Skip to main content

Kasper Rasmussen : Publications

Click here to download all publications in a single bibtex file

@inproceedings{2025-ndss-akt,
  title = "Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks",
  author = "Aktypi, Angeliki and Rasmussen, Kasper",
  year = "2025",
  booktitle = "Proceedings of the 32nd Annual Network and Distributed System Security Symposium (NDSS '25)",
  isbn = "979-8-9894372-8-3",
  keywords = "p2p; chord; privacy; authentication",
  month = "February",
  doi = "10.14722/ndss.2025.240392",
}
@inproceedings{loughry_woot_2024,
  title = "Basilisk: Remote Code Execution by Laser Excitation of P-N Junctions Without Insider Assistance",
  author = "Joe Loughry and Kasper Rasmussen",
  year = "2024",
  booktitle = "In 18th USENIX WOOT Conference on Offensive Technologies (WOOT)",
  month = "August",
}
@inproceedings{Imanda_ares_2023,
  title = "Nakula: Coercion Resistant Data Storage against Time-Limited Adversary",
  author = "Hayyu Imanda and Kasper Rasmussen",
  year = "2023",
  booktitle = "18th International Conference on Availability, Reliability and Security (ARES)",
  month = "August",
}
@inproceedings{teng_ares_2023,
  title = "Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine Communication",
  author = "Wil Liam Teng and Kasper Rasmussen",
  year = "2023",
  booktitle = "18th International Conference on Availability, Reliability and Security (ARES)",
  month = "August",
}
@inproceedings{zhang_asiaccs23,
  title = "Electromagnetic Signal Injection Attacks on Differential Signaling",
  author = "Youqian Zhang and Kasper Rasmussen",
  year = "2023",
  booktitle = "ACM ASIA Conference on Computer and Communications Security (AsiaCCS)",
  month = "July",
}
@inproceedings{rogersasiaccs23,
  title = "An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks",
  author = "Matthew Rogers and Kasper Rasmussen",
  year = "2023",
  booktitle = "ACM ASIA Conference on Computer and Communications Security (AsiaCCS)",
  month = "July",
}
@article{munir_reggard,
  title = "RegGuard: Leveraging CPU Registers for Mitigation of Control- and Data-Oriented Attacks",
  author = "Munir Geden and Kasper Rasmussen",
  year = "2023",
  journal = "Computers and Security",
  month = "March",
}
@inproceedings{geden_IET_2023,
  title = "Hardware-Assisted Remote Attestation Design for Critical Embedded Systems",
  author = "Munir Geden and Kasper Rasmussen",
  year = "2023",
  booktitle = "IET Information Security",
  month = "March",
}
@article{10323596,
  title = "A Visionary Look at the Security of Reconfigurable Cloud Computing",
  author = "Stojilović, Mirjana and Rasmussen, Kasper and Regazzoni, Francesco and Tahoori, Mehdi B. and Tessier, Russell",
  year = "2023",
  journal = "Proceedings of the IEEE",
  month = "November",
  pages = "1-24",
  doi = "10.1109/JPROC.2023.3330729",
}
@article{10288202,
  title = "Targeted Detection for Attacks on the MIL-STD-1553 Bus",
  author = "Rogers, Matthew and Rasmussen, Kasper",
  year = "2023",
  journal = "IEEE Transactions on Aerospace and Electronic Systems",
  month = "October",
  pages = "1-10",
  doi = "10.1109/TAES.2023.3325423",
}
@inproceedings{2022-ares-akt,
  title = "Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing",
  author = "Aktypi, Angeliki and Karnikis, Dimitris and Vasilakis, Nikos and Rasmussen, Kasper",
  year = "2022",
  booktitle = "Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES '22)",
  isbn = "978-1-4503-9670-7/22/08",
  keywords = "dht; security; serverless; service mesh",
  month = "August",
  publisher = "ACM",
  series = "ARES '22",
  doi = "10.1145/3538969.3538983",
}
@article{antonioli2022,
  title = "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy",
  author = "Antonioli, Daniele and Ole Tippenhauer, Nils and Rasmussen, Kasper and Payer, Mathias",
  year = "2022",
  journal = "ASIA Conference on Computer and Communications Security (AsiaCCS)",
  month = "May",
}
@inproceedings{Rogers2022,
  title = "Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus",
  author = "Matthew Rogers and Kasper Rasmussen",
  year = "2022",
  booktitle = "Embedded Security in Cars (escar)",
  month = "November",
}
@inproceedings{zhang_raid22,
  title = "Detection of Electromagnetic Signal Injection Attacks on Actuator Systems",
  author = "Youqian Zhang and Kasper Rasmussen",
  year = "2022",
  booktitle = "25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022)",
  month = "October",
}
@article{GiechaskielDT2022,
  title = "Long-Wire Leakage: The Threat of Crosstalk",
  author = "Ilias Giechaskiel‚ Kasper Rasmussen and Ken Eguro",
  year = "2022",
  journal = "IEEE Design and Test",
  month = "January",
}
@inproceedings{Giec2021,
  title = "Extended Abstract: Covert Channels and Data Exfiltration from {FPGAs}",
  author = "Giechaskiel, Ilias and Eguro, Ken and Rasmussen, Kasper",
  year = "2021",
  booktitle = "Design, Automation and Test in Europe, {DATE}",
  month = "February",
}
@inproceedings{burton2021,
  title = "Private Data Exfiltration From Cyber-Physical Systems Using Channel State Information",
  author = "Burton, Thomas and Rasmussen, Kasper",
  year = "2021",
  booktitle = "Workshop on Privacy in the Electronic Society",
  month = "November",
}
@article{10.1145/3394497,
  title = "Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy",
  author = "Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper",
  year = "2020",
  address = "New York, NY, USA",
  issn = "2471-2566",
  journal = "ACM Trans. Priv. Secur.",
  keywords = "bluetooth, downgrade attack, key negotiation, BLE, KNOB attack, Security",
  month = "June",
  number = "3",
  publisher = "Association for Computing Machinery",
  volume = "23",
  doi = "10.1145/3394497",
}
@inproceedings{giechaskielSP20,
  title = "CAPSULe: Cross-FPGA covert-channel attacks through power supply unit leakage",
  author = "Giechaskiel, Ilias and Rasmussen, Kasper and Szefer, Jakub",
  year = "2020",
  booktitle = "IEEE Symposium on Security and Privacy (S&P)",
  month = "May",
}
@inproceedings{antonioli20bias,
  title = "BIAS: {Bluetooth} Impersonation AttackS",
  author = "Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper",
  year = "2020",
  booktitle = "Proceedings of the IEEE Symposium on Security and Privacy (S&P)",
  month = "May",
}
@inproceedings{sp20Zhang,
  title = "Detection of Electromagnetic Interference Attacks on Sensor Systems",
  author = "Zhang, Youqian and Rasmussen, Kasper",
  year = "2020",
  booktitle = "IEEE Symposium on Security and Privacy (S&P)",
  month = "May",
}
@article{kalkan20,
  title = "{TruSD}: Trust Framework for Service Discovery among IoT Devices",
  author = "Kalkan, Kübra and Rasmussen, Kasper",
  year = "2020",
  journal = "Computer Networks",
  month = "March",
}
@article{giechaskielCOMST20,
  title = "Taxonomy and challenges of out-of-band signal injection attacks and defenses",
  author = "Giechaskiel, Ilias and Rasmussen, Kasper",
  year = "2020",
  journal = "IEEE Communications Surveys \& Tutorials ({COMST})",
  month = "March",
  volume = "22",
}
@inproceedings{2020-codaspy-akt,
  title = "SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network",
  author = "Aktypi, Angeliki and Kalkan, Kubra and Rasmussen, Kasper B.",
  year = "2020",
  booktitle = "Proceedings of the 10th ACM Conference on Data and Application Security and Privacy (CODASPY '20)",
  isbn = "978-1-4503-7107-0/20/03",
  keywords = "iot, dht, privacy, scalability, fault-tolerance, resource sharing",
  month = "March",
  publisher = "ACM",
  series = "CODASPY ’20",
  doi = "10.1145/3374664.3375739",
}
@inproceedings{14290,
  title = "TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity",
  author = "Geden, Munir and Rasmussen, Kasper",
  year = "2020",
  booktitle = "The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)",
  month = "December",
  doi = "10.1109/TrustCom50675.2020.00035",
}
@inproceedings{giechaskielFPGA20,
  title = "Fingerprinting Cloud {FPGA} Infrastructures",
  author = "Tian, Shanquan and Xiong, Wenjie and Giechaskiel, Ilias and Rasmussen, Kasper and Szefer, Jakub",
  year = "2020",
  booktitle = "ACM/SIGDA International Symposium on Field-Programmable Gate Arrays ({FPGA})",
  month = "Febuary",
}
@inproceedings{giechaskielFPL19,
  title = "Measuring long wire leakage with ring oscillators in cloud {FPGAs}",
  author = "Giechaskiel, Ilias and Rasmussen, Kasper and Szefer, Jakub",
  year = "2019",
  booktitle = "International Conference on Field-Programmable Logic and Applications ({FPL})",
  month = "September",
}
@inproceedings{iliasESORICS2019,
  title = "A Framework for Evaluating Security in the Presence of Signal Injection Attacks",
  author = "Ilias Giechaskiel and Youqian Zhang and Kasper Rasmussen",
  year = "2019",
  booktitle = "In European Symposium on Research in Computer Security (ESORICS)",
  month = "September",
}
@inproceedings{giechaskiel2019measuring,
  title = "Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs",
  author = "Ilias Giechaskiel and Kasper Rasmussen and Jakub Szefer",
  year = "2019",
  booktitle = "Proceedings of the International Conference on Field-Programmable Logic and Applications",
  month = "September",
  series = "FPL",
}
@inproceedings{8949036,
  title = "Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems",
  author = "Geden, Munir and Rasmussen, Kasper",
  year = "2019",
  booktitle = "2019 17th International Conference on Privacy, Security and Trust (PST)",
  month = "August",
  pages = "1-10",
  doi = "10.1109/PST47121.2019.8949036",
}
@inproceedings{usenix19antonioli,
  title = "The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR",
  author = "Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper",
  year = "2019",
  booktitle = "USENIX Security Symposium",
  month = "August",
}
@inproceedings{rasmussenNDSS19,
  title = "Nearby Threats: Reversing, Analyzing, and Attacking Google's "Nearby Connections" on Android",
  author = "Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen",
  year = "2019",
  booktitle = "Network and Distributed System Security Symposium {(NDSS)}",
  month = "February",
}
@inproceedings{iliasICCD19,
  title = "Reading Between the Dies: Cross-{SLR} Covert Channels on Multi-Tenant Cloud {FPGAs}",
  author = "Ilias Giechaskiel and Kasper Rasmussen and Jakub Szefer",
  year = "2019",
  booktitle = "{IEEE} International Conference on Computer Design ({ICCD})",
  month = "November",
}
@inproceedings{eberzCCS19,
  title = "28 Blinks Later: Tackling Practical Challenges of Eye",
  author = "Simon Eberz and Giulio Lovisotto and Kasper Rasmussen and Vincent Lenders and Ivan Martinovic",
  year = "2019",
  booktitle = "ACM Conference on Computer and Communications Security ({CCS})",
  month = "November",
}
@article{ilias2019,
  title = "Leakier Wires: Exploiting {FPGA} Long Wires for Covert- and Side-Channel Attacks",
  author = "Ilias Giechaskiel and Ken Eguro and Kasper Rasmussen",
  year = "2019",
  journal = "Transactions on Reconfigurable Technology and Systems (TRETS)",
}
@article{avoineACMCS17,
  title = "Security of Distance-Bounding: A Survey",
  author = "Gildas Avoine and Muhammed Ali Bingöl and Ioana Boureanu and Srdjan Čapkun and Gerhard Hancke and Süleyman Kardaş and Chong Hee Kim and Cédric Lauradoux and Benjamin Martin and Jorge Munilla and Alberto Peinado and Kasper Rasmussen and Dave Singelée and Aslan Tchamkerten and Rolando Trujillo-Rasua and Serge Vaudenay",
  year = "2018",
  journal = "{ACM} Computing Surveys",
  month = "September",
  number = "5",
  volume = "51",
}
@inproceedings{RasmussenPST2018,
  title = "On the Relationship Between Weak and Strong Deniable Authenticated Encryption",
  author = "Rasmussen, Kasper and Gasti, Paolo",
  year = "2018",
  booktitle = "International Conference on Privacy, Security, and Trust (PST)",
  month = "August",
}
@inproceedings{rasmussen_AciaCCS_2018,
  title = "Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires",
  author = "Ilias Giechaskiel and Kasper Rasmussen and Ken Eguro",
  year = "2018",
  booktitle = "ACM Asia Conference on Computer & Communications Security ({AsiaCCS})",
  month = "July",
}
@inproceedings{marc2018vnc,
  title = "Bionyms: Driver-centric Message Authentication using Biometric Measurements",
  author = "Roeschlin, Marc and Vaas, Christian and Rasmussen, Kasper and Martinovic, Ivan",
  year = "2018",
  journal = "IEEE Vehicular Networking Conference (VNC)",
  month = "December",
}
@article{sluganovicTOPS18,
  title = "Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication",
  author = "Sluganovic, Ivo and Roeschlin, Marc and Rasmussen, Kasper and Martinovic, Ivan",
  year = "2018",
  journal = "Transactions on Privacy and Security {(TOPS)}",
}
@inproceedings{rasmussen_NDSS_2018,
  title = "Device Pairing at the Touch of an Electrode",
  author = "Marc Roeschlin and Ivan Martinovic and Kasper Rasmussen",
  year = "2018",
  booktitle = "Network and Distributed System Security Symposium ({NDSS})",
  month = "Febuary",
}
@inproceedings{eberzASIACCS17,
  title = "Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics",
  author = "Eberz, Simon and Rasmussen, Kasper and Lenders, Vincent and Martinovic, Ivan",
  year = "2017",
  booktitle = "{ACM} Asia Conference on Computer and Communications Security {(ASIACCS)}",
  month = "April",
}
@article{cacm-pule-resp,
  title = "Authentication Using Pulse-Response Biometrics",
  author = "Martinovic, Ivan and Rasmussen, Kasper B. and Roeschlin, Marc and Tsudik, Gene",
  year = "2017",
  journal = "Communications of the ACM",
  month = "March",
  publisher = "ACM",
}
@article{roeshlinTISSEC17,
  title = "Pulse-Response: Exploring Human Body Impedance for Biometric Recognition",
  author = "Kasper Rasmussen‚ Marc Roeschlin‚ Ivan Martinovic and Gene Tsudik",
  year = "2017",
  journal = "ACM Transactions on Privacy and Security (TOPS)",
}
@inproceedings{rasmussen_SPSI_2017,
  title = "When The "Crypto" in Cryptocurrencies Breaks: Bitcoin Security Under Broken Primitives",
  author = "Ilias Giechaskiel and Cas Cremers and Kasper Rasmussen",
  year = "2017",
  booktitle = "{IEEE} Security \& Privacy",
}
@inproceedings{rasmussenESORICS16,
  title = "On Bitcoin Security in the Presence of Broken Cryptographic Primitives",
  author = "Giechaskiel, Ilias and Cremers, Cas and Rasmussen, Kasper B.",
  year = "2016",
  booktitle = "European Symposium on Research in Computer Security ({ESORICS})",
  month = "September",
}
@article{Eberz:2016:LLE:2957761.2904018,
  title = "Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics",
  author = "Eberz, Simon and Rasmussen, Kasper B. and Lenders, Vincent and Martinovic, Ivan",
  year = "2016",
  address = "New York, NY, USA",
  issn = "2471-2566",
  journal = "ACM Transactions on Privacy and Security",
  keywords = "Biometrics, continuous authentication, metrics",
  month = "June",
  number = "1",
  publisher = "ACM",
  volume = "19",
}
@article{Tippenhauer2016,
  title = "Physical-Layer Integrity for Wireless Messages",
  author = "Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan Capkun",
  year = "2016",
  journal = "Computer Networks",
  month = "June",
}
@inproceedings{rasmussen2016DAC,
  title = "Remote Attestation for Low-End Embedded Devices: the Prover's Perspective",
  author = "Brasser, Ferdinand and Rasmussen, Kasper and Sadeghi, Ahmad-Reza and Tsudik, Gene",
  year = "2016",
  booktitle = "Design Automation Conference {(DAC)}",
  month = "June",
}
@inproceedings{rasmussenLCN16,
  title = "I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol",
  author = "Javali, Chitra and Revadigar, Girish and Rasmussen, Kasper B. and Hu, Wen and Jha, Sanjay",
  year = "2016",
  booktitle = "IEEE Conference on Local Computer Networks ({LCN})",
  month = "November",
}
@inproceedings{RasmussenWPES,
  title = "Generating Secret Keys from Biometric Body Impedance Measurement",
  author = "Roeschlin, Marc and Sluganovic, Ivo and Martinovic, Ivan and Rasmussen, Kasper B.",
  year = "2016",
  booktitle = "Workshop on Privacy in the Electronic Society, (WPES)",
  month = "October",
}
@inproceedings{rasmussenCCS16,
  title = "Using Reflexive Eye Movements For Fast Challenge-Response Authentication",
  author = "Sluganovic, Ivo and Roeschlin, Marc and Rasmussen, Kasper B. and Martinovic, Ivan",
  year = "2016",
  booktitle = "ACM Conference on Computer and Communications Security ({CCS})",
  month = "October",
}
@inproceedings{rasmussen15bodynet,
  title = "Mobility Independent Secret Key Generation for Wearable Health-care Devices",
  author = "Girish Revadigar and Chitra Javali and Hassan Jameel Asghar and Kasper B. Rasmussen and Sanjay Jha",
  year = "2015",
  booktitle = "International Conference on Body Area Networks (Bodynets)",
  month = "September",
}
@inproceedings{Revadigar:2015:ISK:2714576.2714644,
  title = "iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel",
  author = "Revadigar, Girish and Javali, Chitra and Asghar, Hassan Jameel and Rasmussen, Kasper B. and Jha, Sanjay",
  year = "2015",
  booktitle = "Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security",
  location = "Singapore, Republic of Singapore",
  month = "April",
}
@inproceedings{rasmussen15NDSS,
  title = "Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics",
  author = "Simon Eberz and Kasper B. Rasmussen and Vincent Lenders and Ivan Martinovic",
  year = "2015",
  booktitle = "The Network and Distributed System Security Symposium (NDSS)",
  month = "February",
}
@inproceedings{Rasmussen15wpes,
  title = "Privacy-preserving User Matching",
  author = "Gasti, Paolo and Rasmussen, Kasper B.",
  year = "2015",
  booktitle = "ACM Workshop on Privacy in the Electronic Society (WPES15)",
  month = "October",
}
@inproceedings{rasmussen14PST,
  title = "Undetectable Communication: The Online Social Networks Case",
  author = "Beato, Filipe and De Cristofaro, Emiliano and Rasmussen, Kasper B.",
  year = "2014",
  booktitle = "Privacy, Security and Trust (PST)",
  month = "July",
}
@inproceedings{remonteatt,
  title = "A Minimalist Approach to Remote Attestation",
  author = "Aurelien Francillon and Quan Nguyen and Kasper Bonne Rasmussen and Gene Tsudik",
  year = "2014",
  booktitle = "Design Automation and Test in Europe ({DATE})",
  month = "3",
}
@inproceedings{contauth,
  title = "Authentication Using Pulse-Response Biometrics",
  author = "Rasmussen, Kasper Bonne and Roeschlin, Marc and Martinovic, Ivan and Tsudik, Gene",
  year = "2014",
  booktitle = "The Network and Distributed System Security Symposium ({NDSS})",
  month = "2",
}
@inproceedings{pmdb,
  title = "On the Security of Password Manager Database Formats",
  author = "Paolo Gasti and Kasper Bonne Rasmussen",
  year = "2012",
  booktitle = "ESORICS",
  pages = "770-787",
}
@inproceedings{hijacking,
  title = "Distance Hijacking Attacks on Distance Bounding Protocols",
  author = "Cas Cremers and Kasper Bonne Rasmussen and Benedikt Schmidt and Srdjan Capkun",
  year = "2012",
  booktitle = "IEEE Symposium on Security and Privacy",
}
@inproceedings{gps.spoof,
  title = "On the requirements for successful GPS spoofing attacks",
  author = "Tippenhauer, Nils Ole and P\"{o}pper, Christina and Rasmussen, Kasper Bonne and Capkun, Srdjan",
  year = "2011",
  booktitle = "Proceedings of the 18th ACM conference on Computer and communications security",
  location = "Chicago, Illinois, USA",
  publisher = "ACM",
}
@article{stidsen10,
  title = "Optimal routing with failure-independent path protection",
  author = "Thomas Stidsen and Bjørn Petersen and Simon Spoorendonk and Martin Zachariasen and Kasper Bonne Rasmussen",
  year = "2010",
  journal = "Networks",
  pages = "125-137",
  volume = "55(2)",
}
@inproceedings{rasmussenUSENIX10,
  title = "Realization of {RF} Distance Bounding",
  author = "Rasmussen, K.B. and \v{C}apkun, S.",
  year = "2010",
  booktitle = "USENIX Security 2010",
}
@inproceedings{wlan,
  title = "Attacks on public WLAN-based positioning systems",
  author = "Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Christina P{\"o}pper and Srdjan Capkun",
  year = "2009",
  booktitle = "MobiSys",
  pages = "29-40",
}
@inproceedings{rasmussenCCS09,
  title = "Proximity-based Access Control for Implantable Medical Devices",
  author = "Rasmussen, Kasper Bonne and Castelluccia, Claude and Heydt-Benjamin, Thomas S. and \v{C}apkun, Srdjan",
  year = "2009",
  booktitle = "CCS '09: Proceedings of the 16th ACM conference on Computer and communications security",
  location = "Chicago Illinois, USA",
  publisher = "ACM",
}
@article{hidden,
  title = "Secure Location Verification with Hidden and Mobile Base Stations",
  author = "Srdjan \v{C}apkun and Kasper Rasmussen and Mario \v{C}agalj and Mani Srivastava",
  year = "2008",
  address = "Los Alamitos, CA, USA",
  journal = "IEEE Transactions on Mobile Computing",
  number = "4",
  publisher = "IEEE Computer Society",
  volume = "7",
}
@inproceedings{rasmussenCCS08,
  title = "Location Privacy of Distance Bounding Protocols",
  author = "Rasmussen, Kasper Bonne and \v{C}apkun, Srdjan",
  year = "2008",
  booktitle = "CCS '08: Proceedings of the 15th ACM conference on Computer and communications security",
  location = "Alexandria, Virginia, USA",
  publisher = "ACM",
}
@inproceedings{stidsen07,
  title = "Optimal Routing with Single Backup Path Protection",
  author = "Thomas Stidsen and Bjørn Petersen and Kasper Bonne Rasmussen and Simon Spoorendonk and Martin Zachariasen and Franz Rambach and Moritz Kiese",
  year = "2007",
  booktitle = "International Network Optimization Conference ({INOC})",
}
@inproceedings{fingerprint,
  title = "Implications of radio fingerprinting on the security of sensor networks",
  author = "Kasper Bonne Rasmussen and Srdjan Capkun",
  year = "2007",
  booktitle = "SecureComm",
  pages = "331-340",
}
@inproceedings{rasmussen07mobicom,
  title = "{SecNav}: Secure Broadcast Localization and Time Synchronization in Wireless Networks",
  author = "Kasper Rasmussen and Srdjan Capkun and Mario Cagalj",
  year = "2007",
  booktitle = "{MobiCom '07}: Proceedings of the 13th annual {ACM} international conference on Mobile computing and networking",
  location = "Montr\&233;al, Qu\&\#233;bec, Canada",
  publisher = "{ACM} Press",
}