Simon Birnbach : Publications
-
[1]
#PrettyFlyForAWiFi: real−world detection of privacy invasion attacks by drones
Simon Birnbach‚ Richard Baker‚ Simon Eberz and Ivan Martinovic
In ACM Transactions on Privacy and Security. 2021.
Details about #PrettyFlyForAWiFi: real−world detection of privacy invasion attacks by drones | BibTeX data for #PrettyFlyForAWiFi: real−world detection of privacy invasion attacks by drones | DOI (10.1145/3473672)
-
[2]
Dishing Out DoS: How to Disable and Secure the Starlink User Terminal
Joshua Smailes‚ Edd Salkield‚ Sebastian Köhler‚ Simon Birnbach and Ivan Martinovic
In arXiv preprint arXiv:2303.00582. March, 2023.
Details about Dishing Out DoS: How to Disable and Secure the Starlink User Terminal | BibTeX data for Dishing Out DoS: How to Disable and Secure the Starlink User Terminal | Download (pdf) of Dishing Out DoS: How to Disable and Secure the Starlink User Terminal | Link to Dishing Out DoS: How to Disable and Secure the Starlink User Terminal
-
[3]
Exposing Transmitters in Mobile Multi−Agent Games
Ben−Adar Bessos‚ Mai‚ Simon Birnbach‚ Amir Herzberg and Ivan Martinovic
In Proceedings of the 2nd ACM Workshop on Cyber−Physical Systems Security and Privacy (CPS−SPC). Pages 125–136. ACM. 2016.
Details about Exposing Transmitters in Mobile Multi−Agent Games | BibTeX data for Exposing Transmitters in Mobile Multi−Agent Games
-
[4]
Haunted house: physical smart home event verification in the presence of compromised sensors
Simon Birnbach‚ Simon Eberz and Ivan Martinovic
In ACM Transactions on Internet of Things. 2021.
Details about Haunted house: physical smart home event verification in the presence of compromised sensors | BibTeX data for Haunted house: physical smart home event verification in the presence of compromised sensors
-
[5]
Peeves: Physical Event Verification in Smart Homes
Simon Birnbach‚ Simon Eberz and Ivan Martinovic
In Proceedings of the 2019 ACM Conference on Computer and Communications Security (CCS). 2019.
Details about Peeves: Physical Event Verification in Smart Homes | BibTeX data for Peeves: Physical Event Verification in Smart Homes
-
[6]
RADAR: A TTP−Based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection
Yashovardhan Sharma‚ Simon Birnbach and Ivan Martinovic
In Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference. Pages 159–166. New York‚ NY‚ USA. 2023. Association for Computing Machinery.
Details about RADAR: A TTP−Based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection | BibTeX data for RADAR: A TTP−Based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection | DOI (10.1145/3590777.3590804) | Link to RADAR: A TTP−Based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection
-
[7]
RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection
Yashovardhan Sharma‚ Simon Birnbach and Ivan Martinovic
In Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference (EICC'23). Pages 159–166. Association for Computing Machinery (ACM). June, 2023.
Details about RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection | BibTeX data for RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection | DOI (https://doi.org/10.1145/3590777.3590804) | Link to RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection
-
[8]
SatIQ: Extensible and Stable Satellite Authentication using Hardware Fingerprinting
Joshua Smailes‚ Sebastian Köhler‚ Simon Birnbach‚ Martin Strohmeier and Ivan Martinovic
In Preprint. October, 2024.
Details about SatIQ: Extensible and Stable Satellite Authentication using Hardware Fingerprinting | BibTeX data for SatIQ: Extensible and Stable Satellite Authentication using Hardware Fingerprinting | Download (pdf) of SatIQ: Extensible and Stable Satellite Authentication using Hardware Fingerprinting
-
[9]
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
Edd Salkield‚ Marcell Szakály‚ Joshua Smailes‚ Simon Birnbach‚ Sebastian Köhler‚ Martin Strohmeier and Ivan Martinovic
In Proceedings of the 16th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). May, 2023.
Best Paper Award: Runner Up!
Details about Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | BibTeX data for Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | Download (pdf) of Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | Link to Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
-
[10]
Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks
Joshua Smailes‚ Edd Salkield‚ Sebastian Köhler‚ Simon Birnbach‚ Martin Strohmeier and Ivan Martinovic
In 2nd Workshop on Security of Space and Satellite Systems (SpaceSec). March, 2024.
Details about Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks | BibTeX data for Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks | Download (pdf) of Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks | DOI (10.14722/spacesec.2024.23054)
-
[11]
They see me rollin': inherent vulnerability of the rolling shutter in CMOS image sensors
Sebastian Köhler‚ Giulio Lovisotto‚ Simon Birnbach‚ Richard Baker and Ivan Martinovic
In Proc. Annual Computer Security Applications Conference (ACSAC 2021). ACM. 2021.
Details about They see me rollin': inherent vulnerability of the rolling shutter in CMOS image sensors | BibTeX data for They see me rollin': inherent vulnerability of the rolling shutter in CMOS image sensors | DOI (10.1145/3485832.3488016)
-
[12]
Towards a statistical network calculus—Dealing with uncertainty in arrivals
Michael A Beck‚ Sebastian A Henningsen‚ Simon B Birnbach and Jens B Schmitt
In IEEE INFOCOM 2014−IEEE Conference on Computer Communications. Pages 2382–2390. IEEE. 2014.
Details about Towards a statistical network calculus—Dealing with uncertainty in arrivals | BibTeX data for Towards a statistical network calculus—Dealing with uncertainty in arrivals
-
[13]
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
Joshua Smailes‚ Sebastian Köhler‚ Simon Birnbach‚ Martin Strohmeier and Ivan Martinovic
In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 23). November, 2023.
Details about Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | BibTeX data for Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | Download (pdf) of Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | DOI (10.1145/3576915.3623135) | Link to Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
-
[14]
Wi−Fly?: Detecting Privacy Invasion Attacks by Consumer Drones
Simon Birnbach‚ Richard Baker and Ivan Martinovic
In Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS). 2017.
Details about Wi−Fly?: Detecting Privacy Invasion Attacks by Consumer Drones | BibTeX data for Wi−Fly?: Detecting Privacy Invasion Attacks by Consumer Drones
-
[15]
To TTP or not to TTP?: Exploiting TTPs to Improve ML−based Malware Detection
Yashovardhan Sharma‚ Eleonora Giunchiglia‚ Simon Birnbach and Ivan Martinovic
In 2023 IEEE International Conference on Cyber Security and Resilience (CSR). Pages 8−15. 2023.
Details about To TTP or not to TTP?: Exploiting TTPs to Improve ML−based Malware Detection | BibTeX data for To TTP or not to TTP?: Exploiting TTPs to Improve ML−based Malware Detection | DOI (10.1109/CSR57506.2023.10225000)