default search action
Srdjan Capkun
Person information
- affiliation: ETH Zurich
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c136]Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Capkun:
On (the Lack of) Code Confidentiality in Trusted Execution Environments. SP 2024: 4125-4142 - [c135]Daniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David A. Basin, Srdjan Capkun:
PURE: Payments with UWB RElay-protection. USENIX Security Symposium 2024 - [i78]Mark Kuhne, Supraja Sridhara, Andrin Bertschi, Nicolas Dutly, Srdjan Capkun, Shweta Shinde:
Aster: Fixing the Android TEE Ecosystem with Arm CCA. CoRR abs/2407.16694 (2024) - [i77]Andrin Bertschi, Supraja Sridhara, Friederike Groschupp, Mark Kuhne, Benedict Schlüter, Clément Thorens, Nicolas Dutly, Srdjan Capkun, Shweta Shinde:
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation. CoRR abs/2408.05835 (2024) - [i76]Carolin Beer, Sheila Zingg, Kari Kostiainen, Karl Wüst, Vedran Capkun, Srdjan Capkun:
PayOff: A Regulated Central Bank Digital Currency with Private Offline Payments. CoRR abs/2408.06956 (2024) - [i75]Daniele Lain, Tarek Jost, Sinisa Matetic, Kari Kostiainen, Srdjan Capkun:
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training. CoRR abs/2409.01378 (2024) - [i74]Moritz Schneider, Daniele Lain, Ivan Puddu, Nicolas Dutly, Srdjan Capkun:
Breaking Bad: How Compilers Break Constant-Time~Implementations. CoRR abs/2410.13489 (2024) - 2023
- [c134]Srdjan Capkun:
On Location Privacy and Security of Positioning in Modern Systems. IoTBDS 2023: 7 - [c133]Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, Srdjan Capkun:
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems. NDSS 2023 - [c132]Claudio Anliker, Giovanni Camurati, Srdjan Capkun:
Time for Change: How Clocks Break UWB Secure Ranging. USENIX Security Symposium 2023: 19-36 - [i73]Claudio Anliker, Giovanni Camurati, Srdjan Capkun:
Time for Change: How Clocks Break UWB Secure Ranging. CoRR abs/2305.09433 (2023) - 2022
- [j37]Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
Composite Enclaves: Towards Disaggregated Trusted Execution. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 630-656 (2022) - [c131]Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun:
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation. CCS 2022: 2947-2960 - [c130]Simon Erni, Martin Kotuliak, Patrick Leu, Marc Roeschlin, Srdjan Capkun:
AdaptOver: adaptive overshadowing attacks in cellular networks. MobiCom 2022: 743-755 - [c129]Mridula Singh, Marc Roeschlin, Aanjhan Ranganathan, Srdjan Capkun:
V-Range: Enabling Secure Ranging in 5G Wireless Networks. NDSS 2022 - [c128]Daniele Lain, Kari Kostiainen, Srdjan Capkun:
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. SP 2022: 842-859 - [c127]Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Capkun:
LTrack: Stealthy Tracking of Mobile Phones in LTE. USENIX Security Symposium 2022: 1291-1306 - [c126]Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. USENIX Security Symposium 2022: 1343-1359 - [c125]Srdjan Capkun:
Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies. WISEC 2022: 1 - [i72]Moritz Schneider, Ramya Jayaram Masti, Shweta Shinde, Srdjan Capkun, Ronald Perez:
SoK: Hardware-supported Trusted Execution Environments. CoRR abs/2205.12742 (2022) - [i71]Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, Renzo Andri:
Empowering Data Centers for Next Generation Trusted Computing. CoRR abs/2211.00306 (2022) - [i70]Friederike Groschupp, Mark Kuhne, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun:
It's TEEtime: Bringing User Sovereignty to Smartphones. CoRR abs/2211.05206 (2022) - [i69]Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Capkun:
On (the Lack of) Code Confidentiality in Trusted Execution Environments. CoRR abs/2212.07899 (2022) - 2021
- [c124]Patrick Leu, Martin Kotuliak, Marc Roeschlin, Srdjan Capkun:
Security of Multicarrier Time-of-Flight Ranging. ACSAC 2021: 887-899 - [c123]Srdjan Capkun, Ercan Ozturk, Gene Tsudik, Karl Wüst:
ROSEN: RObust and SElective Non-repudiation (for TLS). CCSW 2021: 97-109 - [c122]Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun:
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains. NDSS 2021 - [c121]Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun:
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. USENIX Security Symposium 2021: 663-680 - [c120]Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Capkun:
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols. USENIX Security Symposium 2021: 3811-3828 - [c119]Mridula Singh, Marc Roeschlin, Ezzat Zalzala, Patrick Leu, Srdjan Capkun:
Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement. WISEC 2021: 227-237 - [i68]Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun:
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones. CoRR abs/2102.02743 (2021) - [i67]Martin Kotuliak, Simon Erni, Patrick Leu, Marc Roeschlin, Srdjan Capkun:
LTrack: Stealthy Tracking of Mobile Phones in LTE. CoRR abs/2106.05007 (2021) - [i66]Simon Erni, Patrick Leu, Martin Kotuliak, Marc Röschlin, Srdjan Capkun:
AdaptOver : Adaptive Overshadowing of LTE signals. CoRR abs/2106.05039 (2021) - [i65]Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. CoRR abs/2111.05313 (2021) - [i64]Daniele Lain, Kari Kostiainen, Srdjan Capkun:
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. CoRR abs/2112.07498 (2021) - [i63]Karl Wüst, Kari Kostiainen, Srdjan Capkun:
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation. IACR Cryptol. ePrint Arch. 2021: 1443 (2021) - 2020
- [j36]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [j35]Kari Kostiainen, Aritra Dhar, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. IEEE Secur. Priv. 18(5): 38-46 (2020) - [c118]Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun:
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts. CCS 2020: 587-600 - [c117]Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
ProximiTEE: Hardened SGX Attestation by Proximity Verification. CODASPY 2020: 5-16 - [c116]Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
ProtectIOn: Root-of-Trust for IO in Compromised Platforms. NDSS 2020 - [c115]Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun:
Snappy: Fast On-chain Payments with Practical Collaterals. NDSS 2020 - [c114]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. SP 2020: 500-516 - [c113]Srdjan Capkun:
Digital Contact Tracing. USENIX Security Symposium 2020 - [e6]Srdjan Capkun, Franziska Roesner:
29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020. USENIX Association 2020, ISBN 978-1-939133-17-5 [contents] - [i62]Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun:
Snappy: Fast On-chain Payments with Practical Collaterals. CoRR abs/2001.01278 (2020) - [i61]Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun:
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. CoRR abs/2005.11516 (2020) - [i60]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i59]Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment. CoRR abs/2010.10416 (2020) - [i58]Anders P. K. Dalskov, Daniele Lain, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
2FE: Two-Factor Encryption for Cloud Storage. CoRR abs/2010.14417 (2020) - [i57]Ivo Sluganovic, Enis Ulqinaku, Aritra Dhar, Daniele Lain, Srdjan Capkun, Ivan Martinovic:
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients. CoRR abs/2011.13979 (2020) - [i56]Kari Kostiainen, Aritra Dhar, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. IACR Cryptol. ePrint Arch. 2020: 469 (2020) - [i55]Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, Srdjan Capkun:
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols. IACR Cryptol. ePrint Arch. 2020: 1298 (2020)
2010 – 2019
- 2019
- [j34]Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [j33]Moritz Schneider, Sinisa Matetic, Ari Juels, Andrew Miller, Srdjan Capkun:
Secure Brokered Delegation Through DelegaTEE. IEEE Secur. Priv. 17(4): 43-52 (2019) - [j32]Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun:
Securing Cloud Data Under Key Exposure. IEEE Trans. Cloud Comput. 7(3): 838-849 (2019) - [c112]Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi:
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization. ACSAC 2019: 788-800 - [c111]Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun:
PRCash: Fast, Private and Regulated Transactions for Digital Currencies. Financial Cryptography 2019: 158-178 - [c110]Karl Wüst, Sinisa Matetic, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun:
ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution. Financial Cryptography 2019: 179-198 - [c109]Mridula Singh, Patrick Leu, Srdjan Capkun:
UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks. NDSS 2019 - [c108]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
Deniable Upload and Download via Passive Participation. NSDI 2019: 649-666 - [c107]Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. USENIX Security Symposium 2019: 73-88 - [c106]Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun:
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. USENIX Security Symposium 2019: 783-800 - [c105]Daniel Moser, Vincent Lenders, Srdjan Capkun:
Digital radio signal cancellation attacks: an experimental evaluation. WiSec 2019: 23-33 - [c104]Enis Ulqinaku, Daniele Lain, Srdjan Capkun:
2FA-PP: 2nd factor phishing prevention. WiSec 2019: 60-70 - [i54]Ivan Puddu, Daniele Lain, Moritz Schneider, Elizaveta Tretiakova, Sinisa Matetic, Srdjan Capkun:
TEEvil: Identity Lease via Trusted Execution Environments. CoRR abs/1903.00449 (2019) - [i53]David M. Sommer, Moritz Schneider, Jannik Gut, Srdjan Capkun:
Cyber-Risks in Paper Voting. CoRR abs/1906.07532 (2019) - [i52]Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun:
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. CoRR abs/1911.10637 (2019) - [i51]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. CoRR abs/1911.11052 (2019) - [i50]Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. CoRR abs/1911.11078 (2019) - [i49]Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun:
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts. IACR Cryptol. ePrint Arch. 2019: 835 (2019) - [i48]Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun:
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 857 (2019) - [i47]Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
ProtectIOn: Root-of-Trust for IO in Compromised Platforms. IACR Cryptol. ePrint Arch. 2019: 869 (2019) - [i46]Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun:
UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. IACR Cryptol. ePrint Arch. 2019: 1349 (2019) - [i45]Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun:
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. IACR Cryptol. ePrint Arch. 2019: 1350 (2019) - 2018
- [j31]Ghassan Karame, Srdjan Capkun:
Blockchain Security and Privacy. IEEE Secur. Priv. 16(4): 11-12 (2018) - [j30]Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Toward Shared Ownership in the Cloud. IEEE Trans. Inf. Forensics Secur. 13(12): 3019-3034 (2018) - [c103]Srdjan Capkun:
Secure Positioning and Location-Based Security for IoT and Beyond. ASHES@CCS 2018: 81 - [c102]Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun:
TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing. NDSS 2018 - [c101]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. USENIX Security Symposium 2018: 1387-1403 - [c100]Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun:
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. WISEC 2018: 23-33 - [e5]Srdjan Capkun, Sherman S. M. Chow:
Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11261, Springer 2018, ISBN 978-3-030-02640-0 [contents] - [i44]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. IACR Cryptol. ePrint Arch. 2018: 160 (2018) - [i43]Karl Wüst, Kari Kostiainen, Vedran Capkun, Srdjan Capkun:
PRCash: Centrally-Issued Digital Currency with Privacy and Regulation. IACR Cryptol. ePrint Arch. 2018: 412 (2018) - [i42]Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun:
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. IACR Cryptol. ePrint Arch. 2018: 803 (2018) - [i41]Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification. IACR Cryptol. ePrint Arch. 2018: 902 (2018) - [i40]Sinisa Matetic, Karl Wüst, Moritz Schneider, Ian Miers, Kari Kostiainen, Srdjan Capkun:
ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution. IACR Cryptol. ePrint Arch. 2018: 1024 (2018) - 2017
- [j29]Aanjhan Ranganathan, Srdjan Capkun:
Are We Really Close? Verifying Proximity in Wireless Systems. IEEE Secur. Priv. 15(3): 52-58 (2017) - [c99]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. AsiaCCS 2017: 3 - [c98]Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. CHES 2017: 468-489 - [c97]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-Based Ranging. CHES 2017: 490-509 - [c96]Luka Malisa, Kari Kostiainen, Srdjan Capkun:
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. CODASPY 2017: 289-300 - [c95]Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun:
Quantifying Web Adblocker Privacy. ESORICS (2) 2017: 21-42 - [c94]Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. USENIX Security Symposium 2017: 1289-1306 - [c93]Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun:
Using hover to compromise the confidentiality of user input on Android. WISEC 2017: 12-22 - [c92]Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi:
Software Grand Exposure: SGX Cache Attacks Are Practical. WOOT 2017 - [i39]Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi:
Software Grand Exposure: SGX Cache Attacks Are Practical. CoRR abs/1702.07521 (2017) - [i38]Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Urs Müller, Ahmad-Reza Sadeghi:
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization. CoRR abs/1709.09917 (2017) - [i37]Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. IACR Cryptol. ePrint Arch. 2017: 48 (2017) - [i36]Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun:
μchain: How to Forget without Hard Forks. IACR Cryptol. ePrint Arch. 2017: 106 (2017) - [i35]David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. IACR Cryptol. ePrint Arch. 2017: 191 (2017) - [i34]Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Towards Shared Ownership in the Cloud. IACR Cryptol. ePrint Arch. 2017: 227 (2017) - [i33]Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun:
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation. IACR Cryptol. ePrint Arch. 2017: 578 (2017) - [i32]Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. IACR Cryptol. ePrint Arch. 2017: 584 (2017) - [i31]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-based Ranging. IACR Cryptol. ePrint Arch. 2017: 591 (2017) - [i30]Mridula Singh, Patrick Leu, Srdjan Capkun:
UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks. IACR Cryptol. ePrint Arch. 2017: 1240 (2017) - [i29]Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, Srdjan Capkun:
IntegriKey: End-to-End Integrity Protection of User Input. IACR Cryptol. ePrint Arch. 2017: 1245 (2017) - 2016
- [j28]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun:
Physical-layer integrity for wireless messages. Comput. Networks 109: 31-38 (2016) - [c91]Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun:
On the Security and Performance of Proof of Work Blockchains. CCS 2016: 3-16 - [c90]Hubert Ritzdorf, Ghassan Karame, Claudio Soriente, Srdjan Capkun:
On Information Leakage in Deduplicated Storage Systems. CCSW 2016: 61-72 - [c89]Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking. SPSM@CCS 2016: 83-92 - [c88]Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications. CHI 2016: 540-551 - [c87]Luka Malisa, Kari Kostiainen, Michael Och, Srdjan Capkun:
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction. ESORICS (1) 2016: 217-237 - [c86]Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Vincent Lenders, Srdjan Capkun:
Quantifying Location Privacy Leakage from Transaction Prices. ESORICS (2) 2016: 382-405 - [c85]Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun:
SPREE: a spoofing resistant GPS receiver. MobiCom 2016: 348-360 - [c84]Daniel Moser, Patrick Leu, Vincent Lenders, Aanjhan Ranganathan, Fabio Ricciato, Srdjan Capkun:
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures. MobiCom 2016: 375-386 - [c83]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
SALVE: server authentication with location verification. MobiCom 2016: 401-414 - [c82]Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, Srdjan Capkun:
Verena: End-to-End Integrity Protection for Web Applications. IEEE Symposium on Security and Privacy 2016: 895-913 - [p3]Davide Zanetti, Srdjan Capkun, Boris Danev:
Types and Origins of Fingerprints. Digital Fingerprinting 2016: 5-29 - [i28]Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun:
SPREE: Spoofing Resistant GPS Receiver. CoRR abs/1603.05462 (2016) - [i27]Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun:
Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals. CoRR abs/1604.04723 (2016) - [i26]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
SALVE: Server Authentication with Location VErification. CoRR abs/1608.04563 (2016) - [i25]