, Matthew Smith, Vincent Lenders, Ivan Martinovic:
Assessing the impact of aviation security on cyber power. CyCon 2016: 223-241 - [c44]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic. EuroS&P 2016: 439-454 - [c43]Marc Roeschlin, Ivo Sluganovic, Ivan Martinovic, Gene Tsudik, Kasper Bonne Rasmussen:
Generating Secret Keys from Biometric Body Impedance Measurements. WPES@CCS 2016: 59-69 - 2015
- [c42]Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick:
Using Channel State Information for Tamper Detection in the Internet of Things. ACSAC 2015: 131-140 - [c41]Martin Strohmeier, Ivan Martinovic:
On Passive Data Link Layer Fingerprinting of Aircraft Transponders. CPS-SPC@CCS 2015: 1-9 - [c40]Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Lightweight Location Verification in Air Traffic Surveillance Networks. CPSS@ASIACSS 2015: 49-60 - [c39]Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Intrusion Detection for Airborne Communication Using PHY-Layer Information. DIMVA 2015: 67-77 - [c38]Andrew C. Simpson, Andrew P. Martin, Cas Cremers, Ivan Flechais, Ivan Martinovic, Kasper Bonne Rasmussen:
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security. ICSE (2) 2015: 435-444 - [c37]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. NDSS 2015 - 2014
- [c36]Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, Matthias Wilhelm:
Bringing up OpenSky: a large-scale ADS-B sensor network for research. IPSN 2014: 83-94 - [c35]Matthias Schäfer, Martin Strohmeier, Vincent Lenders, Ivan Martinovic, Matthias Wilhelm:
Demonstration abstract: OpenSky: a large-scale ADS-B sensor network for research. IPSN 2014: 313-314 - [c34]Kasper Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, Gene Tsudik:
Authentication Using Pulse-Response Biometrics. NDSS 2014 - [c33]Daniel S. Berger, Francesco Gringoli, Nicolò Facchi, Ivan Martinovic, Jens B. Schmitt:
Gaining insight on friendly jamming in a real-world IEEE 802.11 network. WISEC 2014: 105-116 - 2013
- [c32]Matthias Schäfer, Vincent Lenders, Ivan Martinovic:
Experimental Analysis of Attacks on Next Generation Air Traffic Communication. ACNS 2013: 253-271 - [c31]Martin Strohmeier, Ivan Martinovic, Utz Roedig, Karim El Defrawy, Jens B. Schmitt:
Neighborhood watch: On network coding throughput and key sharing. GLOBECOM 2013: 849-854 - [c30]Arman Boehm, Dongqu Chen, Mario Frank, Ling Huang, Cynthia Kuo, Tihomir Lolic, Ivan Martinovic, Dawn Song:
SAFE: Secure authentication with Face and Eyes. PRISMS 2013: 1-8 - [c29]Tim Stöber, Mario Frank, Jens B. Schmitt, Ivan Martinovic:
Who do you sync you are?: smartphone fingerprinting via application behaviour. WISEC 2013: 7-12 - 2012
- [c28]Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic:
A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols. ESORICS 2012: 235-252 - [c27]Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song:
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. USENIX Security Symposium 2012: 143-158 - 2011
- [c26]Jens B. Schmitt, Nicos Gollan, Steffen Bondorf, Ivan Martinovic:
Pay bursts only once holds for (some) non-FIFO systems. INFOCOM 2011: 1970-1978 - [c25]Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders:
WiFire: a firewall for wireless networks. SIGCOMM 2011: 456-457 - [c24]Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders:
Short paper: reactive jamming in wireless networks: how realistic is the threat? WISEC 2011: 47-52 - 2010
- [c23]Paolo Barsocchi, Stefano Chessa, Ivan Martinovic, Gabriele Oligeri:
AmbiSec: Securing Smart Spaces Using Entropy Harvesting. AmI 2010: 73-85 - [c22]Jens B. Schmitt, Hao Wang, Ivan Martinovic:
A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling. ISoLA (1) 2010: 169-183 - [c21]Sebastian Wille, Norbert Wehn, Ivan Martinovic, Simon Kunz, Peter Göhner:
AmICA - A Flexible, Compact, Easy-to-Program and Low-Power WSN Platform. MobiQuitous 2010: 381-382 - [c20]Dennis Christmann, Ivan Martinovic:
Experimental design and analysis of transmission properties in an indoor wireless sensor network. WiOpt 2010: 342-347 - [c19]Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt:
Secret keys from entangled sensor motes: implementation and analysis. WISEC 2010: 139-144 - 2009
- [c18]Ivan Martinovic:
Security by wireless: why play fairer than the attacker. AINTEC 2009: 33 - [c17]Jens B. Schmitt, Nicos Gollan, Ivan Martinovic:
A New Service Curve Model to Deal with Non-FIFO Systems. KiVS 2009: 143-154 - [c16]Ivan Martinovic, Jens B. Schmitt:
Turning the Tables: Using Wireless Communication Against an Attacker. KiVS 2009: 205-216 - [c15]Jens B. Schmitt, Ivan Martinovic:
Demultiplexing in Network Calculus- A Stochastic Scaling Approach. QEST 2009: 217-226 - [c14]Ivan Martinovic, Paul Pichota, Jens B. Schmitt:
Jamming for good: a fresh approach to authentic communication in WSNs. WISEC 2009: 161-168 - 2008
- [c13]Ivan Martinovic, Nicos Gollan, Jens B. Schmitt:
Firewalling wireless sensor networks: Security by wireless. LCN 2008: 770-777 - [c12]Jens B. Schmitt, Frank A. Zdarsky, Ivan Martinovic:
Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once. MMB 2008: 13-28 - [c11]Nicos Gollan, Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
The DISCO Network Calculator. MMB 2008: 291-294 - [c10]Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, Jens B. Schmitt:
Wireless client puzzles in IEEE 802.11 networks: security by wireless. WISEC 2008: 36-45 - [c9]Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, Jens B. Schmitt:
Design, implementation, and performance analysis of DiscoSec - Service pack for securing WLANs. WOWMOM 2008: 1-10 - 2007
- [c8]Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt:
Regional-based authentication against dos attacks in wireless networks. Q2SWinet 2007: 176-179 - [c7]Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens B. Schmitt:
Phishing in the Wireless: Implementation and Analysis. SEC 2007: 145-156 - 2006
- [c6]Ivan Martinovic, Christof Leng, Frank A. Zdarsky, Andreas Mauthe, Ralf Steinmetz, Jens B. Schmitt:
Self-protection in P2P Networks: Choosing the Right Neighbourhood. IWSOS/EuroNGI 2006: 23-33 - [c5]Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
The Case for Virtualized Wireless Access Networks. IWSOS/EuroNGI 2006: 90-104 - [c4]Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
On Self-coordination in Wireless Community Networks. PWC 2006: 251-262 - 2005
- [c3]Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks. DIALM-POMC 2005: 8-16 - 2004
- [c2]Matthias Hollick, Ivan Martinovic, Tronje Krop, Ivica Rimac:
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks. EUROMICRO 2004: 495-502 - [c1]Meehae Song, Thomas Elias, Ivan Martinovic, Wolfgang Müller-Wittig, Tony K. Y. Chan:
Digital heritage application as an edutainment tool. VRCAI 2004: 163-167
Editorship
- 2014
- [e1]Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia, Patrick Traynor:
7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014. ACM 2014, ISBN 978-1-4503-2972-9 [contents]
Informal and Other Publications
- 2024
- [i50]Joshua Smailes, Edd Salkield, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic:
Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks. CoRR abs/2402.05042 (2024) - [i49]Marcell Szakály, Sebastian Köhler, Ivan Martinovic:
Current Affairs: A Measurement Study of Deployment and Security Trends in EV Charging Infrastructure. CoRR abs/2404.06635 (2024) - [i48]George Webber, Jack Sturgess, Ivan Martinovic:
UserBoost: Generating User-specific Synthetic Data for Faster Enrolment into Behavioural Biometric Systems. CoRR abs/2407.09104 (2024) - [i47]Ivan Martinovic, Josip Saric, Sinisa Segvic:
MC-PanDA: Mask Confidence for Panoptic Domain Adaptation. CoRR abs/2407.14110 (2024) - [i46]Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic:
KeySpace: Public Key Infrastructure Considerations in Interplanetary Networks. CoRR abs/2408.10963 (2024) - [i45]Jack Sturgess, Ivan Martinovic:
A Mobile Payment Scheme Using Biometric Identification with Mutual Authentication. CoRR abs/2409.17181 (2024) - 2023
- [i44]Jack Sturgess, Simon Birnbach, Simon Eberz, Ivan Martinovic:
RingAuth: Wearable Authentication using a Smart Ring. CoRR abs/2301.03594 (2023) - [i43]Joshua Smailes, Edd Salkield, Sebastian Köhler, Simon Birnbach, Ivan Martinovic:
Dishing Out DoS: How to Disable and Secure the Starlink User Terminal. CoRR abs/2303.00582 (2023) - [i42]Ivan Martinovic:
Point Cloud Semantic Segmentation. CoRR abs/2305.00773 (2023) - [i41]Marcell Szakály, Sebastian Köhler, Martin Strohmeier, Ivan Martinovic:
Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks. CoRR abs/2305.06901 (2023) - [i40]Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic:
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting. CoRR abs/2305.06947 (2023) - [i39]Joshua Smailes, Razvan David, Sebastian Köhler, Simon Birnbach, Ivan Martinovic:
POSTER: spaceQUIC: Securing Communication in Computationally Constrained Spacecraft. CoRR abs/2305.12948 (2023) - 2022
- [i38]Martin Georgiev, Simon Eberz, Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Common Evaluation Pitfalls in Touch-Based Authentication Systems. CoRR abs/2201.10606 (2022) - [i37]Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic:
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch. CoRR abs/2202.01736 (2022) - [i36]Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic:
Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging. CoRR abs/2202.02104 (2022) - [i35]Klaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic:
BeeHIVE: Behavioral Biometric System based on Object Interactions in Smart Environments. CoRR abs/2202.03845 (2022) - [i34]Henry Turner, Giulio Lovisotto, Simon Eberz, Ivan Martinovic:
I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy. CoRR abs/2202.06278 (2022) - [i33]Frederick Rawlins, Richard Baker, Ivan Martinovic:
Death By A Thousand COTS: Disrupting Satellite Communications using Low Earth Orbit Constellations. CoRR abs/2204.13514 (2022) - [i32]Martin Georgiev, Simon Eberz, Ivan Martinovic:
Techniques for Continuous Touch-Based Authentication Modeling. CoRR abs/2207.12140 (2022) - [i31]Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic:
RADAR: Effective Network-based Malware Detection based on the MITRE ATT&CK Framework. CoRR abs/2212.03793 (2022) - 2021
- [i30]Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic:
They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors. CoRR abs/2101.10011 (2021) - [i29]Henry Turner, Simon Eberz, Ivan Martinovic:
Recurring Turking: Conducting Daily Task Studies on Mechanical Turk. CoRR abs/2104.12675 (2021) - [i28]Michal Piskozub, Fabio De Gaspari, Frederick Barr-Smith, Luigi V. Mancini, Ivan Martinovic:
MalPhase: Fine-Grained Malware Detection Using Network Flow Data. CoRR abs/2106.00541 (2021) - [i27]Sebastian Köhler, Richard Baker, Ivan Martinovic:
Signal Injection Attacks against CCD Image Sensors. CoRR abs/2108.08881 (2021) - [i26]Siddhartha Datta, Giulio Lovisotto, Ivan Martinovic, Nigel Shadbolt:
Widen The Backdoor To Let More Attackers In. CoRR abs/2110.04571 (2021) - 2020
- [i25]James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband. CoRR abs/2002.05091 (2020) - [i24]Giulio Lovisotto, Henry Turner, Simon Eberz, Ivan Martinovic:
Seeing Red: PPG Biometrics Using Smartphone Cameras. CoRR abs/2004.07088 (2020) - [i23]Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic:
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations. CoRR abs/2007.04137 (2020) - [i22]Matthew Smith, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Understanding Realistic Attacks on Airborne Collision Avoidance Systems. CoRR abs/2010.01034 (2020) - [i21]James Pavur, Ivan Martinovic:
SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research. CoRR abs/2010.10872 (2020) - [i20]Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020. CoRR abs/2010.13457 (2020) - [i19]Ivo Sluganovic, Enis Ulqinaku, Aritra Dhar, Daniele Lain, Srdjan Capkun, Ivan Martinovic:
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients. CoRR abs/2011.13979 (2020) - 2019
- [i18]Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic:
Safety vs. Security: Attacking Avionic Systems with Humans in the Loop. CoRR abs/1905.08039 (2019) - [i17]Giulio Lovisotto, Simon Eberz, Ivan Martinovic:
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating. CoRR abs/1905.09162 (2019) - [i16]Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic:
Classi-Fly: Inferring Aircraft Categories from Open Data. CoRR abs/1908.01061 (2019) - [i15]Chris Xiaoxuan Lu, Bowen Du, Hongkai Wen, Sen Wang, Andrew Markham, Ivan Martinovic, Yiran Shen, Niki Trigoni:
Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning. CoRR abs/1912.04836 (2019) - 2018
- [i14]Ivan Martinovic, Vesna Mandic:
Biomedical Signals Reconstruction Under the Compressive Sensing Approach. CoRR abs/1802.00337 (2018) - 2017
- [i13]Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic:
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis. CoRR abs/1704.06099 (2017) - [i12]Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS). CoRR abs/1705.07065 (2017) - [i11]Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic:
Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones. CoRR abs/1708.03520 (2017) - 2016
- [i10]Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, Ivan Martinovic:
On Perception and Reality in Wireless Air Traffic Communications Security. CoRR abs/1602.08777 (2016) - [i9]Vincent F. Taylor, Ivan Martinovic:
A Longitudinal Study of App Permission Usage across the Google Play Store. CoRR abs/1606.01708 (2016) - [i8]Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N. Asokan, Ivan Martinovic:
TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition. CoRR abs/1610.02801 (2016) - [i7]Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
A Localization Approach for Crowdsourced Air Traffic Communication Networks. CoRR abs/1610.06754 (2016) - [i6]Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik:
FADEWICH: Fast Deauthentication over the Wireless Channel. CoRR abs/1612.08593 (2016) - 2013
- [i5]Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders:
Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference. CoRR abs/1305.4038 (2013) - [i4]Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Security of ADS-B: State of the Art and Beyond. CoRR abs/1307.3664 (2013) - [i3]Mario Frank, Tiffany Hwu, Sakshi Jain, Robert T. Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Dawn Song:
Subliminal Probing for Private Information via EEG-Based BCI Devices. CoRR abs/1312.6052 (2013) - 2012
- [i2]Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song:
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. CoRR abs/1207.6231 (2012) - 2010
- [i1]Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt:
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis. CoRR abs/1005.0712 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint