Ivan Martinovic : Publications
Click here to download all publications in a single bibtex file
@inproceedings{smailes2024sticky, title = "Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks", author = "Smailes, Joshua and Salkield, Edd and Köhler, Sebastian and Birnbach, Simon and Strohmeier, Martin and Martinovic, Ivan", year = "2024", booktitle = "2nd Workshop on Security of Space and Satellite Systems (SpaceSec)", location = "San Diego, CA, USA", month = "Mar", doi = "10.14722/spacesec.2024.23054", }
@article{smailes2024satiq, title = "SatIQ: Extensible and Stable Satellite Authentication using Hardware Fingerprinting", author = "Smailes, Joshua and Köhler, Sebastian and Birnbach, Simon and Strohmeier, Martin and Martinovic, Ivan", year = "2024", journal = "Preprint", month = "October", }
@conference{radar-sharma-eicc23, title = "RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection", author = "Yashovardhan Sharma and Simon Birnbach and Ivan Martinovic", year = "2023", affiliation = "University of Oxford", booktitle = "Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference (EICC'23)", journal = "EICC", location = "Stavanger, Norway", month = "June", pages = "159–166", publisher = "Association for Computing Machinery (ACM)", url = "https://dl.acm.org/doi/10.1145/3590777.3590804", doi = "https://doi.org/10.1145/3590777.3590804", }
@inproceedings{Salkield23, title = "Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks", author = "Salkield, Edd and Szakály, Marcell and Smailes, Joshua and Birnbach, Simon and Köhler, Sebastian and Strohmeier, Martin and Martinovic, Ivan", year = "2023", booktitle = "Proceedings of the 16th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)", month = "May", note = "\textbf{Best Paper Award: Runner Up!}", url = "https://ora.ox.ac.uk/objects/uuid:e9d5d85f-b77f-4f11-8006-17dd88660467/download_file?file_format=application%2Fpdf&safe_filename=Salkield_et_al_2023_satellite_spoofing_from.pdf&type_of_work=Conference+item", }
@article{smailes2023dishing, title = "Dishing Out DoS: How to Disable and Secure the Starlink User Terminal", author = "Smailes, Joshua and Salkield, Edd and Köhler, Sebastian and Birnbach, Simon and Martinovic, Ivan", year = "2023", journal = "arXiv preprint arXiv:2303.00582", month = "March", url = "https://arxiv.org/abs/2303.00582", }
@inproceedings{brokenwire, title = "BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging", author = "Koehler, Sebastian and Baker, Richard and Strohmeier, Martin and Martinovic, Ivan", year = "2023", booktitle = "The Network and Distributed System Security Symposium (NDSS)", month = "Feb", url = "https://brokenwire.fail", }
@inproceedings{smailes2023watch, title = "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting", author = "Smailes, Joshua and Köhler, Sebastian and Birnbach, Simon and Strohmeier, Martin and Martinovic, Ivan", year = "2023", booktitle = "Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 23)", month = "Nov", url = "https://arxiv.org/abs/2305.06947", doi = "10.1145/3576915.3623135", }
@inproceedings{10225000, title = "{To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection}", author = "Sharma, Yashovardhan and Giunchiglia, Eleonora and Birnbach, Simon and Martinovic, Ivan", year = "2023", booktitle = "2023 IEEE International Conference on Cyber Security and Resilience (CSR)", pages = "8-15", doi = "10.1109/CSR57506.2023.10225000", }
@inproceedings{10.1145/3590777.3590804, title = "RADAR: A TTP-Based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection", author = "Sharma, Yashovardhan and Birnbach, Simon and Martinovic, Ivan", year = "2023", address = "New York, NY, USA", booktitle = "Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference", isbn = "9781450398299", keywords = "Network Analysis, Explainable AI, Malware, Cyber Security", location = "Stavanger, Norway", pages = "159–166", publisher = "Association for Computing Machinery", series = "EICC '23", url = "https://doi.org/10.1145/3590777.3590804", doi = "10.1145/3590777.3590804", }
@inproceedings{15776, title = "CableAuth: a biometric second factor authentication scheme for electric vehicle charging", author = "Jack Sturgess and Sebastian Köhler and Simon Birnbach and Ivan Martinovic", year = "2023", booktitle = "Proc. Inaugural Symposium on Vehicle Security and Privacy (VehicleSec 2023)", publisher = "Internet Society", }
@inproceedings{15674, title = "BROKENWIRE: wireless disruption of CCS electric vehicle charging", author = "Sebastian Köhler and Richard Baker and Martin Strohmeier and Ivan Martinovic", year = "2023", booktitle = "In Proc. Network and Distributed System Security (NDSS) Symposium 2023", publisher = "Internet Society", }
@inproceedings{baselt22cycon, title = "Security and Privacy Issues of Satellite Communication in the Aviation Domain", author = "Baselt, Georg and Strohmeier, Martin and Pavur, James and Lenders, Vincent and Martinovic, Ivan", year = "2022", booktitle = "Cyber Conflict (CYCON), 2022 14th International Conference on", month = "May", }
@inproceedings{15677, title = "Fingerprinting and personal information leakage from touchscreen interactions", author = "Martin Georgiev and Simon Eberz and Ivan Martinovic", year = "2022", booktitle = "In Proc. 21st Workshop on Privacy in the Electronic Society (WPES 2022)", publisher = "ACM", }
@inproceedings{15676, title = "Exorcist: automated differential analysis to detect compromises in closed-source software supply chains", author = "Frederick Barr-Smith and Richard Baker and Tim Blazytko and Ivan Martinovic", year = "2022", booktitle = "In Proc. ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED '22)", publisher = "ACM", }
@inproceedings{15675, title = "Techniques for continuous touch-based authentication", author = "Martin Georgiev and Simon Eberz and Ivan Martinovic", year = "2022", booktitle = "In Proc. 17th International Conference on Information Security Practice and Experience (ISPEC 2022)", publisher = "Springer", }
@inproceedings{15673, title = "On the security of the wireless electric vehicle charging communication", author = "Sebastian Köhler and Simon Birnbach and Richard Baker and Ivan Martinovic", year = "2022", booktitle = "Proc. Workshop Cybersecurity of Electric Vehicle Charging and Smart Grid Resources (SECEVC)", publisher = "IEEE", }
@inproceedings{14947, title = "WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch", author = "Jack Sturgess and Simon Eberz and Ivo Sluganovic and Ivan Martinovic", year = "2022", booktitle = "Proc. 7th IEEE European Symposium on Security and Privacy (EuroS&P)", publisher = "IEEE", }
@inproceedings{14899, title = "WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch", author = "Jack Sturgess and Simon Eberz and Ivo Sluganovic and Ivan Martinovic", year = "2022", booktitle = "Proc. 7th IEEE European Symposium on Security and Privacy (EuroS&P)", publisher = "IEEE", }
@inproceedings{14898, title = "Biometric identification system based on object interactions in Internet of Things environments", author = "Klaudia Krawiecka and Simon Birnbach and Simon Eberz and Ivan Martinovic", year = "2022", booktitle = "Proc. IEEE Workshop on the Internet of Safe Things: SafeThings 2022", publisher = "IEEE", }
@inproceedings{14818, title = "Common Evaluation Pitfalls in Touch-Based Authentication Systems", author = "Martin Georgiev and Simon Eberz and Henry Turner and Giulio Lovisotto and Ivan Martinovic", year = "2022", booktitle = "Proc. 2022 ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022)", publisher = "ACM", }
@inproceedings{14808, title = "99% false positives: A qualitative study of SOC analysts' perspectives on security alarms", author = "Bushra AlAhmadi and Louise Axon and Ivan Martinovic", year = "2022", booktitle = "Proc. 31st USENIX Security Symposium", }
@inproceedings{14803, title = "Signal injection attacks against CCD image sensors", author = "Sebastian Kohler and Richard Baker and Ivan Martinovic", year = "2022", booktitle = "Proc. 2022 ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022)", publisher = "ACM", }
@inproceedings{14801, title = "Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch", author = "Jack Sturgess and Simon Eberz and Ivo Sluganovic and Ivan Martinovic", year = "2022", booktitle = "Proc. WristSense 2022: Workshop on Sensing Systems and Applications Using Wrist Worn Smart Devices", publisher = "IEEE", }
@inproceedings{strohmeier21critis, title = "Studying Neutrality in Cyber-Space: A Comparative Geographical Analysis of Honeypot Responses", author = "Strohmeier, Martin and Pavur, James and Martinovic, Ivan and Lenders, Vincent", year = "2021", booktitle = "International Conference on Critical Information Infrastructures Security", month = "September", organization = "Springer", url = "https://link.springer.com/chapter/10.1007/978-3-030-93200-8_11", doi = "10.1007/978-3-030-93200-8_11", }
@inproceedings{lovisotto2021slap, title = "SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations", author = "Lovisotto, Giulio and Turner, Henry and Sluganovic, Ivo and Strohmeier, Martin and Martinovic, Ivan", year = "2021", booktitle = "30th USENIX Security Symposium (USENIX Security 21)", month = "August", url = "https://www.usenix.org/conference/usenixsecurity21/presentation/lovisotto", }
@inproceedings{smailesCPSS2021, title = "You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications", author = "Smailes, Joshua and Moser, Daniel and Smith, Matthew and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan", year = "2021", booktitle = "Proceedings of the 7th ACM Cyber-Physical System Security Workshop (CPSS 2021)", month = "June", note = "\textbf{Best Paper Award!}", url = "https://dl.acm.org/doi/abs/10.1145/3457339.3457985", doi = "10.1145/3457339.3457985", }
@inproceedings{pavurCycon2021, title = "{In the Same Boat: On Small Satellites, Big Rockets, and Cyber-Trust}", author = "Pavur, James and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan", year = "2021", booktitle = "13th International Conference on Cyber Conflict (CyCon)", month = "May", organization = "IEEE", url = "https://ccdcoe.org/uploads/2021/05/CyCon_2021_Pavur_Strohmeier_Lenders_Martinovic.pdf", }
@inproceedings{pavurndss2021, title = "QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit", author = "James Pavur and Martin Strohmeier and Vincent Lenders and Ivan Martinovic", year = "2021", booktitle = "The Network and Distributed System Security Symposium (NDSS)", month = "Feb", url = "https://www.ndss-symposium.org/ndss-paper/qpep-an-actionable-approach-to-secure-and-performant-broadband-from-geostationary-orbit/", }
@article{StrohmeierTIST2021, title = "Classi-Fly: Inferring Aircraft Categories from Open Data", author = "Strohmeier, Martin and Smith, Matthew and Lenders, Vincent and Martinovic, Ivan", year = "2021", journal = "ACM Transactions on Intelligent Systems and Technology (TIST)", month = "December", number = "6", url = "https://dl.acm.org/doi/10.1145/3480969", volume = "12", doi = "10.1145/3480969", }
@inproceedings{sun2021opensky, title = "OpenSky Report 2021: Insights on ADS-B Mandate and Fleet Deployment in Times of Crisis", author = "Sun, Junzi and Olive, Xavier and Strohmeier, Martin and Schäfer, Matthias and Martinovic, Ivan and Lenders, Vincent", year = "2021", booktitle = "2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC)", month = "October", organization = "IEEE", url = "https://ieeexplore.ieee.org/document/9594361/", doi = "10.1109/DASC52595.2021.9594361", }
@article{14809, title = "#PrettyFlyForAWiFi: real-world detection of privacy invasion attacks by drones", author = "Simon Birnbach and Richard Baker and Simon Eberz and Ivan Martinovic", year = "2021", journal = "ACM Transactions on Privacy and Security", publisher = "ACM", doi = "10.1145/3473672", }
@article{14804, title = "Haunted house: physical smart home event verification in the presence of compromised sensors", author = "Simon Birnbach and Simon Eberz and Ivan Martinovic", year = "2021", journal = "ACM Transactions on Internet of Things", publisher = "ACM", }
@article{14800, title = "Generating identities with mixture models for speaker anonymization", author = "Henry Turner and Giulio Lovisotto and Ivan Martinovic", year = "2021", journal = "Computer Speech and Language 72", doi = "10.1016/j.csl.2021.101318", }
@inproceedings{14810, title = "On detecting deception in space situational awareness", author = "James Pavur and Ivan Martinovic", year = "2021", booktitle = "Proc. 16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2021)", publisher = "ACM", doi = "10.1145/3433210.3453081", }
@inproceedings{14806, title = "Plug-and-play: Framework for remote experimentation in cyber security", author = "Klaudia Krawiecka and Jack Sturgess and Alina Petrova and Ivan Martinovic", year = "2021", booktitle = "Proc. 2021 European Symposium on Usable Security (EuroUSEC 2021)", publisher = "ACM", doi = "10.1145/3481357.3481518", }
@inproceedings{14805, title = "They see me rollin': inherent vulnerability of the rolling shutter in CMOS image sensors", author = "Sebastian Köhler and Giulio Lovisotto and Simon Birnbach and Richard Baker and Ivan Martinovic", year = "2021", booktitle = "Proc. Annual Computer Security Applications Conference (ACSAC 2021)", publisher = "ACM", doi = "10.1145/3485832.3488016", }
@conference{14601, title = "MalPhase: Fine-Grained Malware Detection Using Network Flow Data", author = "Michal Piskozub and Fabio De Gaspari and Freddie Barr-Smith and Luigi Mancini and Ivan Martinovic", year = "2021", journal = "Proceedings of the 16th ACM Asia Conference on Computer and Communications Security", }
@conference{survivalism, title = "Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land", author = "Frederick Barr-Smith and Xabier Ugarte-Pedrero and Mariano Graziano and Riccardo Spolaor and Ivan Martinovic", year = "2021", booktitle = "2021 IEEE Symposium on Security and Privacy (SP)", journal = "IEEE Symposium on Security and Privacy (S&P)", organization = "IEEE", }
@inproceedings{lovisotto2020biometric, title = "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating", author = "Lovisotto, Giulio and Eberz, Simon and Martinovic, Ivan", year = "2020", booktitle = "2020 IEEE European Symposium on Security and Privacy (EuroS&P)", month = "September", organization = "IEEE", url = "https://github.com/ssloxford/biometric-backdoors", doi = "10.1109/EuroSP48549.2020.00020", }
@inproceedings{lovisotto2020seeingred, title = "Seeing Red: PPG Biometrics Using Smartphone Cameras", author = "Lovisotto, Giulio and Turner, Henry and Eberz, Simon and Martinovic, Ivan", year = "2020", affiliation = "University of Oxford", booktitle = "IEEE 15th Computer Society Workshop on Biometrics", journal = "IEEE 15th Computer Society Workshop on Biometrics", location = "Seattle, Washington", month = "June", organization = "IEEE", }
@inproceedings{Pavur2019oakland, title = "A Tale of Sea and Sky: On the Security of Maritime VSAT Communications", author = "Pavur, James and Moser, Daniel and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan", year = "2020", booktitle = "2020 IEEE Symposium on Security and Privacy (S&P)", month = "May", organization = "IEEE", url = "https://www.computer.org/csdl/proceedings-article/sp/2020/349700b025/1j2Lg3MvKpi", doi = "10.1109/SP40000.2020.00056", }
@inproceedings{SmithNDSS2020, title = "A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems", author = "Smith, Matthew and Strohmeier, Martin and Harman, Jon and Lenders, Vincent and Martinovic, Ivan", year = "2020", booktitle = "The Network and Distributed System Security Symposium (NDSS)", month = "Feb", url = "https://www.ndss-symposium.org/ndss-paper/a-view-from-the-cockpit-exploring-pilot-reactions-to-attacks-on-avionic-systems/", }
@article{smith2020understanding, title = "Understanding Realistic Attacks on Airborne Collision Avoidance Systems", author = "Smith, Matthew and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan", year = "2020", journal = "arXiv preprint arXiv:2010.01034", }
@article{strohmeier2019applicability, title = "On the Applicability of Satellite-based Air Traffic Control Communication for Security", author = "Strohmeier, Martin and Moser, Daniel and Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan", year = "2019", journal = "IEEE Communications Magazine", month = "September", number = "9", pages = "79 - 85", publisher = "IEEE", url = "https://ieeexplore.ieee.org/document/8847232", volume = "57", doi = "10.1109/MCOM.001.1900037", }
@inproceedings{schafer2019opensky, title = "OpenSky Report 2019: Analysing TCAS in the Real World using Big Data", author = "Schäfer, Matthias and Olive, Xavier and Strohmeier, Martin and Smith, Matthew and Martinovic, Ivan and Lenders, Vincent", year = "2019", booktitle = "2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC)", month = "September", organization = "IEEE", pages = "1--9", url = "https://ieeexplore.ieee.org/document/9081686", doi = "10.1109/DASC43569.2019.9081686", }
@article{strohmeier2019classi, title = "Classi-Fly: Inferring Aircraft Categories from Open Data", author = "Strohmeier, Martin and Smith, Matthew and Lenders, Vincent and Martinovic, Ivan", year = "2019", journal = "arXiv preprint arXiv:1908.01061", month = "August", url = "https://arxiv.org/abs/1908.01061", }
@article{smith2019safety, title = "Safety vs. Security: Attacking Avionic Systems with Humans in the Loop", author = "Smith, Matthew and Strohmeier, Martin and Harman, Jon and Lenders, Vincent and Martinovic, Ivan", year = "2019", journal = "arXiv preprint arXiv:1905.08039", month = "May", url = "https://arxiv.org/abs/1905.08039", }
@inproceedings{peeves, title = "Peeves: Physical Event Verification in Smart Homes", author = "Birnbach, Simon and Eberz, Simon and Martinovic, Ivan", year = "2019", booktitle = "Proceedings of the 2019 ACM Conference on Computer and Communications Security (CCS)", }
@inproceedings{baker2019losing, title = "Losing the Car Keys: Wireless PHY-Layer Insecurity in {EV} Charging", author = "Baker, Richard and Martinovic, Ivan", year = "2019", booktitle = "28th {USENIX} Security Symposium ({USENIX} Security 19)", pages = "407--424", }
@inproceedings{turner2019attacking, title = "Attacking Speaker Recognition Systems with Phoneme Morphing", author = "Turner, Henry and Lovisotto, Giulio and Martinovic, Ivan", year = "2019", booktitle = "European Symposium on Research in Computer Security (ESORICS)", organization = "Springer", pages = "471--492", doi = "10.1007/978-3-030-29959-0_23", }
@inproceedings{eberz201928, title = "28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics", author = "Eberz, Simon and Lovisotto, Giulio and Rasmussen, Kasper B and Lenders, Vincent and Martinovic, Ivan", year = "2019", booktitle = "Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security", organization = "ACM", pages = "1187--1199", doi = "10.1145/3319535.3354233", }
@inproceedings{schaeferDASC2018, title = "OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS-B Data", author = "Matthias Schäfer and Martin Strohmeier and Matthew Smith and Markus Fuchs and Vincent Lenders and Ivan Martinovic", year = "2018", booktitle = "Digital Avionics Systems Conference (DASC), 2018 IEEE/AIAA 37th", month = "Sep", url = "https://ieeexplore.ieee.org/abstract/document/8569833", doi = "10.1109/DASC.2018.8569833", }
@inproceedings{Smith2018, title = "{Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)}", author = "Smith, Matthew and Moser, Daniel and Strohmeier, Martin and Martinovic, Ivan and Lenders, Vincent", year = "2018", address = "Barcelona", booktitle = "18th Privacy Enhancing Technologies Symposium (PETS 2018)", month = "July", url = "https://content.sciendo.com/view/journals/popets/2018/3/article-p105.xml", doi = "10.1515/popets-2018-0023", }
@article{strohmeier2018TAES, title = "A k-NN-based Localization Approach for Crowdsourced Air Traffic Communication Networks", author = "Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan", year = "2018", journal = "IEEE Transactions on Aerospace and Electronic Systems", month = "June", number = "3", pages = "1519 - 1529", url = "http://ieeexplore.ieee.org/document/8268121/", volume = "54", doi = "10.1109/TAES.2018.2797760", }
@inproceedings{strohmeier2018cycon, title = "{Utilizing Air Traffic Communications for OSINT on State and Government Aircraft}", author = "Strohmeier, Martin and Smith, Matthew and Moser, Daniel and Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan", year = "2018", booktitle = "{Cyber Conflict (CYCON), 2018 10th International Conference on}", month = "may", organization = "IEEE", url = "https://ieeexplore.ieee.org/document/8405023/", doi = "10.23919/CYCON.2018.8405023", }
@inproceedings{strohmeierEuroSNP18, title = "The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication", author = "Strohmeier, Martin and Smith, Matthew and Lenders, Vincent and Martinovic, Ivan", year = "2018", booktitle = "IEEE European Symposium on Security and Privacy (EuroS&P) 2018", month = "apr", organization = "IEEE", url = "https://ieeexplore.ieee.org/document/8406594/", doi = "10.1109/EuroSP.2018.00016", }
@inproceedings{baker2018empower, title = "EMPower: Detecting Malicious Power Line Networks from EM Emissions", author = "Baker, Richard and Martinovic, Ivan", year = "2018", booktitle = "IFIP International Conference on ICT Systems Security and Privacy Protection", organization = "Springer", pages = "108--121", }
@inproceedings{eberz2018your, title = "When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts", author = "Eberz, Simon and Lovisotto, Giulio and Patane, Andrea and Kwiatkowska, Marta and Lenders, Vincent and Martinovic, Ivan", year = "2018", booktitle = "2018 IEEE Symposium on Security and Privacy (SP)", organization = "IEEE", pages = "889--905", doi = "10.1109/SP.2018.00053", }
@conference{11247, title = "Snoopy: Sniffing Your Smartwatches Passwords via Deep Sequence Learning", author = "Chris Xiaoxuan Lu and Bowen Du and Hongkai Wen and Sen Wang and Andrew Markham and Ivan Martinovic and Yiran Shen and Niki Trigoni", year = "2018", booktitle = "ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp)", journal = "Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies", }
@article{strohmeierITS, title = "On Perception and Reality in Wireless Air Traffic Communication Security", author = "Strohmeier, Martin and Sch{\"a}fer, Matthias and Pinheiro, Rui and Lenders, Vincent and Martinovic, Ivan", year = "2017", issn = "1524-9050", journal = "IEEE Transactions on Intelligent Transportation Systems", month = "June", number = "6", pages = "1338-1357", publisher = "IEEE", url = "http://ieeexplore.ieee.org/document/7589091/", volume = "18", doi = "10.1109/TITS.2016.2612584", }
@article{2017arXiv170507065S, title = "{Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS)}", author = "{Smith}, Matthew and {Moser}, Daniel and {Strohmeier}, Martin and {Lenders}, Vincent and {Martinovic}, Ivan", year = "2017", journal = "ArXiv e-prints", keywords = "Computer Science - Cryptography and Security, Computer Science - Computers and Society", month = "may", url = "https://arxiv.org/pdf/1705.07065.pdf", }
@inproceedings{strohmeier2017cycon, title = "Crowdsourcing Security for Wireless Air Traffic Communications", author = "Strohmeier, Martin and Smith, Matthew and Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan", year = "2017", booktitle = "{Cyber Conflict (CYCON), 2017 9th International Conference on}", month = "May", organization = "IEEE", url = "http://ieeexplore.ieee.org/document/8240336/", doi = "10.23919/CYCON.2017.8240336", }
@inproceedings{smithFC, title = "{Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS}", author = "Smith, Matthew and Moser, Daniel and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan", year = "2017", booktitle = "International Conference on Financial Cryptography and Data Security 2017", month = "apr", publisher = "Springer", url = "https://link.springer.com/chapter/10.1007/978-3-319-70972-7_15", doi = "10.1007/978-3-319-70972-7_15", }
@inproceedings{Sluganovic2017ACSAC, title = "{HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens}", author = "Sluganovic, Ivo and Serbec, Matej and Derek, Ante and Martinovic, Ivan", year = "2017", booktitle = "Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)", month = "December", pages = "13", }
@inproceedings{wifly, title = "Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones", author = "Birnbach, Simon and Baker, Richard and Martinovic, Ivan", year = "2017", booktitle = "Proceedings of the 24th Annual Network and Distributed System Security Symposium ({NDSS})", }
@techreport{RR-17-03, title = "Mobile Biometrics in Financial Services: A Five Factor Framework", author = "Giulio Lovisotto and Raghav Malik and Ivo Sluganovic and Marc Roeschlin and Paul Trueman and Ivan Martinovic", year = "2017", affiliation = "University of Oxford", }
@inproceedings{schaeferDASC2016, title = "OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS-B Usage", author = "Matthias Schäfer and Martin Strohmeier and Matthew Smith and Markus Fuchs and Rui Pinheiro and Vincent Lenders and Ivan Martinovic", year = "2016", booktitle = "Digital Avionics Systems Conference (DASC), 2016 IEEE/AIAA 35th", location = "Sacramento, CA, USA", month = "Sep", url = "http://ieeexplore.ieee.org/document/7778030/", doi = "10.1109/DASC.2016.7778030", }
@article{Eberz:2016:LLE:2957761.2904018, title = "Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics", author = "Eberz, Simon and Rasmussen, Kasper B. and Lenders, Vincent and Martinovic, Ivan", year = "2016", address = "New York, NY, USA", issn = "2471-2566", journal = "ACM Transactions on Privacy and Security", keywords = "Biometrics, continuous authentication, metrics", month = "June", number = "1", publisher = "ACM", volume = "19", }
@inproceedings{strohmeier2016cycon, title = "Assessing the Impact of Aviation Security on Cyber Power", author = "Strohmeier, Martin and Smith, Matthew and Sch{\"{a}}fer, Matthias and Lenders, Vincent and Martinovic, Ivan", year = "2016", booktitle = "{Cyber Conflict (CYCON), 2016 8th International Conference on}", location = "Tallinn, Estonia", month = "May", organization = "IEEE", url = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7529437", doi = "10.1109/CYCON.2016.7529437", }
@inproceedings{goe, title = "Exposing Transmitters in Mobile Multi-Agent Games", author = "Ben-Adar Bessos and Mai and Birnbach, Simon and Herzberg, Amir and Martinovic, Ivan", year = "2016", booktitle = "Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC)", organization = "ACM", pages = "125--136", }
@inproceedings{baker2016secure, title = "Secure location verification with a mobile receiver", author = "Baker, Richard and Martinovic, Ivan", year = "2016", booktitle = "Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy", pages = "35--46", }
@inproceedings{rasmussen15NDSS, title = "Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics", author = "Simon Eberz and Kasper B. Rasmussen and Vincent Lenders and Ivan Martinovic", year = "2015", booktitle = "The Network and Distributed System Security Symposium (NDSS)", month = "February", }
@article{strohmeier2014surveys, title = "On the Security of the Automatic Dependent Surveillance-Broadcast Protocol", author = "Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan", year = "2015", issn = "1553-877X", journal = "IEEE Communications Surveys & Tutorials", number = "2", pages = "1066 - 1087", publisher = "IEEE", url = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6940209", volume = "17", doi = "10.1109/COMST.2014.2365951", }
@inproceedings{Schaefer14, title = "{Bringing Up OpenSky: A Large-scale ADS-B Sensor Network for Research}", author = "Sch{\"a}fer, Matthias and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan and Wilhelm, Matthias", year = "2014", booktitle = "ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)", month = "apr", }
@inproceedings{contauth, title = "Authentication Using Pulse-Response Biometrics", author = "Rasmussen, Kasper Bonne and Roeschlin, Marc and Martinovic, Ivan and Tsudik, Gene", year = "2014", booktitle = "The Network and Distributed System Security Symposium ({NDSS})", month = "2", }
@article{Strohmeier14, title = "{Realities and Challenges of NextGen Air Traffic Management: The Case of ADS-B}", author = "Strohmeier, Martin and Sch{\"a}fer, Matthias and Lenders, Vincent and Martinovic, Ivan", year = "2014", journal = "Communications Magazine, IEEE", number = "5", publisher = "IEEE", volume = "52", }
@inproceedings{BGFMS14, title = "Gaining Insight on Friendly Jamming in a Real-world IEEE 802.11 Network", author = "Berger, Daniel S. and Gringoli, Francesco and Facchi, Nicol`{o} and Martinovic, Ivan and Schmitt, Jens", year = "2014", address = "New York, NY, USA", booktitle = "Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks", isbn = "978-1-4503-2972-9", keywords = "defensive jamming, friendly jamming, ieee 802.11, jamming for good, reactive jamming, wi-fi, wlan", location = "Oxford, United Kingdom", pages = "105--116", publisher = "ACM", series = "WiSec '14", url = "http://www.ing.unibs.it/~openfwwf/friendlyjammer/wisec-2014-gaininginsight.pdf", doi = "10.1145/2627393.2627403", }
@article{WMS13, title = "Secure Key Generation in Sensor Networks Based on Frequency-selective Channels", author = "Matthias Wilhelm and Ivan Martinovic and Jens Schmitt", year = "2013", journal = "IEEE Journal on Selected Areas in Communications (JSAC) - Signal Processing Techniques for Wireless Physical Layer Security", month = "sep", number = "9", pages = "1779-1790", url = "http://dx.doi.org/10.1109/JSAC.2013.130911", volume = "31", }
@article{ITFS12, title = "Touchalytics: On the Applicability of Touchscreen Input as a Behavioural Biometric for Continuous Authentication", author = "Mario Frank and Ralf Biedert and Eugene Ma and Ivan Martinovic and Dawn Song", year = "2013", journal = "IEEE Transactions on Information Forensics and Security", month = "january", number = "1", volume = "8", doi = "10.1109/TIFS.2012.2225048", }
@inproceedings{Prisms13, title = "SAFE: Secure Authentication with Face and Eyes", author = "Boehm, Arman and Chen, Dongqu and Frank, Mario and Huang, Ling and Kuo, Cynthia and Lolic, Tihomir and Martinovic, Ivan and Song,Dawn", year = "2013", booktitle = "Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems (successor of MobiSec). Proceedings in preparation.", note = "\textbf{Best Paper Award}", url = "http://www2.berkeley.intel-research.net/~hling/research/safeI3e.pdf", }
@inproceedings{ACNS13, title = "Experimental Analysis of Attacks on Next Generation Air Traffic Communication", author = "Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan", year = "2013", booktitle = "Applied Cryptography and Network Security (ACNS’13)", isbn = "978-3-642-38979-5", keywords = "NextGen; ADS-B; Attacks; Security; Threats; Air Safety", pages = "253-271", publisher = "Springer Berlin Heidelberg", series = "Lecture Notes in Computer Science", url = "http://dx.doi.org/10.1007/978-3-642-38980-1_16", volume = "7954", doi = "10.1007/978-3-642-38980-1_16", }
@inproceedings{SFSM13, title = "Who do you sync you are: smartphone fingerprinting via application behaviour", author = "St\"{o}ber, Tim and Frank, Mario and Schmitt, Jens and Martinovic, Ivan", year = "2013", booktitle = "Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks", isbn = "978-1-4503-1998-0", location = "Budapest, Hungary", pages = "7--12", publisher = "ACM", series = "WiSec '13", }
@techreport{RR-13-10, title = "Security of ADS-B: State of the Art and Beyond", author = "Martin Strohmeier and Vincent Lenders and Ivan Martinovic", year = "2013", institution = "DCS", number = "RR-13-10", pages = "20", }
@inproceedings{Esorics12, title = "A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols", author = "Eberz, Simon and Strohmeier, Martin and Wilhelm, Matthias and Martinovic, Ivan", year = "2012", booktitle = "17th European Symposium on Research in Computer Security (ESORICS)", isbn = "978-3-642-33166-4", location = "Pisa, Italy", month = "sep", pages = "235-252", publisher = "Springer", series = "Lecture Notes in Computer Science", url = "http://link.springer.com/chapter/10.1007/978-3-642-33167-1_14", volume = "7459", doi = "10.1007/978-3-642-33167-1_14", }
@inproceedings{Usenix12, title = "On the Feasibility of Side-channel Attacks with Brain-computer Interfaces", author = "Martinovic, Ivan and Davies, Doug and Frank, Mario and Perito, Daniele and Ros, Tomas and Song, Dawn", year = "2012", address = "Berkeley, CA, USA", booktitle = "Proceedings of the 21st USENIX Conference on Security Symposium", location = "Bellevue, WA", month = "aug", pages = "34–46", publisher = "USENIX Association", series = "Security'12", url = "https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final56.pdf", }
@inproceedings{GazeBasedIntrusionDetection, title = "Stimuli for Gaze Based Intrusion Detection", author = "Biedert, Ralf and Frank, Mario and Martinovic, Ivan and Song, Dawn", year = "2012", booktitle = "Future Information Technology, Application, and Service", isbn = "978-94-007-4516-2", month = "jul", note = "10.1007/978-94-007-4516-2_80", pages = "757-763", publisher = "Springer Netherlands", series = "Lecture Notes in Electrical Engineering", url = "http://dx.doi.org/10.1007/978-94-007-4516-2_80", volume = "164", }
@inproceedings{WMSL11-2, title = "{WiFire}: A Firewall for Wireless Networks", author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt and Vincent Lenders", year = "2011", address = "New York, NY, USA", booktitle = "Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '11)", location = "Toronto, Canada", month = "aug", pages = "456--457", publisher = "ACM", }
@inproceedings{WMSL11-1, title = "Reactive Jamming in Wireless Networks: How Realistic is the Threat?", author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt and Vincent Lenders", year = "2011", address = "New York, NY, USA", booktitle = "Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec '11)", location = "Hamburg, Germany", month = "jun", pages = "47--52", publisher = "ACM", url = "http://dl.acm.org/authorize?431905", }
@inproceedings{SGBM11-1, title = "Pay Bursts Only Once Holds for (Some) Non-FIFO Systems", author = "Jens B. Schmitt and Nicos Gollan and Steffen Bondorf and Ivan Martinovic", year = "2011", address = "Shanghai, China", booktitle = "The 30th IEEE International Conference on Computer Communications (INFOCOM 2011)", month = "apr", note = "Accepted for publication.", }
@article{WMSL11-3, title = "{WiSec} 2011 Demo: {RFReact}---A Real-time Capable and Channel-aware Jamming Platform", author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt and Vincent Lenders", year = "2011", address = "New York, NY, USA", issn = "1559-1662", journal = "{SIGMOBILE} Mobile Computing and Communications Review", month = "nov", pages = "41--42", publisher = "ACM", url = "http://doi.acm.org/10.1145/2073290.2073300", volume = "15", doi = "http://doi.acm.org/10.1145/2073290.2073300", }
@techreport{SGBM10-1, title = "Pay Bursts Only Once Holds for (Some) Non-FIFO Systems", author = "Jens Schmitt and Nicos Gollan and Steffen Bondorf and Ivan Martinovic", year = "2010", institution = "University of Kaiserslautern, Germany", month = "jul", number = "378/10", }
@inproceedings{CM10-1, title = "{Experiental Design and Analysis of Transmission Properties in an Indoor Wireless Sensor Network}", author = "Dennis Christmann and Ivan Martinovic", year = "2010", address = "Avignon, France", booktitle = "Proceedings of the 6th International Workshop on Wireless Network Measurements ({WiNMee}), in conjunction with WiOpt 2010", month = "may", publisher = "IEEE Computer Society", }
@techreport{WMS10-2, title = "{Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels: Design, Implementation, and Analysis}", author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt", year = "2010", institution = "ArXiv.org", month = "may", number = "arXiv:1005.0712v1 [cs.CR]", url = "http://arxiv.org/pdf/1005.0712v1", }
@inproceedings{WMS10-1, title = "Secret Keys from Entangled Sensor Motes: Implementation and Analysis", author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt", year = "2010", booktitle = "Proceedings of the Third ACM Conference on Wireless Network Security (WiSec '10)", location = "Hoboken, NJ, USA", month = "mar", pages = "139--144", publisher = "ACM", }
@article{CMS10-1, title = "Analysis of Transmission Properties in an Indoor Wireless Sensor Network Based on a Full-Factorial Design", author = "Dennis Christmann and Ivan Martinovic and Jens B. Schmitt", year = "2010", issn = "doi: 10.1088/0957-0233/21/12/124003", journal = "Special Issue on Wireless Sensor Networks - Designing for Real-world Deployment and Deployment Experiences, Measurement Science and Technology, Institute of Physics", month = "Dec", note = "In Print.", number = "12", volume = "21", }
@article{SWM10-1, title = "Dynamic Demultiplexing in Network Calculus -- Theory and Application", author = "Jens B. Schmitt and Hao Wang and Ivan Martinovic", year = "2010", issn = "doi: doi:10.1016/j.peva.2010.12.002", journal = "Performance Evaluation, Elsevier", month = "Dec", note = "In Press (available online). DOI: 10.1016/j.peva.2010.12.002", }
@inproceedings{WWMKG10-1, title = "{AmICA -- A flexible, compact, easy-to-program, and low-power WSN platform}", author = "Sebastian Wille and Norbert Wehn and Ivan Martinovic and Simon Kunz and Peter Göhner", year = "2010", booktitle = "{Proceedings of 7th International Conference on Mobile and Ubiquitous Systems (Mobiqutious)}", month = "dec", publisher = "Springer Verlag", }
@inproceedings{BCMO-1, title = "{AmbiSec: Securing Smart Spaces Using Entropy Harvesting}", author = "Paolo Barsocchi and Stefano Chessa and Ivan Martinovic and Gabriele Oligeri", year = "2010", booktitle = "{Proceedings of the First International Joint Conference on Ambient Intelligence (AmI-10)}", month = "nov", publisher = "Springer Verlag", }
@inproceedings{WMUS10-1, title = "{SUDOKU}: Secure and Usable Deployment of Keys on Wireless Sensors", author = "Matthias Wilhelm and Ivan Martinovic and Ersin Uzun and Jens B. Schmitt", year = "2010", booktitle = "Proceedings of the 6th Annual Workshop on Secure Network Protocols (NPSec '10)", location = "Kyoto, Japan", month = "oct", pages = "1--6", publisher = "IEEE", url = "publications/WMUS10-1.pdf", doi = "10.1109/NPSEC.2010.5634458", }
@inproceedings{SGM10-1, title = "{A Self-Adversarial Approach to Delay Analysis under Arbitrary Scheduling}", author = "Jens Schmitt and Hao Wang and Ivan Martinovic", year = "2010", booktitle = "{Proceedings of 4th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2010)}", month = "oct", publisher = "Springer Verlag", }
@inproceedings{SM09-1, title = "{Demultiplexing in Network Calculus - A Stochastic Scaling Approach}", author = "Jens B. Schmitt and Ivan Martinovic", year = "2009", address = "Budapest, Hungary", booktitle = "Proceedings of the 6th International Conference on Quantitative Evaluation of SysTems (QEST) 2009", month = "sep", pages = "82--93", publisher = "IEEE Computer Society", }
@article{MCGS09-1, title = "{Chaotic Communication Improves Authentication: Protecting WSNs Against Injection Attacks}", author = "Ivan Martinovic and Luc Cappellaro and Nicos Gollan and Jens B. Schmitt", year = "2009", journal = "Security and Communication Networks, Special Issue on Security in Wireless Sensor Networks, Wiley", month = "mar", number = "2", pages = "117--132", publisher = "Wiley", volume = "2", }
@inproceedings{SGM09-1, title = "{A New Service Curve Model to Deal with Non-FIFO Systems}", author = "Jens B. Schmitt and Nicos Gollan and Ivan Martinovic", year = "2009", booktitle = "16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany", month = "mar", note = "143--154", publisher = "Springer Informatik Aktuell", }
@inproceedings{MS09-1, title = "{Turning The Tables: Using Wireless Communication Against An Attacker}", author = "Ivan Martinovic and Jens B. Schmitt", year = "2009", booktitle = "16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany", month = "mar", pages = "205--216", publisher = "Springer Informatik Aktuell", }
@inproceedings{MPS09-1, title = "{Jamming for Good: A Fresh Approach to Authentic Communication in WSNs}", author = "Ivan Martinovic and Paul Pichota and Jens B. Schmitt", year = "2009", address = "Zurich, Switzerland", booktitle = "Proceedings of the ACM Conference on Wireless Network Security (WiSec 2009)", month = "mar", pages = "161--168", publisher = "ACM Press", }
@inproceedings{WMS09-2, title = "{Light-weight Key Generation based on Physical Properties of Wireless Channels}", author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt", year = "2009", address = "University of Trier, Germany", booktitle = "{Proceedings of the 11. Kryptotag der Gesellschaft f\"ur Informatik e.V.}", location = "Trier, Germany", month = "nov", pages = "4", }
@inproceedings{AINTEC09-3, title = "{Security by Wireless or Why Play Fairer than the Attacker?}", author = "Ivan Martinovic", year = "2009", address = "Bangkok, Thailand", booktitle = "Proceedings of the 5th ACM SIGCOMM Asian Internet Engineering Conference (AINTEC) 2009", month = "nov", publisher = "ACM, invited paper", }
@inproceedings{WMS09-1, title = "On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties", author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt", year = "2009", booktitle = "{Proceedings of the 5th Annual Workshop on Secure Network Protocols (NPSec '09)}", location = "Princeton, NJ, USA", month = "oct", pages = "37--42", publisher = "IEEE Computer Society", }
@article{MPWZS09-1, title = "Bringing law and order to IEEE 802.11 networks -- A case for DiscoSec", author = "Ivan Martinovic and Paul Pichota and Matthias Wilhelm and Frank A. Zdarsky and Jens B. Schmitt", year = "2009", issn = "1574--1192", journal = "Pervasive and Mobile Computing (PMC)", number = "5", pages = "510--525", publisher = "Elsevier", volume = "5", }
@inproceedings{MS08-1, title = "{A Novel Approach for a Lightweight, Crypto-free Message Authentication in Wireless Sensor Networks}", author = "Ivan Martinovic and Jens B. Schmitt", year = "2008", booktitle = "Proceedings of the 7. GI/ITG KuVS Fachgespr\"ach "Drahtlose Sensornetze", Berlin, Germany", month = "sep", }
@techreport{SGM08, title = "{End-to-End Worst-Case Analysis of Non-FIFO Systems}", author = "Jens B. Schmitt and Nicos Gollan and Ivan Martinovic", year = "2008", institution = "University of Kaiserslautern, Germany", month = "aug", number = "370/08", }
@inproceedings{MPWZS08-1, title = "Design, Implementation, and Performance Analysis of DiscoSec -- Service Pack for Securing WLANs", author = "Ivan Martinovic and Paul Pichota and Matthias Wilhelm and Frank A. Zdarsky and Jens B. Schmitt", year = "2008", address = "Newport Beach, CA, USA", booktitle = "9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2008)", month = "jun", note = "Accepted as noteworthy contribution.", pages = "1--10", }
@inproceedings{MZMWS-1, title = "Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless", author = "Ivan Martinovic and Frank A. Zdarsky and Matthias Wilhelm and Christian Wegmann and Jens B. Schmitt", year = "2008", booktitle = "Proceedings of the ACM Conference on Wireless Network Security (WiSec '08)", location = "Alexandria, VA, USA", month = "mar", pages = "36--45", publisher = "ACM Press", }
@inproceedings{GZMS08-1, title = "The DISCO Network Calculator", author = "Nicos Gollan and Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt", year = "2008", address = "Dortmund, Germany", booktitle = "14th GI/ITG Conference on Measurement, Modeling, and Evaluation of Computer and Communication Systems (MMB 2008)", month = "mar", organization = "GI/ITG", }
@inproceedings{SZM08-1, title = "Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once", author = "Jens B. Schmitt and Frank A. Zdarsky and Ivan Martinovic", year = "2008", address = "Dortmund, Germany", booktitle = "14th GI/ITG Conference on Measurement, Modeling, and Evaluation of Computer and Communication Systems (MMB 2008)", month = "mar", organization = "GI/ITG", }
@inproceedings{MGS08, title = "Firewalling Wireless Sensor Networks: Security by Wireless", author = "Ivan Martinovic and Nicos Gollan and Jens B. Schmitt", year = "2008", address = "Montreal, Canada", booktitle = "{Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN): Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2008)}", month = "oct", pages = "770 -- 777", }
@inproceedings{BMS08-1, title = "{Enabling Authentic Transmissions in WSNs -- Turning Jamming against the Attacker}", author = "Adam Bachorek and Ivan Martinovic and Jens B. Schmitt", year = "2008", address = "Orlando, FL, USA", booktitle = "{Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008)}", month = "oct", pages = "21--26", }
@article{SG08-1, title = "{Worst Case Modelling of Wireless Sensor Networks}", author = "Jens B. Schmitt and Nicos Gollan", year = "2008", journal = "Praxis der Informationsverarbeitung und Kommunikation", month = "jan", pages = "12--16", publisher = "Fachgruppe Kommunikation und Verteilte Systeme, Universit\"at zu L\"ubeck", volume = "1", }
@incollection{MZBS-1, title = "{Security in IEEE 802.11-based UMA Networks}", author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Jens B. Schmitt", year = "2008", booktitle = "{Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications}", editor = "Y. Zhang and L. T. Yang and J. Ma", note = "ISBN:1420055372. Accepted for publication", publisher = "Auerbach Publications, Taylor&Francis Group", }
@incollection{ZM-1, title = "{Radio Resource Management in IEEE 802.11-based UMA Networks}", author = "Frank A. Zdarsky and Ivan Martinovic", year = "2008", booktitle = "{Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications}", editor = "Y. Zhang and L. T. Yang and J. Ma", note = "ISBN:1420055372. Accepted for publication", publisher = "Auerbach Publications, Taylor&Francis Group", }
@article{ZMS08-1, title = "{Minimizing Contention through Cooperation between Densely-Deployed Wireless LANs}", author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt", year = "2007", journal = "Wireless Networks, Springer", month = "sep", publisher = "Springer", volume = "ISSN 1022-0038 (Print) 1572-8196 (Online)", }
@inproceedings{MZBJS06-1, title = "{Phishing in the Wireless: Implementation and Analysis}", author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Christian Jung and Jens B. Schmitt", year = "2007", booktitle = "Proceedings of the 22nd IFIP International Information Security Conference (SEC 2007), Johannesburg, South Africa", month = "may", pages = "145--156", publisher = "Springer", volume = "Volume 232/2007", }
@inproceedings{MZBS07-1, title = "{Measurement and Analysis of Handover Latencies in IEEE 802.11i Secured Networks}", author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Jens B. Schmitt", year = "2007", booktitle = "Proceedings of the 13th European Wireless Conference (EW2007), Paris, France", month = "apr", }
@inproceedings{MZS07-1, title = "{Regional-based Authentication Against DoS Attacks in Wireless Networks}", author = "Ivan Martinovic and Frank A. Zdarsky and Jens B. Schmitt", year = "2007", address = "Greece", booktitle = "Proceedings of the 3rd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks (in conjunction with ACM/IEEE MSWiM'07)", month = "oct", }
@inproceedings{ZMS06-1, title = "{The Case for Virtualized Wireless Access Networks}", author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt", year = "2006", booktitle = "Proceedings of the International Workshop on Self-Organizing Systems (IWSOS 2006), Passau, Germany", month = "sep", publisher = "Springer LNCS", }
@inproceedings{MLZMSS06-1, title = "{Self-Protection in P2P Networks: Choosing the Right Neighbourhood}", author = "Ivan Martinovic and Christof Leng and Frank A. Zdarsky and Andreas Mauthe and Ralf Steinmetz and Jens B. Schmitt", year = "2006", booktitle = "Proceedings of the International Workshop on Self-Organizing Systems (IWSOS 2006), Passau, Germany", month = "sep", publisher = "Springer LNCS", }
@inproceedings{ZMS06-2, title = "{On Self-coordination in Wireless Community Networks}", author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt", year = "2006", booktitle = "Proceedings of the 11th IFIP International Conference on Personal Wireless Communications (PWC'06), Albacete, Spain", month = "sep", publisher = "Springer LNCS", }
@inproceedings{MZS06-1, title = "{On the Way to IEEE 802.11 DoS Resilience}", author = "Ivan Martinovic and Frank A. Zdarsky and Jens B. Schmitt", year = "2006", booktitle = "Proceedings of IFIP NETWORKING 2006, Workshop on Security and Privacy in Mobile and Wireless Networking, Coimbra, Portugal", month = "may", publisher = "Springer LNCS", }
@techreport{SZM06-1, title = "{Performance Bounds in Feed-Forward Networks under Blind Multiplexing}", author = "Jens B. Schmitt and Frank A. Zdarsky and Ivan Martinovic", year = "2006", institution = "University of Kaiserslautern, Germany", month = "apr", number = "349/06", }
@inproceedings{MS06-1, title = "{Zu den Grenzen der Technik bei der Entwicklung von Konzepten zur Online-Betrugs-Pr\"avention (Invited Paper)}", author = "Ivan Martinovic and Jens B. Schmitt", year = "2006", booktitle = "Deutsches Forum f\"ur Kriminalpr\"avention (DFK) Workshop "Internet-Devianz", Bonn, Germany", month = "oct", publisher = "Deutsches Forum f\"ur Kriminalpr\"avention", }
@techreport{MZBS06-1, title = "{Introduction of IEEE 802.11i and Measuring its Security vs. Performance Tradeoff}", author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Jens B. Schmitt", year = "2006", institution = "University of Kaiserslautern, Germany", month = "oct", number = "351/06", }
@techreport{MZBJS06, title = "{Phishing in the Wireless: Implementation and Analysis}", author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Christan Jung and Jens B. Schmitt", year = "2006", institution = "University of Kaiserslautern, Germany", month = "oct", number = "367/07", }
@inproceedings{ZMS05-3, title = "{On Lower Bounds for MAC Layer Contention in CSMA/CA-Based Wireless Networks}", author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt", year = "2005", address = "Cologne, Germany", booktitle = "3rd ACM/SIGMOBILE International Workshop on Foundations of Mobile Computing (DIALM-POMC'05)", month = "sep", pages = "8--16", }
@techreport{ZMS05-2, title = "{Self-Coordination Mechanisms for Wireless Community Networks}", author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt", year = "2005", institution = "University of Kaiserslautern, Germany", month = "jul", number = "339/05", }
@techreport{ZMS05-1, title = "{Lower Bounds for Contention in CSMA/CA-based Wireless LANs}", author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt", year = "2005", institution = "University of Kaiserslautern, Germany", month = "jul", number = "338/05", }
@inproceedings{HMKR04-1, title = "{A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks}", author = "Matthias Hollick and Ivan Martinovic and Tronje Krop and Ivica Rimac", year = "2004", booktitle = "Proceedings of the 30th IEEE EUROMICRO Conference, Rennes, France", month = "sep", note = "ISBN 0-7695-2199-1", pages = "495--502", publisher = "IEEE", }
@inproceedings{SEM+04-1, title = "{Digital Heritage Application as an Edutainment Tool}", author = "Meehae Song and Thomas Elias and Ivan Martinovic and Wolfgang M{\"u}ller-Wittig and Tony K.Y. Chan", year = "2004", booktitle = "Proceedings of the ACM SIGGRAPH International Conference on Virtual Reality Continuum and its Applications in Industry", month = "jun", note = "ISBN 1-58113-884-9", pages = "163--167", publisher = "ACM Press", }
@incollection{SBM04-1, title = "{Web Services zur Unterst{\"u}tzung flexibler Gesch{\"a}ftsprozesse in der Finanzwirtschaft}", author = "Ralf Steinmetz and Rainer Berbner and Ivan Martinovic", year = "2004", booktitle = "Handbuch Industrialisierung der Finanzwirtschaft", editor = "Z. Sokolovsky and S. L{\"o}schenkohl", month = "dec", note = "ISBN 3-409-12675-9", publisher = "Gabler Verlag", }
@inproceedings{MGA+04-1, title = "{Trust and Context: Complementary Concepts for Creating Spontaneous Networks and Intelligent Applications}", author = "Ivan Martinovic and Manuel Goertz and Ralf Ackermann and Andreas Mauthe and Ralf Steinmetz", year = "2004", booktitle = "Proceedings of SoftCOM'04, International Conference on Software, Telecommunications and Computer Networks, Croatia", month = "oct", note = "~", }
@inproceedings{SEM+03-1, title = "{User-Centred Virtual Avatars in Real-time}", author = "Meehae Song and Thomas Elias and Ivan Martinovic and Wolfgang M{\"u}ller-Wittig and Tony K.Y. Chan", year = "2003", booktitle = "Proceedings of the 9th International Conference on Virtual Systems and Multimedia (VSMM 2003), Montreal, Canada", month = "oct", note = "~", }