Number of items: 85.
Conference or Workshop Item (A Paper)
Bytes, Andrei and Rajput, Prashant Hari Narayan and Doumanidis, Constantine and Tippenhauer, Nils Ole and Maniatakos, Michail and Zhou, Jianying
(2023)
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
Walita, Tim and Erba, Alessandro and Castellanos, John H. and Tippenhauer, Nils Ole
(2023)
Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
Schlüter, Till and Choudhari, Amit and Hetterich, Lorenz and Trampert, Leon and Nemati, Hamed and Ibrahim, Ahmad and Schwarz, Michael and Rossow, Christian and Tippenhauer, Nils Ole
(2023)
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Erba, Alessandro and Tippenhauer, Nils Ole
(2023)
White-box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems.
Ding, Aolin and Chan, Matthew and Hassanzadeh, Amin and Tippenhauer, Nils Ole and Ma, Shiqing and Zonouz, Saman
(2023)
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicle.
Erba, Alessandro and Tippenhauer, Nils Ole
(2022)
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
Erba, Alessandro and Müller, Anne and Tippenhauer, Nils Ole
(2022)
Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
Han, Yi and Chan, Matthew and Aref, Zahra and Tippenhauer, Nils Ole and Zonouz, Saman
(2022)
Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
Ibrahim, Ahmad and Nemati, Hamed and Schlüter, Till and Tippenhauer, Nils Ole and Rossow, Christian
(2022)
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper and Payer, Mathias
(2022)
Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy.
Tippenhauer, Nils Ole and Chen, Binbin and Mashima, Daisuke and Nicol, David M.
(2021)
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
Wu, Jianliang and Wu, Ruoyu and Antonioli, Daniele and Payer, Mathias and Tippenhauer, Nils Ole and Xu, Dongyan and Tian, Dave (Jing) and Bianchi, Antonio
(2021)
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Barbieri, Giovanni and Conti, Mauro and Tippenhauer, Nils Ole and Turrin, Federico
(2021)
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.
Alsoliman, Anas and Rigoni, Giulio and Levorato, Marco and Pinotti, Cristina and Tippenhauer, Nils Ole and Conti, Mauro
(2021)
COTS Drone Detection Using Video Streaming Characteristics.
Erba, Alessandro and Taormina, Riccardo and Galelli, Stefano and Pogliani, Marcello and Carminati, Michele and Zanero, Stefano and Tippenhauer, Nils Ole
(2020)
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Turrin, Federico and Erba, Alessandro and Tippenhauer, Nils Ole and Conti, Mauro
(2020)
A Statistical Analysis Framework for ICS Process Datasets.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020)
BIAS: Bluetooth Impersonation AttackS.
Ghaeini, Hamid Reza and Chan, Matthew and Bahmani, Raad and Brasser, Ferdinand and Garcia, Luis and Zhou, Jianying and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole and Zonouz, Saman
(2019)
PAtt: Physics-based Attestation of Control Systems.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne
(2019)
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
Ghaeini, Hamid Reza and Tippenhauer, Nils Ole and Zhou, Jianying
(2019)
Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
Breitenbacher, Dominik and Homoliak, Ivan and Aung, Yan Lin and Tippenhauer, Nils Ole and Elovici, Yuval
(2019)
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
Tambe, Amit and Aung, Yan Lin and Sridharan, Ragav and Ochoa, Martin and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval
(2019)
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
(In Press)
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2019)
Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android.
Giraldo, Jairo and Urbina, David and Cárdenas, Alvaro A. and Tippenhauer, Nils Ole
(2019)
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Hallgren, Per and Tippenhauer, Nils Ole and Ochoa, Martín
(2018)
Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies.
Siddiqi, Ahnaf and Tippenhauer, Nils Ole and Mashima, Daisuke and Chen, Binbin
(2018)
On Practical Threat Scenario Testing in an Electric Power ICS Testbed.
Sridharan, Ragav and Maiti, Rajib Ranjan and Tippenhauer, Nils Ole
(2018)
WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic.
Fakhreddine, Aymen and Tippenhauer, Nils Ole and Giustiniano, Domenico
(2018)
Design and Large-Scale Evaluation of WiFi Proximity Metrics.
Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole
(2018)
State-Aware Anomaly Detection for Industrial Control Systems.
Antonioli, Daniele and Ghaeini, Hamid Reza and Adepu, Sridhar and Ochoa, Martín and Tippenhauer, Nils Ole
(2017)
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
Antonioli, Daniele and Siby, Sandra and Tippenhauer, Nils Ole
(2017)
Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN.
Ranjan Maiti, Rajib and Siby, Sandra and Sridharan, Ragav and Tippenhauer, Nils Ole
(2017)
Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios.
Govil, Naman and Agrawal, Anand and Tippenhauer, Nils Ole
(2017)
On Ladder Logic Bombs in Industrial Control Systems.
Castellanos, John Henry and Antonioli, Daniele and Tippenhauer, Nils Ole and Ochoa, Martín
(2017)
Legacy-Compliant Data Authentication for Industrial Control System Traffic.
Siby, Sandra and Maiti, Rajib Ranjan and Tippenhauer, Nils Ole
(2017)
IoTScanner: Detecting Privacy Threats in IoT Neighborhoods.
Meidan, Yair and Bohadana, Michael and Shabtai, Asaf and Guarnizo, Juan-David and Ochoa, Martín and Tippenhauer, Nils Ole and Elovici, Yuval
(2017)
ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis (Poster).
Guarnizo, Juan and Tambe, Amit and Bunia, Suman Sankar and Ochoa, Martín and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval
(2017)
SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Rocchetto, Marco and Tippenhauer, Nils Ole
(2017)
Towards Formal Security Analysis of Industrial Control Systems.
Wilhelm, Erik and MacKenzie, Don and Zhou, Yuren and Cheah, Lynette and Tippenhauer, Nils Ole
(2017)
Evaluation of transport mode using wearable sensor data from 43,000 students.
Jansen, Kai and Tippenhauer, Nils Ole and Pöpper, Christina
(2016)
Multi-Receiver GPS Spoofing Detection: Error Models and Realization.
Urbina, David and Giraldo, Jairo and Cardenas, Alvaro A. and Tippenhauer, Nils Ole and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Candell, Richard and Sandberg, Henrik
(2016)
Limiting The Impact of Stealthy Attacks on Industrial Control Systems.
Rocchetto, Marco and Tippenhauer, Nils Ole
(2016)
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions.
Ghaeini, Hamid and Tippenhauer, Nils Ole
(2016)
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems.
Antonioli, Daniele and Agrawal, Anand and Tippenhauer, Nils Ole
(2016)
Towards High-Interaction Virtual ICS Honeypots-in-a-Box.
Rocchetto, Marco and Tippenhauer, Nils Ole
(2016)
On Attacker Models and Profiles for Cyber-Physical Systems.
Dong, Xinshu and Jauhar, Sumeet and Temple, William G. and Chen, Binbin and Kalbarczyk, Zbigniew and Sanders, William H. and Tippenhauer, Nils Ole and Nicol, David M.
(2016)
The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment.
Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi
(2016)
Assessing the effect of cyber-physical attacks on water distribution systems.
Mathur, Aditya and Tippenhauer, Nils Ole
(2016)
SWaT: A Water Treatment Testbed for Research and Training on ICS Security.
Tippenhauer, Nils Ole and Ochoa, Martín and Mathur, Aditya
(2016)
Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures.
Urbina, David and Giraldo, Jairo and Tippenhauer, Nils Ole and Cárdenas, Alvaro
(2016)
Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed.
Wilhelm, Erik and Tippenhauer, Nils Ole and Zhou, Yuren and Zhang, Nan
(2016)
SENSg: Large-Scale Deployment of Wearable Sensors for Trip and Transport Mode Logging.
Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi
(2016)
Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET.
Antonioli, Daniele and Tippenhauer, Nils Ole
(2015)
MiniCPS: A toolkit for security research on CPS Networks.
Tippenhauer, Nils Ole and Luecken, Heinrich and Kuhn, Marc and Capkun, Srdjan
(2015)
UWB Rapid-Bit-Exchange System for Distance Bounding.
Tippenhauer, Nils Ole and Temple, William G. and Vu, An Hoa and Chen, Binbin and Nicol, David M. and Kalbarczyk, Zbigniew and Sanders, William
(2014)
Automatic Generation of Security Argument Graphs.
Vu, An Hoa and Tippenhauer, Nils Ole and Chen, Binbin and Nicol, David M. and Kalbarczyk, Zbigniew
(2014)
CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems.
Temple, William G. and Chen, Binbin and Tippenhauer, Nils Ole
(2013)
Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack.
Tippenhauer, Nils Ole and Malisa, Luka and Ranganathan, Aanjhan and Capkun, Srdjan
(2013)
On Limitations of Friendly Jamming for Confidentiality.
Chen, Binbin and Kalbarczyk, Zbigniew and Nicol, David M. and Sanders, William H. and Tan, Rui and Temple, William G. and Tippenhauer, Nils Ole and Vu, An Hoa and Yau, David K.Y.
(2013)
Go with the Flow: Toward Workflow-Oriented Security Assessment.
Giustiniano, Domenico and Tippenhauer, Nils Ole and Mangold, Stefan
(2012)
Low-complexity Visible Light Networking with LED-to-LED communication.
Ranganathan, Aanjhan and Tippenhauer, Nils Ole and Skoric, Boris and Singelé, Dave and \vCapkun, Srdjan
(2012)
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Tippenhauer, Nils Ole and Giustiniano, Domenico and Mangold, Stefan
(2012)
Toys communicating with LEDs: Enabling toy cars interaction.
Tippenhauer, Nils Ole and Pöpper, Christina and Rasmussen, Kasper Bonne and \vCapkun, Srdjan
(2011)
On the Requirements for Successful GPS Spoofing Attacks.
Pöpper, Christina and Tippenhauer, Nils Ole and Danev, Boris and \vCapku, Srdjan
(2011)
Investigation of Signal and Message Manipulations on the Wireless Channel.
Kuhn, Marc and Luecken, Heinrich and Tippenhauer, Nils Ole
(2010)
UWB Impulse Radio Based Distance Bounding.
Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Pöpper, Christina and \vCapku, Srdjan
(2009)
Attacks on Public WLAN-based Positioning.
Tippenhauer, Nils Ole and \vCapku, Srdjan
(2009)
ID-based Secure Distance Bounding and Localization.
Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and \vCapkun, Srdjan
(2009)
Secure Ranging With Message Temporal Integrity.
Article
Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Tippenhauer, Nils Ole and Ochoa, Martín
(2022)
Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 25 (2).
Troncoso, Carmela and Payer, Matthias and Hubaux, Jean-Pierre and Salathé, Marcel and Larus, James and Lueks, Wouter and Stadler, Theresa and Pyrgelis, Apostolos and Antonioli, Daniele and Barman, Ludovic and Chatel, Sylvain and Paterson, Kenneth G. and Capkun, Srdjan and Basin, David and Beutel, Jan and Jackson, Dennis and Roeschlin, Marc and Leu, Patrick and Preneel, Bart and Smart, Nigel and Abidin, Aysajan and Gürses, Seda and Veale, Michael and Cremers, Cas and Backes, Michael and Tippenhauer, Nils Ole and Binns, Reuben and Cattuto, Ciro and Barrat, Alain and Fiore, Dario and Barbosa, Manuel and Oliveira, Rui and Pereira, José
(2020)
Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Engineering Bulletin Volume 43, Number 2, June 2020.
pp. 36-66.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020)
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy.
ACM Transactions on Privacy and Security.
ISSN 2471-2566
Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi and Eliades, Demetrios G. and Aghashahi, Mohsen and Sundararajan, Raanju and Pourahmadi, Mohsen and Banks, M. Katherine and Brentan, B. M. and Campbell, Enrique and Lima, G. and Manzi, D. and Ayala-Cabrera, D. and Herrera, M. and Montalvo, I. and Izquierdo, J. and Luvizotto Jr, E. and Chandy, Sarin E. and Rasekh, Amin and Barker, Zachary A. and Campbell, Bruce and Shafiee, M. Ehsan and Giacomoni, Marcio and Gatsis, Nikolaos and Taha, Ahmad and Abokifa, Ahmed A. and Haddad, Kelsey and Lo, Cynthia S. and Biswas, Pratim and Pasha M. Fayzul , Bijay and Somasundaram, Saravanakumar Lakshmanan and Housh, Mashor and Ohar, Ziv
(2018)
The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks.
Journal of Water Resources Planning and Management, 144 (8).
Giraldo, Jairo and Urbina, David and Cardenas, Alvaro and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Tippenhauer, Nils Ole and Sandberg, Henrik and Candell, Richard
(2018)
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems.
ACM Computing Surveys (CSUR), 1 (1).
Siboni, Shachar and Shabtai, Asaf and Tippenhauer, Nils Ole and Lee, Jemin and Elovici, Yuval
(2016)
Advanced Security Testbed Framework for Wearable IoT Devices.
Transactions on Internet Technology (TOIT), 16 (4).
pp. 1-25.
Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Capkun, Srdjan
(2016)
Physical-Layer Integrity for Wireless Messages.
Computer Networks, 109 (1).
pp. 31-38.
Wilhelm, Erik and Siby, Sandra and Zhou, Yuren and Ashok, Xavier J. S. and Jayasuriya, Melani and Foong, Shaohui and Kee, Jacksheeng and Wood, Kristin and Tippenhauer, Nils Ole
(2016)
Wearable Environmental Sensors and Infrastructure for Mobile Large-scale Urban Deployment.
Sensors, 16 (22).
pp. 8111-8123.
Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi
(2016)
Characterizing Cyber-Physical Attacks on Water Distribution Systems.
Journal of Water Resources Planning and Management, 143.
\vCapkun Srdjan and, Mario and Karame, Ghassan and Tippenhauer, Nils Ole
(2010)
Integrity Regions: Authentication Through Presence in Wireless Networks.
IEEE Transactions on Mobile Computing.
Thesis
Tippenhauer, Nils Ole
(2012)
Physical-Layer Security Aspects of Wireless Localization.
PhD thesis, ETH Zurich, Switzerland.
Tippenhauer, Nils Ole
(2007)
Design and Cryptoanalysis of Multi-Precision Arithmetics on Smart Cards with SmartMIPS Architecture.
Masters thesis, Hamburg University of Technology (TUHH).
Book Section
Tippenhauer, Nils Ole
(2019)
Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
In:
Security and Privacy Trends in the Industrial Internet of Things.
Springer, Cham, pp. 287-310.
ISBN 978-3-030-12330-7
Monograph
Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Pöpper, Christina and Capkun, Srdjan and Capkun, Srdjan and Capkun, Srdjan
(2009)
iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems.
Technical Report.
UNSPECIFIED.
Tippenhauer, Nils Ole and \vCapku, Srdjan
(2008)
UWB-based Secure Ranging and Localization.
Technical Report.
UNSPECIFIED.
Other
Siby, Sandra and Maiti, Rajib Ranjan and Tippenhauer, Nils Ole
(2017)
IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods.
Giustiniano, Domenico and Mangold, Stefan and Tippenhauer, Nils Ole
(2014)
Visible light communication with flickering prevention.
This list was generated on Thu Nov 21 07:57:01 2024 CET.