Ivan Martinovic : Publications
Click here to download all publications in a single bibtex file
@inproceedings{smailes2024sticky,
title = "Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks",
author = "Smailes, Joshua and Salkield, Edd and Köhler, Sebastian and Birnbach, Simon and Strohmeier, Martin and Martinovic, Ivan",
year = "2024",
booktitle = "2nd Workshop on Security of Space and Satellite Systems (SpaceSec)",
location = "San Diego, CA, USA",
month = "Mar",
doi = "10.14722/spacesec.2024.23054",
}
@article{smailes2024satiq,
title = "SatIQ: Extensible and Stable Satellite Authentication using Hardware Fingerprinting",
author = "Smailes, Joshua and Köhler, Sebastian and Birnbach, Simon and Strohmeier, Martin and Martinovic, Ivan",
year = "2024",
journal = "Preprint",
month = "October",
}
@conference{radar-sharma-eicc23,
title = "RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection",
author = "Yashovardhan Sharma and Simon Birnbach and Ivan Martinovic",
year = "2023",
affiliation = "University of Oxford",
booktitle = "Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference (EICC'23)",
journal = "EICC",
location = "Stavanger, Norway",
month = "June",
pages = "159–166",
publisher = "Association for Computing Machinery (ACM)",
url = "https://dl.acm.org/doi/10.1145/3590777.3590804",
doi = "https://doi.org/10.1145/3590777.3590804",
}
@inproceedings{Salkield23,
title = "Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks",
author = "Salkield, Edd and Szakály, Marcell and Smailes, Joshua and Birnbach, Simon and Köhler, Sebastian and Strohmeier, Martin and Martinovic, Ivan",
year = "2023",
booktitle = "Proceedings of the 16th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)",
month = "May",
note = "\textbf{Best Paper Award: Runner Up!}",
url = "https://ora.ox.ac.uk/objects/uuid:e9d5d85f-b77f-4f11-8006-17dd88660467/download_file?file_format=application%2Fpdf&safe_filename=Salkield_et_al_2023_satellite_spoofing_from.pdf&type_of_work=Conference+item",
}
@article{smailes2023dishing,
title = "Dishing Out DoS: How to Disable and Secure the Starlink User Terminal",
author = "Smailes, Joshua and Salkield, Edd and Köhler, Sebastian and Birnbach, Simon and Martinovic, Ivan",
year = "2023",
journal = "arXiv preprint arXiv:2303.00582",
month = "March",
url = "https://arxiv.org/abs/2303.00582",
}
@inproceedings{brokenwire,
title = "BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging",
author = "Koehler, Sebastian and Baker, Richard and Strohmeier, Martin and Martinovic, Ivan",
year = "2023",
booktitle = "The Network and Distributed System Security Symposium (NDSS)",
month = "Feb",
url = "https://brokenwire.fail",
}
@inproceedings{smailes2023watch,
title = "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting",
author = "Smailes, Joshua and Köhler, Sebastian and Birnbach, Simon and Strohmeier, Martin and Martinovic, Ivan",
year = "2023",
booktitle = "Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 23)",
month = "Nov",
url = "https://arxiv.org/abs/2305.06947",
doi = "10.1145/3576915.3623135",
}
@inproceedings{10225000,
title = "{To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection}",
author = "Sharma, Yashovardhan and Giunchiglia, Eleonora and Birnbach, Simon and Martinovic, Ivan",
year = "2023",
booktitle = "2023 IEEE International Conference on Cyber Security and Resilience (CSR)",
pages = "8-15",
doi = "10.1109/CSR57506.2023.10225000",
}
@inproceedings{10.1145/3590777.3590804,
title = "RADAR: A TTP-Based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection",
author = "Sharma, Yashovardhan and Birnbach, Simon and Martinovic, Ivan",
year = "2023",
address = "New York, NY, USA",
booktitle = "Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference",
isbn = "9781450398299",
keywords = "Network Analysis, Explainable AI, Malware, Cyber Security",
location = "Stavanger, Norway",
pages = "159–166",
publisher = "Association for Computing Machinery",
series = "EICC '23",
url = "https://doi.org/10.1145/3590777.3590804",
doi = "10.1145/3590777.3590804",
}
@inproceedings{15776,
title = "CableAuth: a biometric second factor authentication scheme for electric vehicle charging",
author = "Jack Sturgess and Sebastian Köhler and Simon Birnbach and Ivan Martinovic",
year = "2023",
booktitle = "Proc. Inaugural Symposium on Vehicle Security and Privacy (VehicleSec 2023)",
publisher = "Internet Society",
}
@inproceedings{15674,
title = "BROKENWIRE: wireless disruption of CCS electric vehicle charging",
author = "Sebastian Köhler and Richard Baker and Martin Strohmeier and Ivan Martinovic",
year = "2023",
booktitle = "In Proc. Network and Distributed System Security (NDSS) Symposium 2023",
publisher = "Internet Society",
}
@inproceedings{baselt22cycon,
title = "Security and Privacy Issues of Satellite Communication in the Aviation Domain",
author = "Baselt, Georg and Strohmeier, Martin and Pavur, James and Lenders, Vincent and Martinovic, Ivan",
year = "2022",
booktitle = "Cyber Conflict (CYCON), 2022 14th International Conference on",
month = "May",
}
@inproceedings{15677,
title = "Fingerprinting and personal information leakage from touchscreen interactions",
author = "Martin Georgiev and Simon Eberz and Ivan Martinovic",
year = "2022",
booktitle = "In Proc. 21st Workshop on Privacy in the Electronic Society (WPES 2022)",
publisher = "ACM",
}
@inproceedings{15676,
title = "Exorcist: automated differential analysis to detect compromises in closed-source software supply chains",
author = "Frederick Barr-Smith and Richard Baker and Tim Blazytko and Ivan Martinovic",
year = "2022",
booktitle = "In Proc. ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED '22)",
publisher = "ACM",
}
@inproceedings{15675,
title = "Techniques for continuous touch-based authentication",
author = "Martin Georgiev and Simon Eberz and Ivan Martinovic",
year = "2022",
booktitle = "In Proc. 17th International Conference on Information Security Practice and Experience (ISPEC 2022)",
publisher = "Springer",
}
@inproceedings{15673,
title = "On the security of the wireless electric vehicle charging communication",
author = "Sebastian Köhler and Simon Birnbach and Richard Baker and Ivan Martinovic",
year = "2022",
booktitle = "Proc. Workshop Cybersecurity of Electric Vehicle Charging and Smart Grid Resources (SECEVC)",
publisher = "IEEE",
}
@inproceedings{14947,
title = "WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch",
author = "Jack Sturgess and Simon Eberz and Ivo Sluganovic and Ivan Martinovic",
year = "2022",
booktitle = "Proc. 7th IEEE European Symposium on Security and Privacy (EuroS&P)",
publisher = "IEEE",
}
@inproceedings{14899,
title = "WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch",
author = "Jack Sturgess and Simon Eberz and Ivo Sluganovic and Ivan Martinovic",
year = "2022",
booktitle = "Proc. 7th IEEE European Symposium on Security and Privacy (EuroS&P)",
publisher = "IEEE",
}
@inproceedings{14898,
title = "Biometric identification system based on object interactions in Internet of Things environments",
author = "Klaudia Krawiecka and Simon Birnbach and Simon Eberz and Ivan Martinovic",
year = "2022",
booktitle = "Proc. IEEE Workshop on the Internet of Safe Things: SafeThings 2022",
publisher = "IEEE",
}
@inproceedings{14818,
title = "Common Evaluation Pitfalls in Touch-Based Authentication Systems",
author = "Martin Georgiev and Simon Eberz and Henry Turner and Giulio Lovisotto and Ivan Martinovic",
year = "2022",
booktitle = "Proc. 2022 ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022)",
publisher = "ACM",
}
@inproceedings{14808,
title = "99% false positives: A qualitative study of SOC analysts' perspectives on security alarms",
author = "Bushra AlAhmadi and Louise Axon and Ivan Martinovic",
year = "2022",
booktitle = "Proc. 31st USENIX Security Symposium",
}
@inproceedings{14803,
title = "Signal injection attacks against CCD image sensors",
author = "Sebastian Kohler and Richard Baker and Ivan Martinovic",
year = "2022",
booktitle = "Proc. 2022 ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022)",
publisher = "ACM",
}
@inproceedings{14801,
title = "Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch",
author = "Jack Sturgess and Simon Eberz and Ivo Sluganovic and Ivan Martinovic",
year = "2022",
booktitle = "Proc. WristSense 2022: Workshop on Sensing Systems and Applications Using Wrist Worn Smart Devices",
publisher = "IEEE",
}
@inproceedings{strohmeier21critis,
title = "Studying Neutrality in Cyber-Space: A Comparative Geographical Analysis of Honeypot Responses",
author = "Strohmeier, Martin and Pavur, James and Martinovic, Ivan and Lenders, Vincent",
year = "2021",
booktitle = "International Conference on Critical Information Infrastructures Security",
month = "September",
organization = "Springer",
url = "https://link.springer.com/chapter/10.1007/978-3-030-93200-8_11",
doi = "10.1007/978-3-030-93200-8_11",
}
@inproceedings{lovisotto2021slap,
title = "SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations",
author = "Lovisotto, Giulio and Turner, Henry and Sluganovic, Ivo and Strohmeier, Martin and Martinovic, Ivan",
year = "2021",
booktitle = "30th USENIX Security Symposium (USENIX Security 21)",
month = "August",
url = "https://www.usenix.org/conference/usenixsecurity21/presentation/lovisotto",
}
@inproceedings{smailesCPSS2021,
title = "You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications",
author = "Smailes, Joshua and Moser, Daniel and Smith, Matthew and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
year = "2021",
booktitle = "Proceedings of the 7th ACM Cyber-Physical System Security Workshop (CPSS 2021)",
month = "June",
note = "\textbf{Best Paper Award!}",
url = "https://dl.acm.org/doi/abs/10.1145/3457339.3457985",
doi = "10.1145/3457339.3457985",
}
@inproceedings{pavurCycon2021,
title = "{In the Same Boat: On Small Satellites, Big Rockets, and Cyber-Trust}",
author = "Pavur, James and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
year = "2021",
booktitle = "13th International Conference on Cyber Conflict (CyCon)",
month = "May",
organization = "IEEE",
url = "https://ccdcoe.org/uploads/2021/05/CyCon_2021_Pavur_Strohmeier_Lenders_Martinovic.pdf",
}
@inproceedings{pavurndss2021,
title = "QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit",
author = "James Pavur and Martin Strohmeier and Vincent Lenders and Ivan Martinovic",
year = "2021",
booktitle = "The Network and Distributed System Security Symposium (NDSS)",
month = "Feb",
url = "https://www.ndss-symposium.org/ndss-paper/qpep-an-actionable-approach-to-secure-and-performant-broadband-from-geostationary-orbit/",
}
@article{StrohmeierTIST2021,
title = "Classi-Fly: Inferring Aircraft Categories from Open Data",
author = "Strohmeier, Martin and Smith, Matthew and Lenders, Vincent and Martinovic, Ivan",
year = "2021",
journal = "ACM Transactions on Intelligent Systems and Technology (TIST)",
month = "December",
number = "6",
url = "https://dl.acm.org/doi/10.1145/3480969",
volume = "12",
doi = "10.1145/3480969",
}
@inproceedings{sun2021opensky,
title = "OpenSky Report 2021: Insights on ADS-B Mandate and Fleet Deployment in Times of Crisis",
author = "Sun, Junzi and Olive, Xavier and Strohmeier, Martin and Schäfer, Matthias and Martinovic, Ivan and Lenders, Vincent",
year = "2021",
booktitle = "2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC)",
month = "October",
organization = "IEEE",
url = "https://ieeexplore.ieee.org/document/9594361/",
doi = "10.1109/DASC52595.2021.9594361",
}
@article{14809,
title = "#PrettyFlyForAWiFi: real-world detection of privacy invasion attacks by drones",
author = "Simon Birnbach and Richard Baker and Simon Eberz and Ivan Martinovic",
year = "2021",
journal = "ACM Transactions on Privacy and Security",
publisher = "ACM",
doi = "10.1145/3473672",
}
@article{14804,
title = "Haunted house: physical smart home event verification in the presence of compromised sensors",
author = "Simon Birnbach and Simon Eberz and Ivan Martinovic",
year = "2021",
journal = "ACM Transactions on Internet of Things",
publisher = "ACM",
}
@article{14800,
title = "Generating identities with mixture models for speaker anonymization",
author = "Henry Turner and Giulio Lovisotto and Ivan Martinovic",
year = "2021",
journal = "Computer Speech and Language 72",
doi = "10.1016/j.csl.2021.101318",
}
@inproceedings{14810,
title = "On detecting deception in space situational awareness",
author = "James Pavur and Ivan Martinovic",
year = "2021",
booktitle = "Proc. 16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2021)",
publisher = "ACM",
doi = "10.1145/3433210.3453081",
}
@inproceedings{14806,
title = "Plug-and-play: Framework for remote experimentation in cyber security",
author = "Klaudia Krawiecka and Jack Sturgess and Alina Petrova and Ivan Martinovic",
year = "2021",
booktitle = "Proc. 2021 European Symposium on Usable Security (EuroUSEC 2021)",
publisher = "ACM",
doi = "10.1145/3481357.3481518",
}
@inproceedings{14805,
title = "They see me rollin': inherent vulnerability of the rolling shutter in CMOS image sensors",
author = "Sebastian Köhler and Giulio Lovisotto and Simon Birnbach and Richard Baker and Ivan Martinovic",
year = "2021",
booktitle = "Proc. Annual Computer Security Applications Conference (ACSAC 2021)",
publisher = "ACM",
doi = "10.1145/3485832.3488016",
}
@conference{14601,
title = "MalPhase: Fine-Grained Malware Detection Using Network Flow Data",
author = "Michal Piskozub and Fabio De Gaspari and Freddie Barr-Smith and Luigi Mancini and Ivan Martinovic",
year = "2021",
journal = "Proceedings of the 16th ACM Asia Conference on Computer and Communications Security",
}
@conference{survivalism,
title = "Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land",
author = "Frederick Barr-Smith and Xabier Ugarte-Pedrero and Mariano Graziano and Riccardo Spolaor and Ivan Martinovic",
year = "2021",
booktitle = "2021 IEEE Symposium on Security and Privacy (SP)",
journal = "IEEE Symposium on Security and Privacy (S&P)",
organization = "IEEE",
}
@inproceedings{lovisotto2020biometric,
title = "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating",
author = "Lovisotto, Giulio and Eberz, Simon and Martinovic, Ivan",
year = "2020",
booktitle = "2020 IEEE European Symposium on Security and Privacy (EuroS&P)",
month = "September",
organization = "IEEE",
url = "https://github.com/ssloxford/biometric-backdoors",
doi = "10.1109/EuroSP48549.2020.00020",
}
@inproceedings{lovisotto2020seeingred,
title = "Seeing Red: PPG Biometrics Using Smartphone Cameras",
author = "Lovisotto, Giulio and Turner, Henry and Eberz, Simon and Martinovic, Ivan",
year = "2020",
affiliation = "University of Oxford",
booktitle = "IEEE 15th Computer Society Workshop on Biometrics",
journal = "IEEE 15th Computer Society Workshop on Biometrics",
location = "Seattle, Washington",
month = "June",
organization = "IEEE",
}
@inproceedings{Pavur2019oakland,
title = "A Tale of Sea and Sky: On the Security of Maritime VSAT Communications",
author = "Pavur, James and Moser, Daniel and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
year = "2020",
booktitle = "2020 IEEE Symposium on Security and Privacy (S&P)",
month = "May",
organization = "IEEE",
url = "https://www.computer.org/csdl/proceedings-article/sp/2020/349700b025/1j2Lg3MvKpi",
doi = "10.1109/SP40000.2020.00056",
}
@inproceedings{SmithNDSS2020,
title = "A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems",
author = "Smith, Matthew and Strohmeier, Martin and Harman, Jon and Lenders, Vincent and Martinovic, Ivan",
year = "2020",
booktitle = "The Network and Distributed System Security Symposium (NDSS)",
month = "Feb",
url = "https://www.ndss-symposium.org/ndss-paper/a-view-from-the-cockpit-exploring-pilot-reactions-to-attacks-on-avionic-systems/",
}
@article{smith2020understanding,
title = "Understanding Realistic Attacks on Airborne Collision Avoidance Systems",
author = "Smith, Matthew and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
year = "2020",
journal = "arXiv preprint arXiv:2010.01034",
}
@article{strohmeier2019applicability,
title = "On the Applicability of Satellite-based Air Traffic Control Communication for Security",
author = "Strohmeier, Martin and Moser, Daniel and Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan",
year = "2019",
journal = "IEEE Communications Magazine",
month = "September",
number = "9",
pages = "79 - 85",
publisher = "IEEE",
url = "https://ieeexplore.ieee.org/document/8847232",
volume = "57",
doi = "10.1109/MCOM.001.1900037",
}
@inproceedings{schafer2019opensky,
title = "OpenSky Report 2019: Analysing TCAS in the Real World using Big Data",
author = "Schäfer, Matthias and Olive, Xavier and Strohmeier, Martin and Smith, Matthew and Martinovic, Ivan and Lenders, Vincent",
year = "2019",
booktitle = "2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC)",
month = "September",
organization = "IEEE",
pages = "1--9",
url = "https://ieeexplore.ieee.org/document/9081686",
doi = "10.1109/DASC43569.2019.9081686",
}
@article{strohmeier2019classi,
title = "Classi-Fly: Inferring Aircraft Categories from Open Data",
author = "Strohmeier, Martin and Smith, Matthew and Lenders, Vincent and Martinovic, Ivan",
year = "2019",
journal = "arXiv preprint arXiv:1908.01061",
month = "August",
url = "https://arxiv.org/abs/1908.01061",
}
@article{smith2019safety,
title = "Safety vs. Security: Attacking Avionic Systems with Humans in the Loop",
author = "Smith, Matthew and Strohmeier, Martin and Harman, Jon and Lenders, Vincent and Martinovic, Ivan",
year = "2019",
journal = "arXiv preprint arXiv:1905.08039",
month = "May",
url = "https://arxiv.org/abs/1905.08039",
}
@inproceedings{peeves,
title = "Peeves: Physical Event Verification in Smart Homes",
author = "Birnbach, Simon and Eberz, Simon and Martinovic, Ivan",
year = "2019",
booktitle = "Proceedings of the 2019 ACM Conference on Computer and Communications Security (CCS)",
}
@inproceedings{baker2019losing,
title = "Losing the Car Keys: Wireless PHY-Layer Insecurity in {EV} Charging",
author = "Baker, Richard and Martinovic, Ivan",
year = "2019",
booktitle = "28th {USENIX} Security Symposium ({USENIX} Security 19)",
pages = "407--424",
}
@inproceedings{turner2019attacking,
title = "Attacking Speaker Recognition Systems with Phoneme Morphing",
author = "Turner, Henry and Lovisotto, Giulio and Martinovic, Ivan",
year = "2019",
booktitle = "European Symposium on Research in Computer Security (ESORICS)",
organization = "Springer",
pages = "471--492",
doi = "10.1007/978-3-030-29959-0_23",
}
@inproceedings{eberz201928,
title = "28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics",
author = "Eberz, Simon and Lovisotto, Giulio and Rasmussen, Kasper B and Lenders, Vincent and Martinovic, Ivan",
year = "2019",
booktitle = "Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security",
organization = "ACM",
pages = "1187--1199",
doi = "10.1145/3319535.3354233",
}
@inproceedings{schaeferDASC2018,
title = "OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS-B Data",
author = "Matthias Schäfer and Martin Strohmeier and Matthew Smith and Markus Fuchs and Vincent Lenders and Ivan Martinovic",
year = "2018",
booktitle = "Digital Avionics Systems Conference (DASC), 2018 IEEE/AIAA 37th",
month = "Sep",
url = "https://ieeexplore.ieee.org/abstract/document/8569833",
doi = "10.1109/DASC.2018.8569833",
}
@inproceedings{Smith2018,
title = "{Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)}",
author = "Smith, Matthew and Moser, Daniel and Strohmeier, Martin and Martinovic, Ivan and Lenders, Vincent",
year = "2018",
address = "Barcelona",
booktitle = "18th Privacy Enhancing Technologies Symposium (PETS 2018)",
month = "July",
url = "https://content.sciendo.com/view/journals/popets/2018/3/article-p105.xml",
doi = "10.1515/popets-2018-0023",
}
@article{strohmeier2018TAES,
title = "A k-NN-based Localization Approach for Crowdsourced Air Traffic Communication Networks",
author = "Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
year = "2018",
journal = "IEEE Transactions on Aerospace and Electronic Systems",
month = "June",
number = "3",
pages = "1519 - 1529",
url = "http://ieeexplore.ieee.org/document/8268121/",
volume = "54",
doi = "10.1109/TAES.2018.2797760",
}
@inproceedings{strohmeier2018cycon,
title = "{Utilizing Air Traffic Communications for OSINT on State and Government Aircraft}",
author = "Strohmeier, Martin and Smith, Matthew and Moser, Daniel and Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan",
year = "2018",
booktitle = "{Cyber Conflict (CYCON), 2018 10th International Conference on}",
month = "may",
organization = "IEEE",
url = "https://ieeexplore.ieee.org/document/8405023/",
doi = "10.23919/CYCON.2018.8405023",
}
@inproceedings{strohmeierEuroSNP18,
title = "The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication",
author = "Strohmeier, Martin and Smith, Matthew and Lenders, Vincent and Martinovic, Ivan",
year = "2018",
booktitle = "IEEE European Symposium on Security and Privacy (EuroS&P) 2018",
month = "apr",
organization = "IEEE",
url = "https://ieeexplore.ieee.org/document/8406594/",
doi = "10.1109/EuroSP.2018.00016",
}
@inproceedings{baker2018empower,
title = "EMPower: Detecting Malicious Power Line Networks from EM Emissions",
author = "Baker, Richard and Martinovic, Ivan",
year = "2018",
booktitle = "IFIP International Conference on ICT Systems Security and Privacy Protection",
organization = "Springer",
pages = "108--121",
}
@inproceedings{eberz2018your,
title = "When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts",
author = "Eberz, Simon and Lovisotto, Giulio and Patane, Andrea and Kwiatkowska, Marta and Lenders, Vincent and Martinovic, Ivan",
year = "2018",
booktitle = "2018 IEEE Symposium on Security and Privacy (SP)",
organization = "IEEE",
pages = "889--905",
doi = "10.1109/SP.2018.00053",
}
@conference{11247,
title = "Snoopy: Sniffing Your Smartwatches Passwords via Deep Sequence Learning",
author = "Chris Xiaoxuan Lu and Bowen Du and Hongkai Wen and Sen Wang and Andrew Markham and Ivan Martinovic and Yiran Shen and Niki Trigoni",
year = "2018",
booktitle = "ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp)",
journal = "Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies",
}
@article{strohmeierITS,
title = "On Perception and Reality in Wireless Air Traffic Communication Security",
author = "Strohmeier, Martin and Sch{\"a}fer, Matthias and Pinheiro, Rui and Lenders, Vincent and Martinovic, Ivan",
year = "2017",
issn = "1524-9050",
journal = "IEEE Transactions on Intelligent Transportation Systems",
month = "June",
number = "6",
pages = "1338-1357",
publisher = "IEEE",
url = "http://ieeexplore.ieee.org/document/7589091/",
volume = "18",
doi = "10.1109/TITS.2016.2612584",
}
@article{2017arXiv170507065S,
title = "{Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS)}",
author = "{Smith}, Matthew and {Moser}, Daniel and {Strohmeier}, Martin and {Lenders}, Vincent and {Martinovic}, Ivan",
year = "2017",
journal = "ArXiv e-prints",
keywords = "Computer Science - Cryptography and Security, Computer Science - Computers and Society",
month = "may",
url = "https://arxiv.org/pdf/1705.07065.pdf",
}
@inproceedings{strohmeier2017cycon,
title = "Crowdsourcing Security for Wireless Air Traffic Communications",
author = "Strohmeier, Martin and Smith, Matthew and Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan",
year = "2017",
booktitle = "{Cyber Conflict (CYCON), 2017 9th International Conference on}",
month = "May",
organization = "IEEE",
url = "http://ieeexplore.ieee.org/document/8240336/",
doi = "10.23919/CYCON.2017.8240336",
}
@inproceedings{smithFC,
title = "{Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS}",
author = "Smith, Matthew and Moser, Daniel and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
year = "2017",
booktitle = "International Conference on Financial Cryptography and Data Security 2017",
month = "apr",
publisher = "Springer",
url = "https://link.springer.com/chapter/10.1007/978-3-319-70972-7_15",
doi = "10.1007/978-3-319-70972-7_15",
}
@inproceedings{Sluganovic2017ACSAC,
title = "{HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens}",
author = "Sluganovic, Ivo and Serbec, Matej and Derek, Ante and Martinovic, Ivan",
year = "2017",
booktitle = "Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)",
month = "December",
pages = "13",
}
@inproceedings{wifly,
title = "Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones",
author = "Birnbach, Simon and Baker, Richard and Martinovic, Ivan",
year = "2017",
booktitle = "Proceedings of the 24th Annual Network and Distributed System Security Symposium ({NDSS})",
}
@techreport{RR-17-03,
title = "Mobile Biometrics in Financial Services: A Five Factor Framework",
author = "Giulio Lovisotto and Raghav Malik and Ivo Sluganovic and Marc Roeschlin and Paul Trueman and Ivan Martinovic",
year = "2017",
affiliation = "University of Oxford",
}
@inproceedings{schaeferDASC2016,
title = "OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS-B Usage",
author = "Matthias Schäfer and Martin Strohmeier and Matthew Smith and Markus Fuchs and Rui Pinheiro and Vincent Lenders and Ivan Martinovic",
year = "2016",
booktitle = "Digital Avionics Systems Conference (DASC), 2016 IEEE/AIAA 35th",
location = "Sacramento, CA, USA",
month = "Sep",
url = "http://ieeexplore.ieee.org/document/7778030/",
doi = "10.1109/DASC.2016.7778030",
}
@article{Eberz:2016:LLE:2957761.2904018,
title = "Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics",
author = "Eberz, Simon and Rasmussen, Kasper B. and Lenders, Vincent and Martinovic, Ivan",
year = "2016",
address = "New York, NY, USA",
issn = "2471-2566",
journal = "ACM Transactions on Privacy and Security",
keywords = "Biometrics, continuous authentication, metrics",
month = "June",
number = "1",
publisher = "ACM",
volume = "19",
}
@inproceedings{strohmeier2016cycon,
title = "Assessing the Impact of Aviation Security on Cyber Power",
author = "Strohmeier, Martin and Smith, Matthew and Sch{\"{a}}fer, Matthias and Lenders, Vincent and Martinovic, Ivan",
year = "2016",
booktitle = "{Cyber Conflict (CYCON), 2016 8th International Conference on}",
location = "Tallinn, Estonia",
month = "May",
organization = "IEEE",
url = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7529437",
doi = "10.1109/CYCON.2016.7529437",
}
@inproceedings{goe,
title = "Exposing Transmitters in Mobile Multi-Agent Games",
author = "Ben-Adar Bessos and Mai and Birnbach, Simon and Herzberg, Amir and Martinovic, Ivan",
year = "2016",
booktitle = "Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC)",
organization = "ACM",
pages = "125--136",
}
@inproceedings{baker2016secure,
title = "Secure location verification with a mobile receiver",
author = "Baker, Richard and Martinovic, Ivan",
year = "2016",
booktitle = "Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy",
pages = "35--46",
}
@inproceedings{rasmussen15NDSS,
title = "Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics",
author = "Simon Eberz and Kasper B. Rasmussen and Vincent Lenders and Ivan Martinovic",
year = "2015",
booktitle = "The Network and Distributed System Security Symposium (NDSS)",
month = "February",
}
@article{strohmeier2014surveys,
title = "On the Security of the Automatic Dependent Surveillance-Broadcast Protocol",
author = "Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
year = "2015",
issn = "1553-877X",
journal = "IEEE Communications Surveys & Tutorials",
number = "2",
pages = "1066 - 1087",
publisher = "IEEE",
url = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6940209",
volume = "17",
doi = "10.1109/COMST.2014.2365951",
}
@inproceedings{Schaefer14,
title = "{Bringing Up OpenSky: A Large-scale ADS-B Sensor Network for Research}",
author = "Sch{\"a}fer, Matthias and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan and Wilhelm, Matthias",
year = "2014",
booktitle = "ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)",
month = "apr",
}
@inproceedings{contauth,
title = "Authentication Using Pulse-Response Biometrics",
author = "Rasmussen, Kasper Bonne and Roeschlin, Marc and Martinovic, Ivan and Tsudik, Gene",
year = "2014",
booktitle = "The Network and Distributed System Security Symposium ({NDSS})",
month = "2",
}
@article{Strohmeier14,
title = "{Realities and Challenges of NextGen Air Traffic Management: The Case of ADS-B}",
author = "Strohmeier, Martin and Sch{\"a}fer, Matthias and Lenders, Vincent and Martinovic, Ivan",
year = "2014",
journal = "Communications Magazine, IEEE",
number = "5",
publisher = "IEEE",
volume = "52",
}
@inproceedings{BGFMS14,
title = "Gaining Insight on Friendly Jamming in a Real-world IEEE 802.11 Network",
author = "Berger, Daniel S. and Gringoli, Francesco and Facchi, Nicol`{o} and Martinovic, Ivan and Schmitt, Jens",
year = "2014",
address = "New York, NY, USA",
booktitle = "Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks",
isbn = "978-1-4503-2972-9",
keywords = "defensive jamming, friendly jamming, ieee 802.11, jamming for good, reactive jamming, wi-fi, wlan",
location = "Oxford, United Kingdom",
pages = "105--116",
publisher = "ACM",
series = "WiSec '14",
url = "http://www.ing.unibs.it/~openfwwf/friendlyjammer/wisec-2014-gaininginsight.pdf",
doi = "10.1145/2627393.2627403",
}
@article{WMS13,
title = "Secure Key Generation in Sensor Networks Based on Frequency-selective Channels",
author = "Matthias Wilhelm and Ivan Martinovic and Jens Schmitt",
year = "2013",
journal = "IEEE Journal on Selected Areas in Communications (JSAC) - Signal Processing Techniques for Wireless Physical Layer Security",
month = "sep",
number = "9",
pages = "1779-1790",
url = "http://dx.doi.org/10.1109/JSAC.2013.130911",
volume = "31",
}
@article{ITFS12,
title = "Touchalytics: On the Applicability of Touchscreen Input as a Behavioural Biometric for Continuous Authentication",
author = "Mario Frank and Ralf Biedert and Eugene Ma and Ivan Martinovic and Dawn Song",
year = "2013",
journal = "IEEE Transactions on Information Forensics and Security",
month = "january",
number = "1",
volume = "8",
doi = "10.1109/TIFS.2012.2225048",
}
@inproceedings{Prisms13,
title = "SAFE: Secure Authentication with Face and Eyes",
author = "Boehm, Arman and Chen, Dongqu and Frank, Mario and Huang, Ling and Kuo, Cynthia and Lolic, Tihomir and Martinovic, Ivan and Song,Dawn",
year = "2013",
booktitle = "Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems (successor of MobiSec). Proceedings in preparation.",
note = "\textbf{Best Paper Award}",
url = "http://www2.berkeley.intel-research.net/~hling/research/safeI3e.pdf",
}
@inproceedings{ACNS13,
title = "Experimental Analysis of Attacks on Next Generation Air Traffic Communication",
author = "Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan",
year = "2013",
booktitle = "Applied Cryptography and Network Security (ACNS’13)",
isbn = "978-3-642-38979-5",
keywords = "NextGen; ADS-B; Attacks; Security; Threats; Air Safety",
pages = "253-271",
publisher = "Springer Berlin Heidelberg",
series = "Lecture Notes in Computer Science",
url = "http://dx.doi.org/10.1007/978-3-642-38980-1_16",
volume = "7954",
doi = "10.1007/978-3-642-38980-1_16",
}
@inproceedings{SFSM13,
title = "Who do you sync you are: smartphone fingerprinting via application behaviour",
author = "St\"{o}ber, Tim and Frank, Mario and Schmitt, Jens and Martinovic, Ivan",
year = "2013",
booktitle = "Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks",
isbn = "978-1-4503-1998-0",
location = "Budapest, Hungary",
pages = "7--12",
publisher = "ACM",
series = "WiSec '13",
}
@techreport{RR-13-10,
title = "Security of ADS-B: State of the Art and Beyond",
author = "Martin Strohmeier and Vincent Lenders and Ivan Martinovic",
year = "2013",
institution = "DCS",
number = "RR-13-10",
pages = "20",
}
@inproceedings{Esorics12,
title = "A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols",
author = "Eberz, Simon and Strohmeier, Martin and Wilhelm, Matthias and Martinovic, Ivan",
year = "2012",
booktitle = "17th European Symposium on Research in Computer Security (ESORICS)",
isbn = "978-3-642-33166-4",
location = "Pisa, Italy",
month = "sep",
pages = "235-252",
publisher = "Springer",
series = "Lecture Notes in Computer Science",
url = "http://link.springer.com/chapter/10.1007/978-3-642-33167-1_14",
volume = "7459",
doi = "10.1007/978-3-642-33167-1_14",
}
@inproceedings{Usenix12,
title = "On the Feasibility of Side-channel Attacks with Brain-computer Interfaces",
author = "Martinovic, Ivan and Davies, Doug and Frank, Mario and Perito, Daniele and Ros, Tomas and Song, Dawn",
year = "2012",
address = "Berkeley, CA, USA",
booktitle = "Proceedings of the 21st USENIX Conference on Security Symposium",
location = "Bellevue, WA",
month = "aug",
pages = "34–46",
publisher = "USENIX Association",
series = "Security'12",
url = "https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final56.pdf",
}
@inproceedings{GazeBasedIntrusionDetection,
title = "Stimuli for Gaze Based Intrusion Detection",
author = "Biedert, Ralf and Frank, Mario and Martinovic, Ivan and Song, Dawn",
year = "2012",
booktitle = "Future Information Technology, Application, and Service",
isbn = "978-94-007-4516-2",
month = "jul",
note = "10.1007/978-94-007-4516-2_80",
pages = "757-763",
publisher = "Springer Netherlands",
series = "Lecture Notes in Electrical Engineering",
url = "http://dx.doi.org/10.1007/978-94-007-4516-2_80",
volume = "164",
}
@inproceedings{WMSL11-2,
title = "{WiFire}: A Firewall for Wireless Networks",
author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt and Vincent Lenders",
year = "2011",
address = "New York, NY, USA",
booktitle = "Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '11)",
location = "Toronto, Canada",
month = "aug",
pages = "456--457",
publisher = "ACM",
}
@inproceedings{WMSL11-1,
title = "Reactive Jamming in Wireless Networks: How Realistic is the Threat?",
author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt and Vincent Lenders",
year = "2011",
address = "New York, NY, USA",
booktitle = "Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec '11)",
location = "Hamburg, Germany",
month = "jun",
pages = "47--52",
publisher = "ACM",
url = "http://dl.acm.org/authorize?431905",
}
@inproceedings{SGBM11-1,
title = "Pay Bursts Only Once Holds for (Some) Non-FIFO Systems",
author = "Jens B. Schmitt and Nicos Gollan and Steffen Bondorf and Ivan Martinovic",
year = "2011",
address = "Shanghai, China",
booktitle = "The 30th IEEE International Conference on Computer Communications (INFOCOM 2011)",
month = "apr",
note = "Accepted for publication.",
}
@article{WMSL11-3,
title = "{WiSec} 2011 Demo: {RFReact}---A Real-time Capable and Channel-aware Jamming Platform",
author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt and Vincent Lenders",
year = "2011",
address = "New York, NY, USA",
issn = "1559-1662",
journal = "{SIGMOBILE} Mobile Computing and Communications Review",
month = "nov",
pages = "41--42",
publisher = "ACM",
url = "http://doi.acm.org/10.1145/2073290.2073300",
volume = "15",
doi = "http://doi.acm.org/10.1145/2073290.2073300",
}
@techreport{SGBM10-1,
title = "Pay Bursts Only Once Holds for (Some) Non-FIFO Systems",
author = "Jens Schmitt and Nicos Gollan and Steffen Bondorf and Ivan Martinovic",
year = "2010",
institution = "University of Kaiserslautern, Germany",
month = "jul",
number = "378/10",
}
@inproceedings{CM10-1,
title = "{Experiental Design and Analysis of Transmission Properties in an Indoor Wireless Sensor Network}",
author = "Dennis Christmann and Ivan Martinovic",
year = "2010",
address = "Avignon, France",
booktitle = "Proceedings of the 6th International Workshop on Wireless Network Measurements ({WiNMee}), in conjunction with WiOpt 2010",
month = "may",
publisher = "IEEE Computer Society",
}
@techreport{WMS10-2,
title = "{Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels: Design, Implementation, and Analysis}",
author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt",
year = "2010",
institution = "ArXiv.org",
month = "may",
number = "arXiv:1005.0712v1 [cs.CR]",
url = "http://arxiv.org/pdf/1005.0712v1",
}
@inproceedings{WMS10-1,
title = "Secret Keys from Entangled Sensor Motes: Implementation and Analysis",
author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt",
year = "2010",
booktitle = "Proceedings of the Third ACM Conference on Wireless Network Security (WiSec '10)",
location = "Hoboken, NJ, USA",
month = "mar",
pages = "139--144",
publisher = "ACM",
}
@article{CMS10-1,
title = "Analysis of Transmission Properties in an Indoor Wireless Sensor Network Based on a Full-Factorial Design",
author = "Dennis Christmann and Ivan Martinovic and Jens B. Schmitt",
year = "2010",
issn = "doi: 10.1088/0957-0233/21/12/124003",
journal = "Special Issue on Wireless Sensor Networks - Designing for Real-world Deployment and Deployment Experiences, Measurement Science and Technology, Institute of Physics",
month = "Dec",
note = "In Print.",
number = "12",
volume = "21",
}
@article{SWM10-1,
title = "Dynamic Demultiplexing in Network Calculus -- Theory and Application",
author = "Jens B. Schmitt and Hao Wang and Ivan Martinovic",
year = "2010",
issn = "doi: doi:10.1016/j.peva.2010.12.002",
journal = "Performance Evaluation, Elsevier",
month = "Dec",
note = "In Press (available online). DOI: 10.1016/j.peva.2010.12.002",
}
@inproceedings{WWMKG10-1,
title = "{AmICA -- A flexible, compact, easy-to-program, and low-power WSN platform}",
author = "Sebastian Wille and Norbert Wehn and Ivan Martinovic and Simon Kunz and Peter Göhner",
year = "2010",
booktitle = "{Proceedings of 7th International Conference on Mobile and Ubiquitous Systems (Mobiqutious)}",
month = "dec",
publisher = "Springer Verlag",
}
@inproceedings{BCMO-1,
title = "{AmbiSec: Securing Smart Spaces Using Entropy Harvesting}",
author = "Paolo Barsocchi and Stefano Chessa and Ivan Martinovic and Gabriele Oligeri",
year = "2010",
booktitle = "{Proceedings of the First International Joint Conference on Ambient Intelligence (AmI-10)}",
month = "nov",
publisher = "Springer Verlag",
}
@inproceedings{WMUS10-1,
title = "{SUDOKU}: Secure and Usable Deployment of Keys on Wireless Sensors",
author = "Matthias Wilhelm and Ivan Martinovic and Ersin Uzun and Jens B. Schmitt",
year = "2010",
booktitle = "Proceedings of the 6th Annual Workshop on Secure Network Protocols (NPSec '10)",
location = "Kyoto, Japan",
month = "oct",
pages = "1--6",
publisher = "IEEE",
url = "publications/WMUS10-1.pdf",
doi = "10.1109/NPSEC.2010.5634458",
}
@inproceedings{SGM10-1,
title = "{A Self-Adversarial Approach to Delay Analysis under Arbitrary Scheduling}",
author = "Jens Schmitt and Hao Wang and Ivan Martinovic",
year = "2010",
booktitle = "{Proceedings of 4th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2010)}",
month = "oct",
publisher = "Springer Verlag",
}
@inproceedings{SM09-1,
title = "{Demultiplexing in Network Calculus - A Stochastic Scaling Approach}",
author = "Jens B. Schmitt and Ivan Martinovic",
year = "2009",
address = "Budapest, Hungary",
booktitle = "Proceedings of the 6th International Conference on Quantitative Evaluation of SysTems (QEST) 2009",
month = "sep",
pages = "82--93",
publisher = "IEEE Computer Society",
}
@article{MCGS09-1,
title = "{Chaotic Communication Improves Authentication: Protecting WSNs Against Injection Attacks}",
author = "Ivan Martinovic and Luc Cappellaro and Nicos Gollan and Jens B. Schmitt",
year = "2009",
journal = "Security and Communication Networks, Special Issue on Security in Wireless Sensor Networks, Wiley",
month = "mar",
number = "2",
pages = "117--132",
publisher = "Wiley",
volume = "2",
}
@inproceedings{SGM09-1,
title = "{A New Service Curve Model to Deal with Non-FIFO Systems}",
author = "Jens B. Schmitt and Nicos Gollan and Ivan Martinovic",
year = "2009",
booktitle = "16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany",
month = "mar",
note = "143--154",
publisher = "Springer Informatik Aktuell",
}
@inproceedings{MS09-1,
title = "{Turning The Tables: Using Wireless Communication Against An Attacker}",
author = "Ivan Martinovic and Jens B. Schmitt",
year = "2009",
booktitle = "16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany",
month = "mar",
pages = "205--216",
publisher = "Springer Informatik Aktuell",
}
@inproceedings{MPS09-1,
title = "{Jamming for Good: A Fresh Approach to Authentic Communication in WSNs}",
author = "Ivan Martinovic and Paul Pichota and Jens B. Schmitt",
year = "2009",
address = "Zurich, Switzerland",
booktitle = "Proceedings of the ACM Conference on Wireless Network Security (WiSec 2009)",
month = "mar",
pages = "161--168",
publisher = "ACM Press",
}
@inproceedings{WMS09-2,
title = "{Light-weight Key Generation based on Physical Properties of Wireless Channels}",
author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt",
year = "2009",
address = "University of Trier, Germany",
booktitle = "{Proceedings of the 11. Kryptotag der Gesellschaft f\"ur Informatik e.V.}",
location = "Trier, Germany",
month = "nov",
pages = "4",
}
@inproceedings{AINTEC09-3,
title = "{Security by Wireless or Why Play Fairer than the Attacker?}",
author = "Ivan Martinovic",
year = "2009",
address = "Bangkok, Thailand",
booktitle = "Proceedings of the 5th ACM SIGCOMM Asian Internet Engineering Conference (AINTEC) 2009",
month = "nov",
publisher = "ACM, invited paper",
}
@inproceedings{WMS09-1,
title = "On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties",
author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt",
year = "2009",
booktitle = "{Proceedings of the 5th Annual Workshop on Secure Network Protocols (NPSec '09)}",
location = "Princeton, NJ, USA",
month = "oct",
pages = "37--42",
publisher = "IEEE Computer Society",
}
@article{MPWZS09-1,
title = "Bringing law and order to IEEE 802.11 networks -- A case for DiscoSec",
author = "Ivan Martinovic and Paul Pichota and Matthias Wilhelm and Frank A. Zdarsky and Jens B. Schmitt",
year = "2009",
issn = "1574--1192",
journal = "Pervasive and Mobile Computing (PMC)",
number = "5",
pages = "510--525",
publisher = "Elsevier",
volume = "5",
}
@inproceedings{MS08-1,
title = "{A Novel Approach for a Lightweight, Crypto-free Message Authentication in Wireless Sensor Networks}",
author = "Ivan Martinovic and Jens B. Schmitt",
year = "2008",
booktitle = "Proceedings of the 7. GI/ITG KuVS Fachgespr\"ach "Drahtlose Sensornetze", Berlin, Germany",
month = "sep",
}
@techreport{SGM08,
title = "{End-to-End Worst-Case Analysis of Non-FIFO Systems}",
author = "Jens B. Schmitt and Nicos Gollan and Ivan Martinovic",
year = "2008",
institution = "University of Kaiserslautern, Germany",
month = "aug",
number = "370/08",
}
@inproceedings{MPWZS08-1,
title = "Design, Implementation, and Performance Analysis of DiscoSec -- Service Pack for Securing WLANs",
author = "Ivan Martinovic and Paul Pichota and Matthias Wilhelm and Frank A. Zdarsky and Jens B. Schmitt",
year = "2008",
address = "Newport Beach, CA, USA",
booktitle = "9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2008)",
month = "jun",
note = "Accepted as noteworthy contribution.",
pages = "1--10",
}
@inproceedings{MZMWS-1,
title = "Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless",
author = "Ivan Martinovic and Frank A. Zdarsky and Matthias Wilhelm and Christian Wegmann and Jens B. Schmitt",
year = "2008",
booktitle = "Proceedings of the ACM Conference on Wireless Network Security (WiSec '08)",
location = "Alexandria, VA, USA",
month = "mar",
pages = "36--45",
publisher = "ACM Press",
}
@inproceedings{GZMS08-1,
title = "The DISCO Network Calculator",
author = "Nicos Gollan and Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
year = "2008",
address = "Dortmund, Germany",
booktitle = "14th GI/ITG Conference on Measurement, Modeling, and Evaluation of Computer and Communication Systems (MMB 2008)",
month = "mar",
organization = "GI/ITG",
}
@inproceedings{SZM08-1,
title = "Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once",
author = "Jens B. Schmitt and Frank A. Zdarsky and Ivan Martinovic",
year = "2008",
address = "Dortmund, Germany",
booktitle = "14th GI/ITG Conference on Measurement, Modeling, and Evaluation of Computer and Communication Systems (MMB 2008)",
month = "mar",
organization = "GI/ITG",
}
@inproceedings{MGS08,
title = "Firewalling Wireless Sensor Networks: Security by Wireless",
author = "Ivan Martinovic and Nicos Gollan and Jens B. Schmitt",
year = "2008",
address = "Montreal, Canada",
booktitle = "{Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN): Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2008)}",
month = "oct",
pages = "770 -- 777",
}
@inproceedings{BMS08-1,
title = "{Enabling Authentic Transmissions in WSNs -- Turning Jamming against the Attacker}",
author = "Adam Bachorek and Ivan Martinovic and Jens B. Schmitt",
year = "2008",
address = "Orlando, FL, USA",
booktitle = "{Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008)}",
month = "oct",
pages = "21--26",
}
@article{SG08-1,
title = "{Worst Case Modelling of Wireless Sensor Networks}",
author = "Jens B. Schmitt and Nicos Gollan",
year = "2008",
journal = "Praxis der Informationsverarbeitung und Kommunikation",
month = "jan",
pages = "12--16",
publisher = "Fachgruppe Kommunikation und Verteilte Systeme, Universit\"at zu L\"ubeck",
volume = "1",
}
@incollection{MZBS-1,
title = "{Security in IEEE 802.11-based UMA Networks}",
author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Jens B. Schmitt",
year = "2008",
booktitle = "{Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications}",
editor = "Y. Zhang and L. T. Yang and J. Ma",
note = "ISBN:1420055372. Accepted for publication",
publisher = "Auerbach Publications, Taylor&Francis Group",
}
@incollection{ZM-1,
title = "{Radio Resource Management in IEEE 802.11-based UMA Networks}",
author = "Frank A. Zdarsky and Ivan Martinovic",
year = "2008",
booktitle = "{Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications}",
editor = "Y. Zhang and L. T. Yang and J. Ma",
note = "ISBN:1420055372. Accepted for publication",
publisher = "Auerbach Publications, Taylor&Francis Group",
}
@article{ZMS08-1,
title = "{Minimizing Contention through Cooperation between Densely-Deployed Wireless LANs}",
author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
year = "2007",
journal = "Wireless Networks, Springer",
month = "sep",
publisher = "Springer",
volume = "ISSN 1022-0038 (Print) 1572-8196 (Online)",
}
@inproceedings{MZBJS06-1,
title = "{Phishing in the Wireless: Implementation and Analysis}",
author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Christian Jung and Jens B. Schmitt",
year = "2007",
booktitle = "Proceedings of the 22nd IFIP International Information Security Conference (SEC 2007), Johannesburg, South Africa",
month = "may",
pages = "145--156",
publisher = "Springer",
volume = "Volume 232/2007",
}
@inproceedings{MZBS07-1,
title = "{Measurement and Analysis of Handover Latencies in IEEE 802.11i Secured Networks}",
author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Jens B. Schmitt",
year = "2007",
booktitle = "Proceedings of the 13th European Wireless Conference (EW2007), Paris, France",
month = "apr",
}
@inproceedings{MZS07-1,
title = "{Regional-based Authentication Against DoS Attacks in Wireless Networks}",
author = "Ivan Martinovic and Frank A. Zdarsky and Jens B. Schmitt",
year = "2007",
address = "Greece",
booktitle = "Proceedings of the 3rd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks (in conjunction with ACM/IEEE MSWiM'07)",
month = "oct",
}
@inproceedings{ZMS06-1,
title = "{The Case for Virtualized Wireless Access Networks}",
author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
year = "2006",
booktitle = "Proceedings of the International Workshop on Self-Organizing Systems (IWSOS 2006), Passau, Germany",
month = "sep",
publisher = "Springer LNCS",
}
@inproceedings{MLZMSS06-1,
title = "{Self-Protection in P2P Networks: Choosing the Right Neighbourhood}",
author = "Ivan Martinovic and Christof Leng and Frank A. Zdarsky and Andreas Mauthe and Ralf Steinmetz and Jens B. Schmitt",
year = "2006",
booktitle = "Proceedings of the International Workshop on Self-Organizing Systems (IWSOS 2006), Passau, Germany",
month = "sep",
publisher = "Springer LNCS",
}
@inproceedings{ZMS06-2,
title = "{On Self-coordination in Wireless Community Networks}",
author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
year = "2006",
booktitle = "Proceedings of the 11th IFIP International Conference on Personal Wireless Communications (PWC'06), Albacete, Spain",
month = "sep",
publisher = "Springer LNCS",
}
@inproceedings{MZS06-1,
title = "{On the Way to IEEE 802.11 DoS Resilience}",
author = "Ivan Martinovic and Frank A. Zdarsky and Jens B. Schmitt",
year = "2006",
booktitle = "Proceedings of IFIP NETWORKING 2006, Workshop on Security and Privacy in Mobile and Wireless Networking, Coimbra, Portugal",
month = "may",
publisher = "Springer LNCS",
}
@techreport{SZM06-1,
title = "{Performance Bounds in Feed-Forward Networks under Blind Multiplexing}",
author = "Jens B. Schmitt and Frank A. Zdarsky and Ivan Martinovic",
year = "2006",
institution = "University of Kaiserslautern, Germany",
month = "apr",
number = "349/06",
}
@inproceedings{MS06-1,
title = "{Zu den Grenzen der Technik bei der Entwicklung von Konzepten zur Online-Betrugs-Pr\"avention (Invited Paper)}",
author = "Ivan Martinovic and Jens B. Schmitt",
year = "2006",
booktitle = "Deutsches Forum f\"ur Kriminalpr\"avention (DFK) Workshop "Internet-Devianz", Bonn, Germany",
month = "oct",
publisher = "Deutsches Forum f\"ur Kriminalpr\"avention",
}
@techreport{MZBS06-1,
title = "{Introduction of IEEE 802.11i and Measuring its Security vs. Performance Tradeoff}",
author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Jens B. Schmitt",
year = "2006",
institution = "University of Kaiserslautern, Germany",
month = "oct",
number = "351/06",
}
@techreport{MZBJS06,
title = "{Phishing in the Wireless: Implementation and Analysis}",
author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Christan Jung and Jens B. Schmitt",
year = "2006",
institution = "University of Kaiserslautern, Germany",
month = "oct",
number = "367/07",
}
@inproceedings{ZMS05-3,
title = "{On Lower Bounds for MAC Layer Contention in CSMA/CA-Based Wireless Networks}",
author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
year = "2005",
address = "Cologne, Germany",
booktitle = "3rd ACM/SIGMOBILE International Workshop on Foundations of Mobile Computing (DIALM-POMC'05)",
month = "sep",
pages = "8--16",
}
@techreport{ZMS05-2,
title = "{Self-Coordination Mechanisms for Wireless Community Networks}",
author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
year = "2005",
institution = "University of Kaiserslautern, Germany",
month = "jul",
number = "339/05",
}
@techreport{ZMS05-1,
title = "{Lower Bounds for Contention in CSMA/CA-based Wireless LANs}",
author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
year = "2005",
institution = "University of Kaiserslautern, Germany",
month = "jul",
number = "338/05",
}
@inproceedings{HMKR04-1,
title = "{A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks}",
author = "Matthias Hollick and Ivan Martinovic and Tronje Krop and Ivica Rimac",
year = "2004",
booktitle = "Proceedings of the 30th IEEE EUROMICRO Conference, Rennes, France",
month = "sep",
note = "ISBN 0-7695-2199-1",
pages = "495--502",
publisher = "IEEE",
}
@inproceedings{SEM+04-1,
title = "{Digital Heritage Application as an Edutainment Tool}",
author = "Meehae Song and Thomas Elias and Ivan Martinovic and Wolfgang M{\"u}ller-Wittig and Tony K.Y. Chan",
year = "2004",
booktitle = "Proceedings of the ACM SIGGRAPH International Conference on Virtual Reality Continuum and its Applications in Industry",
month = "jun",
note = "ISBN 1-58113-884-9",
pages = "163--167",
publisher = "ACM Press",
}
@incollection{SBM04-1,
title = "{Web Services zur Unterst{\"u}tzung flexibler Gesch{\"a}ftsprozesse in der Finanzwirtschaft}",
author = "Ralf Steinmetz and Rainer Berbner and Ivan Martinovic",
year = "2004",
booktitle = "Handbuch Industrialisierung der Finanzwirtschaft",
editor = "Z. Sokolovsky and S. L{\"o}schenkohl",
month = "dec",
note = "ISBN 3-409-12675-9",
publisher = "Gabler Verlag",
}
@inproceedings{MGA+04-1,
title = "{Trust and Context: Complementary Concepts for Creating Spontaneous Networks and Intelligent Applications}",
author = "Ivan Martinovic and Manuel Goertz and Ralf Ackermann and Andreas Mauthe and Ralf Steinmetz",
year = "2004",
booktitle = "Proceedings of SoftCOM'04, International Conference on Software, Telecommunications and Computer Networks, Croatia",
month = "oct",
note = "~",
}
@inproceedings{SEM+03-1,
title = "{User-Centred Virtual Avatars in Real-time}",
author = "Meehae Song and Thomas Elias and Ivan Martinovic and Wolfgang M{\"u}ller-Wittig and Tony K.Y. Chan",
year = "2003",
booktitle = "Proceedings of the 9th International Conference on Virtual Systems and Multimedia (VSMM 2003), Montreal, Canada",
month = "oct",
note = "~",
}