Kasper Rasmussen : Publications
-
[1]
Basilisk: Remote Code Execution by Laser Excitation of P−N Junctions Without Insider Assistance
Joe Loughry and Kasper Rasmussen
In In 18th USENIX WOOT Conference on Offensive Technologies (WOOT). August, 2024.
Details about Basilisk: Remote Code Execution by Laser Excitation of P−N Junctions Without Insider Assistance | BibTeX data for Basilisk: Remote Code Execution by Laser Excitation of P−N Junctions Without Insider Assistance | Download (pdf) of Basilisk: Remote Code Execution by Laser Excitation of P−N Junctions Without Insider Assistance
-
[2]
Nakula: Coercion Resistant Data Storage against Time−Limited Adversary
Hayyu Imanda and Kasper Rasmussen
In 18th International Conference on Availability‚ Reliability and Security (ARES). August, 2023.
Details about Nakula: Coercion Resistant Data Storage against Time−Limited Adversary | BibTeX data for Nakula: Coercion Resistant Data Storage against Time−Limited Adversary
-
[3]
Actions Speak Louder Than Passwords: Dynamic Identity for Machine−to−Machine Communication
Wil Liam Teng and Kasper Rasmussen
In 18th International Conference on Availability‚ Reliability and Security (ARES). August, 2023.
Details about Actions Speak Louder Than Passwords: Dynamic Identity for Machine−to−Machine Communication | BibTeX data for Actions Speak Louder Than Passwords: Dynamic Identity for Machine−to−Machine Communication
-
[4]
Electromagnetic Signal Injection Attacks on Differential Signaling
Youqian Zhang and Kasper Rasmussen
In ACM ASIA Conference on Computer and Communications Security (AsiaCCS). July, 2023.
Details about Electromagnetic Signal Injection Attacks on Differential Signaling | BibTeX data for Electromagnetic Signal Injection Attacks on Differential Signaling | Download (pdf) of Electromagnetic Signal Injection Attacks on Differential Signaling
-
[5]
An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks
Matthew Rogers and Kasper Rasmussen
In ACM ASIA Conference on Computer and Communications Security (AsiaCCS). July, 2023.
Details about An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks | BibTeX data for An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks | Download (pdf) of An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks
-
[6]
RegGuard: Leveraging CPU Registers for Mitigation of Control− and Data−Oriented Attacks
Munir Geden and Kasper Rasmussen
In Computers and Security. March, 2023.
Details about RegGuard: Leveraging CPU Registers for Mitigation of Control− and Data−Oriented Attacks | BibTeX data for RegGuard: Leveraging CPU Registers for Mitigation of Control− and Data−Oriented Attacks
-
[7]
Hardware−Assisted Remote Attestation Design for Critical Embedded Systems
Munir Geden and Kasper Rasmussen
In IET Information Security. March, 2023.
Details about Hardware−Assisted Remote Attestation Design for Critical Embedded Systems | BibTeX data for Hardware−Assisted Remote Attestation Design for Critical Embedded Systems
-
[8]
A Visionary Look at the Security of Reconfigurable Cloud Computing
Mirjana Stojilović‚ Kasper Rasmussen‚ Francesco Regazzoni‚ Mehdi B. Tahoori and Russell Tessier
In Proceedings of the IEEE. Pages 1−24. November, 2023.
Details about A Visionary Look at the Security of Reconfigurable Cloud Computing | BibTeX data for A Visionary Look at the Security of Reconfigurable Cloud Computing | DOI (10.1109/JPROC.2023.3330729)
-
[9]
Targeted Detection for Attacks on the MIL−STD−1553 Bus
Matthew Rogers and Kasper Rasmussen
In IEEE Transactions on Aerospace and Electronic Systems. Pages 1−10. October, 2023.
Details about Targeted Detection for Attacks on the MIL−STD−1553 Bus | BibTeX data for Targeted Detection for Attacks on the MIL−STD−1553 Bus | DOI (10.1109/TAES.2023.3325423)
-
[10]
Iris: Dynamic Privacy Preserving Search in Structured Peer−to−Peer Networks
Angeliki Aktypi and Kasper Rasmussen
arXiv preprint. October, 2023.
Details about Iris: Dynamic Privacy Preserving Search in Structured Peer−to−Peer Networks | BibTeX data for Iris: Dynamic Privacy Preserving Search in Structured Peer−to−Peer Networks | Link to Iris: Dynamic Privacy Preserving Search in Structured Peer−to−Peer Networks
-
[11]
Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing
Angeliki Aktypi‚ Dimitris Karnikis‚ Nikos Vasilakis and Kasper Rasmussen
In Proceedings of the 17th International Conference on Availability‚ Reliability and Security (ARES '22). ACM. August, 2022.
Details about Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing | BibTeX data for Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing | DOI (10.1145/3538969.3538983)
-
[12]
BLURtooth: Exploiting Cross−Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
Daniele Antonioli‚ Nils Ole Tippenhauer‚ Kasper Rasmussen and Mathias Payer
In ASIA Conference on Computer and Communications Security (AsiaCCS). May, 2022.
Details about BLURtooth: Exploiting Cross−Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy | BibTeX data for BLURtooth: Exploiting Cross−Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
-
[13]
Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus
Matthew Rogers and Kasper Rasmussen
In Embedded Security in Cars (escar). November, 2022.
Details about Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus | BibTeX data for Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus
-
[14]
Detection of Electromagnetic Signal Injection Attacks on Actuator Systems
Youqian Zhang and Kasper Rasmussen
In 25th International Symposium on Research in Attacks‚ Intrusions and Defenses (RAID 2022). October, 2022.
Details about Detection of Electromagnetic Signal Injection Attacks on Actuator Systems | BibTeX data for Detection of Electromagnetic Signal Injection Attacks on Actuator Systems | Download (pdf) of Detection of Electromagnetic Signal Injection Attacks on Actuator Systems
-
[15]
Long−Wire Leakage: The Threat of Crosstalk
Ilias Giechaskiel‚ Kasper Rasmussen and Ken Eguro
In IEEE Design and Test. January, 2022.
Details about Long−Wire Leakage: The Threat of Crosstalk | BibTeX data for Long−Wire Leakage: The Threat of Crosstalk | Download (pdf) of Long−Wire Leakage: The Threat of Crosstalk
-
[16]
Extended Abstract: Covert Channels and Data Exfiltration from FPGAs
Ilias Giechaskiel‚ Ken Eguro and Kasper Rasmussen
In Design‚ Automation and Test in Europe‚ DATE. February, 2021.
Details about Extended Abstract: Covert Channels and Data Exfiltration from FPGAs | BibTeX data for Extended Abstract: Covert Channels and Data Exfiltration from FPGAs
-
[17]
Private Data Exfiltration From Cyber−Physical Systems Using Channel State Information
Thomas Burton and Kasper Rasmussen
In Workshop on Privacy in the Electronic Society. November, 2021.
Details about Private Data Exfiltration From Cyber−Physical Systems Using Channel State Information | BibTeX data for Private Data Exfiltration From Cyber−Physical Systems Using Channel State Information
-
[18]
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
Daniele Antonioli‚ Nils Ole Tippenhauer and Kasper Rasmussen
In ACM Trans. Priv. Secur.. Vol. 23. No. 3. June, 2020.
Details about Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy | BibTeX data for Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy | Download (pdf) of Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy | DOI (10.1145/3394497)
-
[19]
CAPSULe: Cross−FPGA covert−channel attacks through power supply unit leakage
Ilias Giechaskiel‚ Kasper Rasmussen and Jakub Szefer
In IEEE Symposium on Security and Privacy (S&P). May, 2020.
Details about CAPSULe: Cross−FPGA covert−channel attacks through power supply unit leakage | BibTeX data for CAPSULe: Cross−FPGA covert−channel attacks through power supply unit leakage | Download (pdf) of CAPSULe: Cross−FPGA covert−channel attacks through power supply unit leakage
-
[20]
BIAS: Bluetooth Impersonation AttackS
Daniele Antonioli‚ Nils Ole Tippenhauer and Kasper Rasmussen
In Proceedings of the IEEE Symposium on Security and Privacy (S&P). May, 2020.
Details about BIAS: Bluetooth Impersonation AttackS | BibTeX data for BIAS: Bluetooth Impersonation AttackS | Download (pdf) of BIAS: Bluetooth Impersonation AttackS
-
[21]
Detection of Electromagnetic Interference Attacks on Sensor Systems
Youqian Zhang and Kasper Rasmussen
In IEEE Symposium on Security and Privacy (S&P). May, 2020.
Details about Detection of Electromagnetic Interference Attacks on Sensor Systems | BibTeX data for Detection of Electromagnetic Interference Attacks on Sensor Systems | Download (pdf) of Detection of Electromagnetic Interference Attacks on Sensor Systems
-
[22]
TruSD: Trust Framework for Service Discovery among IoT Devices
Kübra Kalkan and Kasper Rasmussen
In Computer Networks. March, 2020.
Details about TruSD: Trust Framework for Service Discovery among IoT Devices | BibTeX data for TruSD: Trust Framework for Service Discovery among IoT Devices
-
[23]
Taxonomy and challenges of out−of−band signal injection attacks and defenses
Ilias Giechaskiel and Kasper Rasmussen
In IEEE Communications Surveys & Tutorials (COMST). Vol. 22. March, 2020.
Details about Taxonomy and challenges of out−of−band signal injection attacks and defenses | BibTeX data for Taxonomy and challenges of out−of−band signal injection attacks and defenses
-
[24]
SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network
Angeliki Aktypi‚ Kubra Kalkan and Kasper B. Rasmussen
In Proceedings of the 10th ACM Conference on Data and Application Security and Privacy (CODASPY '20). ACM. March, 2020.
Details about SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network | BibTeX data for SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network | DOI (10.1145/3374664.3375739)
-
[25]
TRUVIN: Lightweight Detection of Data−Oriented Attacks Through Trusted Value Integrity
Munir Geden and Kasper Rasmussen
In The 19th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (TrustCom). December, 2020.
Details about TRUVIN: Lightweight Detection of Data−Oriented Attacks Through Trusted Value Integrity | BibTeX data for TRUVIN: Lightweight Detection of Data−Oriented Attacks Through Trusted Value Integrity | DOI (10.1109/TrustCom50675.2020.00035)
-
[26]
Fingerprinting Cloud FPGA Infrastructures
Shanquan Tian‚ Wenjie Xiong‚ Ilias Giechaskiel‚ Kasper Rasmussen and Jakub Szefer
In ACM/SIGDA International Symposium on Field−Programmable Gate Arrays (FPGA). 2020.
Details about Fingerprinting Cloud FPGA Infrastructures | BibTeX data for Fingerprinting Cloud FPGA Infrastructures
-
[27]
Measuring long wire leakage with ring oscillators in cloud FPGAs
Ilias Giechaskiel‚ Kasper Rasmussen and Jakub Szefer
In International Conference on Field−Programmable Logic and Applications (FPL). September, 2019.
Details about Measuring long wire leakage with ring oscillators in cloud FPGAs | BibTeX data for Measuring long wire leakage with ring oscillators in cloud FPGAs
-
[28]
A Framework for Evaluating Security in the Presence of Signal Injection Attacks
Ilias Giechaskiel‚ Youqian Zhang and Kasper Rasmussen
In In European Symposium on Research in Computer Security (ESORICS). September, 2019.
Details about A Framework for Evaluating Security in the Presence of Signal Injection Attacks | BibTeX data for A Framework for Evaluating Security in the Presence of Signal Injection Attacks | Download (pdf) of A Framework for Evaluating Security in the Presence of Signal Injection Attacks
-
[29]
Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs
Ilias Giechaskiel‚ Kasper Rasmussen and Jakub Szefer
In Proceedings of the International Conference on Field−Programmable Logic and Applications. September, 2019.
Details about Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs | BibTeX data for Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs
-
[30]
Hardware−assisted Remote Runtime Attestation for Critical Embedded Systems
Munir Geden and Kasper Rasmussen
In 2019 17th International Conference on Privacy‚ Security and Trust (PST). Pages 1−10. August, 2019.
Details about Hardware−assisted Remote Runtime Attestation for Critical Embedded Systems | BibTeX data for Hardware−assisted Remote Runtime Attestation for Critical Embedded Systems | DOI (10.1109/PST47121.2019.8949036)
-
[31]
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR
Daniele Antonioli‚ Nils Ole Tippenhauer and Kasper Rasmussen
In USENIX Security Symposium. August, 2019.
Details about The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR | BibTeX data for The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR | Download (pdf) of The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR
-
[32]
Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google's "Nearby Connections" on Android
Daniele Antonioli‚ Nils Ole Tippenhauer and Kasper Rasmussen
In Network and Distributed System Security Symposium (NDSS). February, 2019.
Details about Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google's "Nearby Connections" on Android | BibTeX data for Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google's "Nearby Connections" on Android | Download (pdf) of Nearby Threats: Reversing‚ Analyzing‚ and Attacking Google's "Nearby Connections" on Android
-
[33]
Reading Between the Dies: Cross−SLR Covert Channels on Multi−Tenant Cloud FPGAs
Ilias Giechaskiel‚ Kasper Rasmussen and Jakub Szefer
In IEEE International Conference on Computer Design (ICCD). November, 2019.
Details about Reading Between the Dies: Cross−SLR Covert Channels on Multi−Tenant Cloud FPGAs | BibTeX data for Reading Between the Dies: Cross−SLR Covert Channels on Multi−Tenant Cloud FPGAs
-
[34]
28 Blinks Later: Tackling Practical Challenges of Eye
Simon Eberz‚ Giulio Lovisotto‚ Kasper Rasmussen‚ Vincent Lenders and Ivan Martinovic
In ACM Conference on Computer and Communications Security (CCS). November, 2019.
Details about 28 Blinks Later: Tackling Practical Challenges of Eye | BibTeX data for 28 Blinks Later: Tackling Practical Challenges of Eye
-
[35]
Leakier Wires: Exploiting FPGA Long Wires for Covert− and Side−Channel Attacks
Ilias Giechaskiel‚ Ken Eguro and Kasper Rasmussen
In Transactions on Reconfigurable Technology and Systems (TRETS). 2019.
Details about Leakier Wires: Exploiting FPGA Long Wires for Covert− and Side−Channel Attacks | BibTeX data for Leakier Wires: Exploiting FPGA Long Wires for Covert− and Side−Channel Attacks | Download (pdf) of Leakier Wires: Exploiting FPGA Long Wires for Covert− and Side−Channel Attacks
-
[36]
Security of Distance−Bounding: A Survey
Gildas Avoine‚ Muhammed Ali Bingöl‚ Ioana Boureanu‚ Srdjan Čapkun‚ Gerhard Hancke‚ Süleyman Kardaş‚ Chong Hee Kim‚ Cédric Lauradoux‚ Benjamin Martin‚ Jorge Munilla‚ Alberto Peinado‚ Kasper Rasmussen‚ Dave Singelée‚ Aslan Tchamkerten‚ Rolando Trujillo−Rasua and Serge Vaudenay
In ACM Computing Surveys. Vol. 51. No. 5. September, 2018.
Details about Security of Distance−Bounding: A Survey | BibTeX data for Security of Distance−Bounding: A Survey | Download (pdf) of Security of Distance−Bounding: A Survey
-
[37]
On the Relationship Between Weak and Strong Deniable Authenticated Encryption
Kasper Rasmussen and Paolo Gasti
In International Conference on Privacy‚ Security‚ and Trust (PST). August, 2018.
Details about On the Relationship Between Weak and Strong Deniable Authenticated Encryption | BibTeX data for On the Relationship Between Weak and Strong Deniable Authenticated Encryption | Download (pdf) of On the Relationship Between Weak and Strong Deniable Authenticated Encryption
-
[38]
Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires
Ilias Giechaskiel‚ Kasper Rasmussen and Ken Eguro
In ACM Asia Conference on Computer & Communications Security (AsiaCCS). July, 2018.
Details about Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires | BibTeX data for Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires | Download (pdf) of Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires
-
[39]
Bionyms: Driver−centric Message Authentication using Biometric Measurements
Marc Roeschlin‚ Christian Vaas‚ Kasper Rasmussen and Ivan Martinovic
December, 2018.
Details about Bionyms: Driver−centric Message Authentication using Biometric Measurements | BibTeX data for Bionyms: Driver−centric Message Authentication using Biometric Measurements | Download (pdf) of Bionyms: Driver−centric Message Authentication using Biometric Measurements
-
[40]
Analysis of Reflexive Eye Movements for Fast Replay−Resistant Biometric Authentication
Ivo Sluganovic‚ Marc Roeschlin‚ Kasper Rasmussen and Ivan Martinovic
In Transactions on Privacy and Security (TOPS). 2018.
Details about Analysis of Reflexive Eye Movements for Fast Replay−Resistant Biometric Authentication | BibTeX data for Analysis of Reflexive Eye Movements for Fast Replay−Resistant Biometric Authentication
-
[41]
Device Pairing at the Touch of an Electrode
Marc Roeschlin‚ Ivan Martinovic and Kasper Rasmussen
In Network and Distributed System Security Symposium (NDSS). 2018.
Details about Device Pairing at the Touch of an Electrode | BibTeX data for Device Pairing at the Touch of an Electrode | Download (pdf) of Device Pairing at the Touch of an Electrode
-
[42]
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics
Simon Eberz‚ Kasper Rasmussen‚ Vincent Lenders and Ivan Martinovic
In ACM Asia Conference on Computer and Communications Security (ASIACCS). April, 2017.
Details about Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics | BibTeX data for Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics
-
[43]
Authentication Using Pulse−Response Biometrics
Ivan Martinovic‚ Kasper B. Rasmussen‚ Marc Roeschlin and Gene Tsudik
In Communications of the ACM. March, 2017.
Details about Authentication Using Pulse−Response Biometrics | BibTeX data for Authentication Using Pulse−Response Biometrics
-
[44]
Pulse−Response: Exploring Human Body Impedance for Biometric Recognition
Kasper Rasmussen‚ Marc Roeschlin‚ Ivan Martinovic and Gene Tsudik
In ACM Transactions on Privacy and Security (TOPS). 2017.
Details about Pulse−Response: Exploring Human Body Impedance for Biometric Recognition | BibTeX data for Pulse−Response: Exploring Human Body Impedance for Biometric Recognition | Download (pdf) of Pulse−Response: Exploring Human Body Impedance for Biometric Recognition
-
[45]
When The "Crypto" in Cryptocurrencies Breaks: Bitcoin Security Under Broken Primitives
Ilias Giechaskiel‚ Cas Cremers and Kasper Rasmussen
In IEEE Security & Privacy. 2017.
Details about When The "Crypto" in Cryptocurrencies Breaks: Bitcoin Security Under Broken Primitives | BibTeX data for When The "Crypto" in Cryptocurrencies Breaks: Bitcoin Security Under Broken Primitives | Download (pdf) of When The "Crypto" in Cryptocurrencies Breaks: Bitcoin Security Under Broken Primitives
-
[46]
On Bitcoin Security in the Presence of Broken Cryptographic Primitives
Ilias Giechaskiel‚ Cas Cremers and Kasper B. Rasmussen
In European Symposium on Research in Computer Security (ESORICS). September, 2016.
Details about On Bitcoin Security in the Presence of Broken Cryptographic Primitives | BibTeX data for On Bitcoin Security in the Presence of Broken Cryptographic Primitives | Download (pdf) of On Bitcoin Security in the Presence of Broken Cryptographic Primitives
-
[47]
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics
Simon Eberz‚ Kasper B. Rasmussen‚ Vincent Lenders and Ivan Martinovic
In ACM Transactions on Privacy and Security. Vol. 19. No. 1. June, 2016.
Details about Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics | BibTeX data for Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics | Download (pdf) of Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics
-
[48]
Physical−Layer Integrity for Wireless Messages
Nils Ole Tippenhauer‚ Kasper Bonne Rasmussen and Srdjan Capkun
In Computer Networks. June, 2016.
Details about Physical−Layer Integrity for Wireless Messages | BibTeX data for Physical−Layer Integrity for Wireless Messages | Download (pdf) of Physical−Layer Integrity for Wireless Messages
-
[49]
Remote Attestation for Low−End Embedded Devices: the Prover's Perspective
Ferdinand Brasser‚ Kasper Rasmussen‚ Ahmad−Reza Sadeghi and Gene Tsudik
In Design Automation Conference (DAC). June, 2016.
Details about Remote Attestation for Low−End Embedded Devices: the Prover's Perspective | BibTeX data for Remote Attestation for Low−End Embedded Devices: the Prover's Perspective | Download (pdf) of Remote Attestation for Low−End Embedded Devices: the Prover's Perspective
-
[50]
I Am Alice‚ I Was in Wonderland: Secure Location Proof Generation and Verification Protocol
Chitra Javali‚ Girish Revadigar‚ Kasper B. Rasmussen‚ Wen Hu and Sanjay Jha
In IEEE Conference on Local Computer Networks (LCN). November, 2016.
Details about I Am Alice‚ I Was in Wonderland: Secure Location Proof Generation and Verification Protocol | BibTeX data for I Am Alice‚ I Was in Wonderland: Secure Location Proof Generation and Verification Protocol | Download (pdf) of I Am Alice‚ I Was in Wonderland: Secure Location Proof Generation and Verification Protocol
-
[51]
Generating Secret Keys from Biometric Body Impedance Measurement
Marc Roeschlin‚ Ivo Sluganovic‚ Ivan Martinovic and Kasper B. Rasmussen
In Workshop on Privacy in the Electronic Society‚ (WPES). October, 2016.
Details about Generating Secret Keys from Biometric Body Impedance Measurement | BibTeX data for Generating Secret Keys from Biometric Body Impedance Measurement | Download (pdf) of Generating Secret Keys from Biometric Body Impedance Measurement
-
[52]
Using Reflexive Eye Movements For Fast Challenge−Response Authentication
Ivo Sluganovic‚ Marc Roeschlin‚ Kasper B. Rasmussen and Ivan Martinovic
In ACM Conference on Computer and Communications Security (CCS). October, 2016.
Details about Using Reflexive Eye Movements For Fast Challenge−Response Authentication | BibTeX data for Using Reflexive Eye Movements For Fast Challenge−Response Authentication | Download (pdf) of Using Reflexive Eye Movements For Fast Challenge−Response Authentication
-
[53]
Mobility Independent Secret Key Generation for Wearable Health−care Devices
Girish Revadigar‚ Chitra Javali‚ Hassan Jameel Asghar‚ Kasper B. Rasmussen and Sanjay Jha
In International Conference on Body Area Networks (Bodynets). September, 2015.
Details about Mobility Independent Secret Key Generation for Wearable Health−care Devices | BibTeX data for Mobility Independent Secret Key Generation for Wearable Health−care Devices | Download (pdf) of Mobility Independent Secret Key Generation for Wearable Health−care Devices
-
[54]
iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel
Girish Revadigar‚ Chitra Javali‚ Hassan Jameel Asghar‚ Kasper B. Rasmussen and Sanjay Jha
In Proceedings of the 10th ACM Symposium on Information‚ Computer and Communications Security. April, 2015.
Details about iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel | BibTeX data for iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel | Download (pdf) of iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel
-
[55]
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
Simon Eberz‚ Kasper B. Rasmussen‚ Vincent Lenders and Ivan Martinovic
In The Network and Distributed System Security Symposium (NDSS). February, 2015.
Details about Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics | BibTeX data for Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics | Download (pdf) of Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics
-
[56]
Privacy−preserving User Matching
Paolo Gasti and Kasper B. Rasmussen
In ACM Workshop on Privacy in the Electronic Society (WPES15). October, 2015.
Details about Privacy−preserving User Matching | BibTeX data for Privacy−preserving User Matching | Download (pdf) of Privacy−preserving User Matching
-
[57]
Undetectable Communication: The Online Social Networks Case
Filipe Beato‚ Emiliano De Cristofaro and Kasper B. Rasmussen
In Privacy‚ Security and Trust (PST). July, 2014.
Details about Undetectable Communication: The Online Social Networks Case | BibTeX data for Undetectable Communication: The Online Social Networks Case | Download (pdf) of Undetectable Communication: The Online Social Networks Case
-
[58]
A Minimalist Approach to Remote Attestation
Aurelien Francillon‚ Quan Nguyen‚ Kasper Bonne Rasmussen and Gene Tsudik
In Design Automation and Test in Europe (DATE). March, 2014.
Details about A Minimalist Approach to Remote Attestation | BibTeX data for A Minimalist Approach to Remote Attestation | Download (pdf) of A Minimalist Approach to Remote Attestation
-
[59]
Authentication Using Pulse−Response Biometrics
Kasper Bonne Rasmussen‚ Marc Roeschlin‚ Ivan Martinovic and Gene Tsudik
In The Network and Distributed System Security Symposium (NDSS). February, 2014.
Details about Authentication Using Pulse−Response Biometrics | BibTeX data for Authentication Using Pulse−Response Biometrics | Download (pdf) of Authentication Using Pulse−Response Biometrics
-
[60]
On the Security of Password Manager Database Formats
Paolo Gasti and Kasper Bonne Rasmussen
In ESORICS. Pages 770−787. 2012.
Details about On the Security of Password Manager Database Formats | BibTeX data for On the Security of Password Manager Database Formats | Download (pdf) of On the Security of Password Manager Database Formats
-
[61]
Distance Hijacking Attacks on Distance Bounding Protocols
Cas Cremers‚ Kasper Bonne Rasmussen‚ Benedikt Schmidt and Srdjan Capkun
In IEEE Symposium on Security and Privacy. 2012.
Details about Distance Hijacking Attacks on Distance Bounding Protocols | BibTeX data for Distance Hijacking Attacks on Distance Bounding Protocols | Download (pdf) of Distance Hijacking Attacks on Distance Bounding Protocols
-
[62]
On the requirements for successful GPS spoofing attacks
Nils Ole Tippenhauer‚ Christina Pöpper‚ Kasper Bonne Rasmussen and Srdjan Capkun
In Proceedings of the 18th ACM conference on Computer and communications security. ACM. 2011.
Details about On the requirements for successful GPS spoofing attacks | BibTeX data for On the requirements for successful GPS spoofing attacks | Download (pdf) of On the requirements for successful GPS spoofing attacks
-
[63]
Optimal routing with failure−independent path protection
Thomas Stidsen‚ Bjørn Petersen‚ Simon Spoorendonk‚ Martin Zachariasen and Kasper Bonne Rasmussen
In Networks. Vol. 55(2). Pages 125−137. 2010.
Details about Optimal routing with failure−independent path protection | BibTeX data for Optimal routing with failure−independent path protection | Download (pdf) of Optimal routing with failure−independent path protection
-
[64]
Realization of RF Distance Bounding
K.B. Rasmussen and S. Čapkun
In USENIX Security 2010. 2010.
Details about Realization of RF Distance Bounding | BibTeX data for Realization of RF Distance Bounding | Download (pdf) of Realization of RF Distance Bounding
-
[65]
Attacks on public WLAN−based positioning systems
Nils Ole Tippenhauer‚ Kasper Bonne Rasmussen‚ Christina Pöpper and Srdjan Capkun
In MobiSys. Pages 29−40. 2009.
Details about Attacks on public WLAN−based positioning systems | BibTeX data for Attacks on public WLAN−based positioning systems | Download (pdf) of Attacks on public WLAN−based positioning systems
-
[66]
Proximity−based Access Control for Implantable Medical Devices
Kasper Bonne Rasmussen‚ Claude Castelluccia‚ Thomas S. Heydt−Benjamin and Srdjan Čapkun
In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. ACM. 2009.
Details about Proximity−based Access Control for Implantable Medical Devices | BibTeX data for Proximity−based Access Control for Implantable Medical Devices | Download (pdf) of Proximity−based Access Control for Implantable Medical Devices
-
[67]
Secure Location Verification with Hidden and Mobile Base Stations
Srdjan Čapkun‚ Kasper Rasmussen‚ Mario Čagalj and Mani Srivastava
In IEEE Transactions on Mobile Computing. Vol. 7. No. 4. 2008.
Details about Secure Location Verification with Hidden and Mobile Base Stations | BibTeX data for Secure Location Verification with Hidden and Mobile Base Stations | Download (pdf) of Secure Location Verification with Hidden and Mobile Base Stations
-
[68]
Location Privacy of Distance Bounding Protocols
Kasper Bonne Rasmussen and Srdjan Čapkun
In CCS '08: Proceedings of the 15th ACM conference on Computer and communications security. ACM. 2008.
Details about Location Privacy of Distance Bounding Protocols | BibTeX data for Location Privacy of Distance Bounding Protocols | Download (pdf) of Location Privacy of Distance Bounding Protocols
-
[69]
Optimal Routing with Single Backup Path Protection
Thomas Stidsen‚ Bjørn Petersen‚ Kasper Bonne Rasmussen‚ Simon Spoorendonk‚ Martin Zachariasen‚ Franz Rambach and Moritz Kiese
In International Network Optimization Conference (INOC). 2007.
Details about Optimal Routing with Single Backup Path Protection | BibTeX data for Optimal Routing with Single Backup Path Protection | Download (pdf) of Optimal Routing with Single Backup Path Protection
-
[70]
Implications of radio fingerprinting on the security of sensor networks
Kasper Bonne Rasmussen and Srdjan Capkun
In SecureComm. Pages 331−340. 2007.
Details about Implications of radio fingerprinting on the security of sensor networks | BibTeX data for Implications of radio fingerprinting on the security of sensor networks | Download (pdf) of Implications of radio fingerprinting on the security of sensor networks
-
[71]
SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks
Kasper Rasmussen‚ Srdjan Capkun and Mario Cagalj
In MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM Press. 2007.
Details about SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks | BibTeX data for SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks | Download (pdf) of SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks