Publications

Main content

The provided PDFs are typically preprint versions. The final publications are available through the publisher online archives.

2017

  • Hildur Olafsdottir, Aanjhan Ranganathan, Srdjan Capkun
    On the Security of Carrier Phase-based Ranging
    in Proceedings of Cryptographic Hardware and Embedded Systems (CHES), 2017 (to appear)
    Arxiv e-print (arXiv:1610.06077) [PDF]
  • Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun
    Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks
    Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017 (To appear)
  • Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
    ROTE: Rollback Protection for Trusted Execution
    26th USENIX Security Symposium, August 2017 (To appear)
  • Aanjhan Ranganathan, Srdjan Capkun
    Are We Really Close? Verifying Proximity in Wireless Systems  
    in IEEE Security & Privacy Magazine, May-June 2017 edition [PDF (PDF, 523 KB)]
  • Ghassan Karame, Matthias Neugschwandtner, Melek Önen, Hubert Ritzdorf
    Reconciling Security and Functional Requirements in Multi-tenant Clouds     
    in Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing (SCC), 2017 [PDF (PDF, 239 KB) |Bibtex]
  • Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders and Ivan Martinovic
    Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
    in Financial Cryptography and Data Security (FC'17), 2017 [PDF (PDF, 2.1 MB)]
  • Luka Malisa, Kari Kostiainen, and Srdjan Capkun
    Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
    6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2017 [PDF (PDF, 3.2 MB) | tech. report (PDF, 3.6 MB)]
  • Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, and Srdjan Capkun
    Using Hover to Compromise the Confidentiality of User Input on Android
    Proc. ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017 (To appear)

 

2016

  • Hubert Ritzdorf, Ghassan O. Karame, Claudio Soriente, Srdjan Čapkun
    On Information Leakage in Deduplicated Storage Systems
    in 8th ACM Cloud Computing Secruity Workshop (CCSW), 2016 [PDF (PDF, 550 KB) | DOI | Bibtex (BIB, 437 Bytes)]
  • Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
    Quantifying Web Adblocker Privacy
    EPrint Archive 2016/900 [PDF]
  • Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun
    On the Security and Performance of Proof of Work Blockchains
    in ACM Conference on Computer and Communication Security (CCS), 2016 [PDF (PDF, 393 KB) | DOI]
  • Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
    Quantifying Location Privacy Leakage from Transaction Prices
    In Proceedings of the 21th European Symposium on Research in Computer Security (ESORICS), 2016 [PDF (PDF, 353 KB) | DOI]
  • Luka Malisa, Kari Kostiainen, Michael Och, and Srdjan Capkun
    Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
    21st European Symposium on Research in Computer Security (ESORICS), 2016 [PDF (PDF, 569 KB) | DOI | bibtex (BIB, 889 Bytes)]
  • Aanjhan Ranganathan, Hildur Olafsdottir and Srdjan Capkun
    SPREE: Spoofing Resistant GPS Receiver
    22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [PDF (PDF, 1.1 MB) | DOI]
  • Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente and Srdjan Capkun
    SALVE: Server Authentication with Location VErification
    22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [PDF | DOI]
  • Daniel Moser, Patrick Leu, Vincent Lenders, Aanjhan Ranganathan, Fabio Ricciato and Srdjan Capkun
    Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures
    22nd Annual International Conference on Mobile Computing and Networking (MobiCom), 2016 [PDF (PDF, 756 KB) | DOI]
  • Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa and Srdjan Capkun
    Verena: End-to-End Integrity Protection for Web Applications
    37th IEEE Symposium on Security and Privacy (S&P)2016 [PDF (PDF, 526 KB) | DOI | bibtex (BIB, 330 Bytes) | video]
  • Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun
    Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications
    SIGCHI Conference on Human Factors in Computing Systems (CHI), 2016 [PDF (PDF, 2.2 MB) | DOI | bibtex (BIB, 409 Bytes)]
  • Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun
    Physical-Layer Integrity for Wireless Messages
    Computer Networks (COMNET), 2016 [PDF (PDF, 464 KB) | DOI

2015

  • Julien Bringer, Beatriz Gallego, Ghassan Karame, Mathias Kohler, Panos Louridas, Melek Önen, Hubert Ritzdorf, Alessandro Sorniotti, David Vallejo
    TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud
    E-Democracy – Citizen Rights in the World of the New Computing Paradigms, 2015 [DOI | bibtex (BIB, 764 Bytes)]
  • Luka Malisa, Kari Kostiainen, Srdjan Capkun
    Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
    IACR Cryptology ePrint Archive, 2015 [URL]
  • Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
    W-SPS: Designing a Wide-Area Secure Positioning System
    IACR Cryptology ePrint Archive, 2015 [URL]
  • Claudio Marforio; Ramya Jayaram Masti; Claudio Soriente; Kari Kostiainen; Srdjan Capkun
    Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms
    CoRR 2015 [URL]
  • Wade Trappe,Lalitha Sankar Sankar, Radha Poovendran, Heejo Lee, Srdjan Capkun
    Introduction to the Issue on Signal and Information Processing for Privacy
    IEEE Journal of Selected Topics in Signal Processing, 2015 [DOI]
  • Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun
    Logical Partitions on Many-core Platforms
    31st Annual Computer Security Applications Conference (ACSAC), 2015 (to appear) [PDF (PDF, 272 KB)]
  • Aanjhan Ranganathan, Boris Danev and Srdjan Capkun
    Proximity Verification for Contactless Access Control and Authentication Systems
    31st Annual Computer Security Applications Conference (ACSAC), 2015 [PDF (PDF, 5.1 MB)]
  • Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun
    Tampering with the Delivery of Blocks and Transactions in Bitcoin
    ACM Conference on Computer and Communication Security (CCS), 2015 [Preprint]
  • Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun
    Quantifying Location Privacy Leakage from Transaction Prices
    Cryptology ePrint Archive: Report 2015/496 [Paper]
  • Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele and Srdjan Capkun
    Thermal Covert Channels on Multi-core Platforms
    24rd USENIX Security Symposium2015 
    arXiv:1503.07000, 2015 [PDF (PDF, 2.1 MB)]
  • Nikolaos Karapanos, Claudio Marforio, Claudio Soriente and Srdjan Capkun
    Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
    24th USENIX Security Symposium2015 [PDF (PDF, 1.7 MB) | bibtex (BIB, 517 Bytes) | video | demo video | project website]
    arXiv:1503.03790, 2015 [PDF]
  • Claudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun
    Commune: Shared Ownership in an Agnostic Cloud
    20th ACM Symposium on Access Control Models and Technologies, SACMAT 2015 [PDF (PDF, 458 KB) | bibtex (BIB, 691 Bytes)]
  • Justine Sherry, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy
    BlindBox: Deep Packet Inspection for Encrypted Traffic
    SIGCOMM 2015 [PDF | bibtex | DOI]
  • Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser
    Machine Learning Classification Over Encrypted Data
    NDSS 2015 [PDF | URL]
  • Nils Ole Tippenhauer, Heinrich Luecken, Marc Kuhn and Srdjan Capkun 
    UWB Rapid-Bit-Exchange System for Distance Bounding
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015 (to appear)
  • Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais,
    Srdjan Capkun
    Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
    in ACM Transactions on Information and System Security (TISSEC), 2015 [PDF (PDF, 703 KB)]

2014

  • N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, and Christian Wachsmann.
    Mobile Trusted Computing.
    Proceedings of the IEEE, 2014.
  • Arthur Gervais, Ghassan Karame, Damian Gruber, Srdjan Capkun
    On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients
    In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC), 2014 [Paper (PDF, 379 KB) | BibTeX (BIB, 330 Bytes) | Slides (PDF, 3.9 MB)]
  • Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Čapkun
    Assisted Deletion of Related Content
    In Proceedings of 30th Annual Computer Security Applications Conference (ACSAC), 2014 [Paper (PDF, 375 KB) | BibTeX (BIB, 507 Bytes) | Slides (PDF, 2.8 MB) | DOI]
  • Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun and Vincent Lenders
    Quantifying Web-Search Privacy
    in Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2014 [Paper (PDF, 466 KB) | BibTeX (BIB, 342 Bytes) | Slides (PDF, 8.6 MB)]
  • Naveed Ahmed, Christina Poepper and Srdjan Capkun
    Enabling Short Fragments for Uncoordinated Spread Spectrum Communication
    In Proceedings of 19th European Symposium on Research in Computer Security (ESORICS), 2014 [PDF (PDF, 637 KB)]
  • Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun and David Basin.
    Detection of GPS Spoofing Attacks in Power Grids (short paper)
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014 [PDF (PDF, 256 KB) | bibtex (BIB, 374 Bytes)]
  • Nikolaos Karapanos and Srdjan Capkun
    On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications
    In Proceedings of the 23rd USENIX Security Symposium, 2014 [PDF (PDF, 849 KB) | bibtex (BIB, 485 Bytes) | video]
  • Elli Androulaki, Claudio Soriente, Luka Malisa and Srdjan Capkun
    Enforcing Location and Time-based Access Control on Cloud-stored Data
    34th IEEE International Conference on Distributed Computing Systems (ICDCS), 2014 [PDF | bibtex]
  • Arthur Gervais, Ghassan O. Karame, Srdjan Capkun, Vedran Capkun
    Is Bitcoin a Decentralized Currency?
    IEEE Security and Privacy Magazine, 2014
    [Preliminary version PDF (PDF, 154 KB) | BibTeX (BIB, 232 Bytes)]
  • Joel Reardon, David Basin, Srdjan Capkun
    On Secure Data Deletion
    IEEE Security and Privacy Magazine, 2014
  • Ghassan O. Karame, Aurélien Francillon, Victor Budilivschi, Srdjan Capkun, Vedran Capkun
    Microcomputations as Micropayments in Web-based Services
    In ACM Transactions on Internet Technology (TOIT), 2014 (to appear)
  • Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun
    Smartphones as Practical and Secure Location Verification Tokens for Payments
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014 [PDF (PDF, 865 KB) | bibtex (BIB, 455 Bytes)]
  • Jan-Erik Ekberg, Kari Kostiainen and N. Asokan.
    The Untapped Potential of Trusted Execution Environments on Mobile Devices
    IEEE Security & Privacy Magazine , 2014.
    [Preliminary version PDF (PDF, 628 KB)]

2013

  • N. Asokan, Lucas Davi, Alexandra Dmitrienko, Kari Kostiainen, Elena Reshetova and Ahmad-Reza Sadeghi.
    Mobile Platform Security
    Synthesis Lectures on Information Security, Privacy and Trust (Morgan & Claypool), 2013. [Link]
  • Ramya Jayaram Masti, Claudio Marforio and Srdjan Capkun
    An Architecture for Concurrent Execution of Secure Environments in Clouds
    In Proceedings of the 2013 ACM Cloud Computing Security Workshop (CCSW), 2013, [PDF (PDF, 325 KB) | bibtex (BIB, 2 KB)]
  • Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, and Srdjan Capkun
    Secure Enrollment and Practical Migration for Mobile Trusted Execution Environments
    In Proceedings of the third ACM workshop on Security and privacy in smartphones and mobile devices (SPSM), 2013 [PDF (PDF, 230 KB) | bibtex (BIB, 464 Bytes)]
  • Joel Reardon, Hubert Ritzdorf, David Basin and Srdjan Capkun
    Secure Data Deletion from Persistent Media
    in Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2013 [PDF (PDF, 246 KB) | bibtex (BIB, 485 Bytes) | slides (PDF, 276 KB)]
  • Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun
    On Limitations of Friendly Jamming for Confidentiality
    in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2013 [PDF (PDF, 1.4 MB)]
  • Joel Reardon, Srdjan Capkun, David Basin
    SoK: Secure Data Deletion
    in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2013 [PDF (PDF, 163 KB) | slides (PDF, 222 KB)]
  • Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer and Srdjan Capkun
    Evaluating User Privacy in Bitcoin
    In Proceedings of the International Conference on Financial Cryptography and Data Security (FC), 2013 [bibtex (RTF, 767 Bytes)]
  • Davide Zanetti, Ari Juels, Srdjan Capkun
    Tailing RFID Tags for Clone Detection
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013 [PDF (PDF, 504 KB) | bibtex (BIB, 246 Bytes)]
  • Iulia Ion, Filipe Beato, Srdjan Capkun, Bart Preneel, and Marc Langheinrich
    For Some Eyes Only: Protecting Online Information Sharing
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2013 [bibtex (RTF, 1019 Bytes)]
  • Ghassan Karame, Boris Danev, Cyrill Bannwart, Srdjan Capkun
    On the Security of End-to-End Measurements based on Packet-Pair Dispersions
    In IEEE Transactions on Information Forensics & Security (TIFS), 2013 [bibtex (RTF, 734 Bytes)]

2012

  • Boris Danev, Davide Zanetti, Srdjan Capkun
    On Physical-layer Identification of Wireless Devices
    In ACM Computing Surveys, 2012 [PDF (PDF, 378 KB) | bibtex (BIB, 281 Bytes)]
  • David Basin, Srdjan Capkun
    Column: The Research Value of Publishing Attacks
    Communications of the ACM, November 2012, Vol. 55 No. 11, Pages 22-24
  • Elli Androulaki, Ghassan O. Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun
    Evaluating User Privacy in Bitcoin
    Technical report: Cryptology ePrint Archive Report 2012/596, 2012 [PDF (PDF, 940 KB)]
  • Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, and Srdjan Capkun
    Analysis of the Communication between Colluding Applications on Modern Smartphones
    In Proceedings of 28th Annual Computer Security Applications Conference (ACSAC), 2012 [PDF (PDF, 286 KB) | bibtex (BIB, 451 Bytes)]
  • Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, and Srdjan Capkun
    Enabling Trusted Scheduling in Embedded Systems
    In Proceedings of 28th Annual Computer Security Applications Conference (ACSAC), 2012 [PDF (PDF, 404 KB)]
  • Ghassan O. Karame, Elli Androulaki, Srdjan Capkun
    Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2012
    Related technical report: Cryptology ePrint Archive Report 2012/248, 2012 [PDF (PDF, 529 KB)]
  • Davide Zanetti, Vincent Lenders and Srdjan Capkun
    Exploring the Physical-layer Identification of GSM Devices
    Technical Report 763, ETH Zurich, Institute of Information Security, June 2012 [PDF (PDF, 837 KB) | bibtex (BIB, 339 Bytes)]
  • Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelee and Srdjan Capkun
    Design and Implementation of a Terrorist-Fraud Resilient Distance Bounding System
    In Proceedings of 17th European Symposium on Research in Computer Security (ESORICS), 2012 [PDF (PDF, 2.4 MB)]
  • Joel Reardon, Srdjan Capkun, David Basin
    Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
    In Proceedings of the 21st USENIX Security Symposium, 2012 [PDF (PDF, 404 KB) | slides (PDF, 7.5 MB) | video]
  • Joel Reardon, Claudio Marforio, Srdjan Capkun, David Basin
    Secure Deletion on Log-structured File Systems
    In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012 [PDF (PDF, 629 KB) | slides (PDF, 1.2 MB)]
  • Related Schweizer Fernsehen: Einstein show 9.6.2011
    On-line Report and Secure Deletion Application Download: SHREDroid: Secure Deletion for Android
  • Aanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun
    Physical-Layer Attacks on Chirp-based Ranging Systems
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2012 [PDF (PDF, 1.3 MB)]
  • Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun
    Distance Hijacking Attacks on Distance Bounding Protocols
    in Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2012
  • Boris Danev, Srdjan Capkun, Ramya Jayaram Masti, Thomas S. Benjamin
    Towards Practical Identification of HF RFID Devices
    in ACM Transactions on Information and System Security (TISSEC)
  • Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun
    Distance Hijacking Attacks on Distance Bounding Protocols (invited paper)
    Abstract to appear In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012
    Related technical report: Cryptology ePrint Archive: Report 2011/129, 2011 [PDF (PDF, 638 KB)]

2011

  • Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun
    Enabling Secure VM-vTPM Migration in Private Clouds
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2011 [PDF (PDF, 430 KB) | bibtex (BIB, 298 Bytes)]
  • Ghassan Karame, Srdjan Capkun, Ueli Maurer
    Privacy-Preserving Outsourcing of Brute-Force Key Searches
    In Proceedings of the ACM Cloud Computing Security Workshop (CCSW); in conjunction with ACM CCS, 2011 [PDF (PDF, 474 KB) | bibtex (BIB, 300 Bytes)]
  • Claude Castelluccia, Emiliano De Cristofaro, Aurélien Francillon, Mohamed Ali Kaafar
    EphPub: Toward Robust Ephemeral Publishing
    In Proceedings of the IEEE International Conference on Network Protocols (ICNP), 2011 [software]
  • Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
    On the Requirements for Successful GPS Spoofing Attacks
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011 [PDF (PDF, 1.2 MB) | bibtex (BIB, 328 Bytes)]
  • Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, Srdjan Capkun
    Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage
    In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), 2011
  • Joel Reardon, Claudio Marforio, Srdjan Capkun, David Basin
    Secure Deletion on Log-structured File Systems
    arXiv Technical Report arXiv:1106.0917 [PDF (PDF, 580 KB)]
    Related Schweizer Fernsehen: Einstein show 9.6.2011
    On-line Report and Secure Deletion Application Download: SHREDroid: Secure Deletion for Android
  • Claudio Marforio, Aurélien Francillon, Srdjan Capkun
    Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems
    Technical Report 724, ETH Zürich, System Security Group, April 2011. [PDF (PDF, 446 KB) | bibtex (BIB, 338 Bytes)]
  • Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
    Investigation of Signal and Message Manipulations on the Wireless Channel
    In Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2011 [PDF (PDF, 454 KB) | bibtex (BIB, 326 Bytes)]
  • Patrick Schaller, Benedikt Schmidt, David Basin, Srdjan Capkun
    Formal Reasoning about Physical Properties of Security Protocols
    in ACM Transactions on Information and System Security (TISSEC), 2011
  • Davide Zanetti, Pascal Sachs, Srdjan Capkun
    On The Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?
    In Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), 2011 [PDF (PDF, 455 KB) | bibtex (BIB, 270 Bytes)]
  • Srdjan Capkun, Karim El Defrawy, Gene Tsudik
    Group Distance Bounding Protocols (short paper)
    In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST), 2011
    Related technical report: [PDF (PDF, 1.1 MB)]
  • Ghassan Karame, Aurelien Francillon, Srdjan Capkun
    Pay as you Browse: Microcomputations as Micropayments in Web-based Services
    In Proceedings of the International World Wide Web Conference (WWW), 2011 [PDF (PDF, 1.3 MB) | bibtex (BIB, 297 Bytes)].
  • Aurelien Francillon, Boris Danev, Srdjan Capkun
    Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2011
    Preceding technical report: Cryptology ePrint Archive: Report 2010/332, 2010 [PDF (PDF, 1 MB) | bibtex (BIB, 296 Bytes)]

2010

  • Daniel Bodmer, Srdjan Capkun
    On the Security and Privacy in Cochlear Implants
    ETH Zurich, D-INFK, Technical Report No. 677, 2010 [PDF (PDF, 57 KB) | bibtex (BIB, 287 Bytes)]
  • Christina Pöpper, David Basin, Srdjan Capkun, Cas Cremers
    Keeping Data Secret under Full Compromise using Porter Devices
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2010 [PDF (PDF, 307 KB) | bibtex (BIB, 526 Bytes)]
  • Ghassan Karame, Srdjan Capkun and Ueli Maurer
    Privacy-Preserving Outsourcing of Brute-Force Key Searches
    ETH Zurich, D-INFK, Technical Report No. 662, 2010.
  • Davide Zanetti, Boris Danev, Srdjan Capkun
    Physical-layer Identification of UHF RFID Tags
    In Proceedings of the ACM MobiCom (Annual International Conference on Mobile Computing and Networking), 2010 (to appear) [PDF (PDF, 665 KB) | bibtex (BIB, 362 Bytes) | poster* (PDF, 788 KB)]
    * Poster presented at the USENIX Security Symposium, 2010.
  • Ghassan Karame, Srdjan Capkun
    Low-Cost Client Puzzles based on Modular Exponentiation
    In Proceedings of ESORICS (European Symposium on Research in Computer Security), 2010 [PDF (PDF, 261 KB) | bibtex (BIB, 270 Bytes)]
  • Kasper Bonne Rasmussen, Srdjan Capkun
    Realization of RF Distance Bounding
    In Proceedings of the USENIX Security Symposium, 2010 [PDF (PDF, 946 KB) | bibtex (BIB, 228 Bytes)]
  • Iulia Ion, Marc Langheinrich, Ponnurangam Kumaraguru, Srdjan Capkun
    Influence of User Perception, Security Needs, and Social Factors on Device Pairing Method Choices
    In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), 2010 [PDF (PDF, 1.5 MB) | bibtex (BIB, 346 Bytes)]
  • Srdjan Capkun, Mario Cagalj, Ghassan Karame, Nils Ole Tippenhauer
    Integrity Regions: Authentication Through Presence in Wireless Networks
    IEEE Transactions on Mobile Computing (TMC), 2010 [bibtex (BIB, 314 Bytes)]
  • Marc Kuhn, Heinrich Luecken, Nils Ole Tippenhauer,
    UWB Impulse Radio Based Distance Bounding
    In Proceedings of WPNC (Workshop on Positioning, Navigation and Communication), 2010 [PDF (PDF, 5 KB) | bibtex (BIB, 5 KB)]
  • Mario Strasser, Boris Danev, Srdjan Capkun
    Detection of Reactive Jamming in Sensor Networks
    In ACM Transactions on Sensor Networks (TOSN), 2010 [PDF (PDF, 726 KB) | bibtex (BIB, 390 Bytes)]
  • Davide Zanetti, Leo Fellmann, Srdjan Capkun
    Privacy-preserving Clone Detection for RFID-enabled Supply Chains
    IEEE International Conference on RFID, 2010 [PDF (PDF, 250 KB) | bibtex (BIB, 290 Bytes)]
  • Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim El Defrawy
    Attacks on Physical-layer Identification
    In Proceedings of ACM Conference on Wireless Network Security (WiSec), 2010 [PDF (PDF, 225 KB) | bibtex (BIB, 367 Bytes)]
  • Christina Pöpper, Mario Strasser, Srdjan Capkun
    Anti-jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques
    IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Mission Critical Networking, 2010 [PDF (PDF, 418 KB) | bibtex (BIB, 363 Bytes)]

2009

  • Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun
    Secure Ranging With Message Temporal Integrity
    Cryptology ePrint Archive: Report 2009/602, 2009 [PDF (PDF, 526 KB) | bibtex (BIB, 255 Bytes)]
  • Ghassan Karame, Mario Strasser, Srdjan Capkun
    Secure Remote Execution of Sequential Computations
    In Proceedings of ICICS (International Conference on Information and Communications Security), 2009 . [PDF (PDF, 238 KB) | bibtex (BIB, 363 Bytes)]
  • Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun
    Proximity-based Access Control for Implantable Medical Devices
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2009 [PDF (PDF, 470 KB) | bibtex (BIB, 399 Bytes)]
    Related media reports: MIT Technology Review: Proximity-based Access Control for Implantable Medical Devices
  • Ghassan Karame, David Gubler and Srdjan Capkun
    On the Security of Bottleneck Bandwidth Estimation Techniques
    In Proceedings of SecureComm (International Conference on Security and Privacy in Communication Networks), 2009. [PDF (PDF, 916 KB) | bibtex (BIB, 384 Bytes)]
  • Ghassan Karame and Srdjan Capkun
    Towards Secure End-to-End Network Measurements
    ETH Zurich, D-INFK, Technical Report No. 628, June 2009. [PDF (PDF, 137 KB) | bibtex (BIB, 298 Bytes)]
  • Nils Ole Tippenhauer, Srdjan Capkun
    ID-based Secure Distance Bounding and Localization
    In Proceedings of ESORICS (European Symposium on Research in Computer Security), 2009 [PDF (PDF, 559 KB) | bibtex (BIB, 5 KB)]
  • David Basin, Srdjan Capkun, Patrick Schaller and Benedikt Schmidt
    Let's get physical: models and methods for real-world security protocols
    In Proceedings of the 22nd TPHols (International Conference on Theorem Proving in Higher Order Logics), 2009 (invited paper) [PDF (PDF, 332 KB) | bibtex (BIB, 352 Bytes)]
  • Ghassan Karame, Mario Cagalj, Srdjan Capkun
    Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads
    In Proceedings of the IEEE NCA (International Symposium on Network Computing and Applications), 2009. [PDF (PDF, 193 KB) | bibtex (BIB, 378 Bytes)]
  • Christina Pöpper, Mario Strasser, Srdjan Capkun
    Jamming-resistant Broadcast Communication without Shared Keys
    In Proceedings of the USENIX Security Symposium, 2009 [PDF (PDF, 625 KB) | bibtex (BIB, 271 Bytes)]
  • Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun
    Physical-layer Identification of RFID Devices
    In Proceedings of the USENIX Security Symposium, 2009 [PDF (PDF, 913 KB) | bibtex (BIB, 362 Bytes)]
  • Patrick Schaller, Benedikt Schmidt, David Basin, Srdjan Capkun
    Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
    In Proceedings of the IEEE Computer Security Foundations Symposium (CSF), 2009 [PDF (PDF, 277 KB) | bibtex (BIB, 356 Bytes)]
  • Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun
    Attacks on Public WLAN-based Positioning Systems
    In Proceedings of the ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009 [PDF (PDF, 1.7 MB) | bibtex (BIB, 348 Bytes) | talk video (FLV, 128 MB)]
    Technical report and Related media reports: Location Spoofing Attacks on the iPhone and iPod
  • Mario Strasser, Christina Pöpper, Srdjan Capkun
    Efficient Uncoordinated FHSS Anti-jamming Communication
    In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2009 [PDF (PDF, 368 KB) | bibtex (BIB, 328 Bytes)]
  • Boris Danev, Srdjan Capkun
    Transient-based Identification of Wireless Sensor Nodes
    In Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2009 [PDF (PDF, 446 KB) | bibtex (BIB, 363 Bytes)]

2008

  • Kasper Bonne Rasmussen, Srdjan Capkun
    Location Privacy of Distance Bounding Protocols
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2008. [PDF (PDF, 309 KB)]
  • Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava
    Secure Time Synchronization in Sensor Networks
    in ACM Transactions on Information and System Security (TISSEC), July 2008 [PDF (PDF, 479 KB)(BIB, 306 Bytes) (BIB, 306 Bytes)]
  • Shouhuai Xu, Srdjan Capkun
    Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
    in ACM Transactions on Information and System Security (TISSEC), 2008. [PDF (PDF, 391 KB) | bibtex (BIB, 306 Bytes)]
  • Zanetti Davide, Srdjan Capkun
    Protecting Sensitive Business Information While Sharing Serial-Level Data,
    International Workshop on Security and Privacy in Enterprise Computing (InSPEC), IEEE EDOC, 2008.
  • Nils Ole Tippenhauer, Srdjan Capkun
    UWB-based Secure Ranging and Localization
    Technical Report 586, ETH Zürich, System Security Group, January 2008. [PDF (PDF, 248 KB) | bibtex (BIB, 234 Bytes)]
  • Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj
    Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
    in Proceedings of IEEE Symposium on Security and Privacy (S&P), 2008 [PDF (PDF, 353 KB)]
  • Srdjan Capkun, Mario Cagalj, Ramkumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani Srivastava
    Integrity Codes: Message Integrity Protection and Authentication Over Insecure Channels
    in IEEE Transactions on Dependable and Secure Computing (TDSC), 2008 [PDF (PDF, 265 KB)]
  • Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, Srdjan Capkun, Jean-Pierre Hubaux
    Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking
    in IEEE Communications Magazine, February 2008 [PDF (PDF, 279 KB)]
  • Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj and Mani Srivastava
    Secure Location Verification With Hidden and Mobile Base Stations
    in IEEE Transactions on Mobile Computing (TMC), April 2008 [PDF (PDF, 1.9 MB)]

2007

  • Kasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj
    SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks (extended abstract),
    in Proceedings of ACM MobiCom 2007 [PDF (PDF, 664 KB)]
    (related Technical Report 546, ETH Zürich, IFW, February 7, 2007. [PDF (PDF, 1.2 MB)]
  • Kasper Bonne Rasmussen, Srdjan Capkun
    Implications of Radio Fingerprinting on the Security of Sensor Networks,
    in Proceedings of IEEE SecureComm, 2007 [PDF (PDF, 262 KB)]
  • Patrick Schaller, Srdjan Capkun, David Basin
    BAP: Broadcast Authentication Using Cryptographic Puzzles
    in Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS) [PDF (PDF, 288 KB)]
  • Mario Cagalj, Srdjan Capkun and Jean-Pierre Hubaux
    Wormhole-Based Antijamming Techniques in Sensor Networks
    ,
    in IEEE Transactions on Mobile Computing (TMC), January 2007. [PDF (PDF, 1.7 MB)]
  • Security and Privacy in Ad-hoc and Sensor Networks
    4th European Workshop, ESAS 2007
    , Cambridge, UK, July 2-3, 2007, Proceedings
    Series: Lecture Notes in Computer Science , Vol. 4572
    Stajano, F.; Meadows, C.; Capkun, S.; Moore, T. (Eds.)
    2007, X, 247 p., Softcover
    ISBN: 978-3-540-73274-7
  • Book chapters in Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks,
    Poovendran, Wang, Roy (ed.), Advances in Information Security series, Vol. 30, Springer, 2007, ISBN 978-0-387-32721-1 [book contents (PDF, 40 KB)]

2006

  • Srdjan Capkun, Saurabh Ganeriwal, Farooq Anjum and Mani Srivastava,
    Secure RSS-based Localization in Sensor Networks,
    Technical Reports 529, ETH Zürich, 09 2006. [PDF (PDF, 151 KB)]
  • Srdjan Capkun and Mario Cagalj
    Integrity Regions: Authentication Through Presence in Wireless Networks
    ACM Workshop on Wireless Security (WiSe) 2006 [PDF (PDF, 174 KB)]

pre-ETH Zürich

2006

  • Mario Cagalj, Srdjan Capkun, RamKumar Rengaswamy, Ilias Tsigkogiannis, Mani Srivastava and Jean-Pierre Hubaux,
    Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels,
    in Proceeding of the IEEE Symposium on Security and Privacy (S&P), 2006. [PDF (PDF, 260 KB)]
  • S.Capkun, M. Cagalj, M. Srivastava,
    Securing Localization With Hidden and Mobile Base Stations,
    in Proceedings of IEEE INFOCOM 2006 [PDF (PDF, 249 KB)]
  • S. Capkun, J. P. Hubaux, L. Buttyan, 
    Mobility Helps Peer-to-Peer Security
    IEEE Transactions on Mobile Computing (TMC), January 2006 [PDF (PDF, 300 KB)]
  • M. Cagalj, S. Capkun, J. P. Hubaux,
    Key agreement in peer-to-peer wireless networks
    Proceedings of the IEEE (Special Issue on Cryptography and Security), 2006. [PDF (PDF, 456 KB)]
  • S. Capkun,  J. P. Hubaux,
    Secure positioning in wireless networks
    IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Security in Wireless Ad Hoc Networks, February 2006. [PDF (PDF, 639 KB)]

2005

  • S.Sedihpour, S.Capkun, S.Ganeriwal and M.Srivastava,
    Implementation of Attacks on Ultrasonic Ranging Systems, demo
    ,
    ACM SENSYS 2005. Demo description [PDF (PDF, 61 KB)], Poster [PDF (PDF, 89 KB)]
  • S. Ganeriwal, S. Capkun, S. Han, M. Srivastava,
    Secure Time Synchronization Service for Sensor Networks,
    in Proceedings of Wireless Security Workshop (WISE) 2005. [PDF (PDF, 271 KB)]
  • S.Capkun, J.P. Hubaux,
    Secure positioning of wireless devices with application to sensor networks,
    in Proceedings of IEEE INFOCOM 2005 [PDF (PDF, 541 KB)]
    (first appeared as "Secure Positioning in Sensor Networks", Technical report, EPFL/IC/200444, May 2004)
  • L. Lazos, R. Poovendran, S. Capkun
    ROPE: Robust Position Estimation in Wireless Sensor Networks
    ,
    in Proceedings of IPSN 2005 [PDF (PDF, 954 KB)]

2004

  • M. Felegyhazi, S. Capkun, J. P. Hubaux,
    SOWER: Self-Organizing Wireless Network for Messaging
    ,
    In Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) 2004. [PDF (PDF, 406 KB)]
  • J. P. Hubaux, S. Capkun, J.Luo,
    The Security and Privacy of Smart Vehicles,
    IEEE Security & Privacy (May-June 2004). [PDF (PDF, 569 KB)]
  • L. Buttyán, J. P. Hubaux and S. Capkun,
    A Formal Analysis of Syverson`s Rational Exchange Protocol,
    Journal of Computer Security (2004). [PDF (PDF, 219 KB)]
  • Srdjan Capkun, Jean-Pierre Hubaux, Markus Jakobsson,
    Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks,
    Technical report. – 2004 [200410] [LCA-REPORT-2004-015] [PDF (PDF, 218 KB)]

2003

  • S. Capkun, J. P. Hubaux and L. Buttyán,
    Mobility Helps Security in Ad Hoc Networks,
    In Proceedings of the 4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2003). [PDF (PDF, 203 KB)]
  • S. Capkun, L. Buttyán and  J. P. Hubaux,
    SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 2003.  [PDF (PDF, 164 KB)]
  • S. Capkun and J. P. Hubaux,
    BISS: Building Secure Routing out of an Incomplete Set of  Security Associations, In Proceedings of the Wireless Security Workshop (WISE) 2003, San Diego, September 2003  [PDF (PDF, 175 KB)]
  • S. Capkun, L. Buttyan, J. P. Hubaux,
    Self-Organized Public-Key Management for Mobile Ad-Hoc Networks,
    IEEE Transactions on Mobile Computing (January-March 2003). [PDF (PDF, 2.1 MB)]
  • S. Capkun, L. Buttyan and J-P. Hubaux,
    Self-Organized Public-Key Management for Mobile Ad-Hoc Networks - Abstract,
    in Report on a Working Session on Security in Wireless Ad Hoc Networks, L. Buttyan and J.-P. Hubaux (eds.), ACM Mobile Computing and Communications Review (MC2R), Vol. 7, No. 1, 2003. [PDF (PDF, 401 KB)]

2002

  • L. Buttyán, J. P. Hubaux and S. Capkun,
    A Formal Analysis of Syverson`s Rational Exchange Protocol,
    In Proceedings of IEEE Computer Security Foundations Workshop (CSFW), Cape Breton, Nova Scotia, Canada, June 2002, pp. [PDF (PDF, 179 KB)]
  • S. Capkun, L. Buttyan, J. P. Hubaux,
    Self-Organized Public-Key Management for Mobile Ad-Hoc Networks,
    Poster in Wireless Security Workshop (WISE), Atlanta 2002.
  • S. Capkun, L. Buttyán and  J. P. Hubaux,
    Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph, In Proceedings of ACM New Security Paradigms Workshop (NSPW), September 2002.  [PDF (PDF, 1.2 MB)]
  • S. Capkun, M. Hamdi, J. P. Hubaux,
    GPS-free Positioning in Mobile Ad-Hoc Networks,
    Cluster Computing Journal, April 2002. [PDF (PDF, 422 KB)]

2001

  • J.-P. Hubaux, L. Buttyán, and S. Capkun,
    The Quest for Security in Mobile Ad Hoc Networks,
    In Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC 2001), Long Beach, CA, USA, 4-5. October 2001. [PDF (PDF, 205 KB)]
  • S. Capkun, M. Hamdi and J. P. Hubaux,
    GPS-free Positioning in Mobile Ad-Hoc Networks,
    In Proceedings of 34'th HICSS, January 2001. (best paper award)  [PDF (PDF, 197 KB)]
  • Lj. Blazevic, L.Buttyan, S. Capkun, S. Giordano, J. P. Hubaux, J. Y. Le Boudec
    Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes, IEEE Communications Magazine, June 2001. [PDF (PDF, 1022 KB)]
 
 
Page URL: http://www.syssec.ethz.ch/research/publications.html
28.07.2017
© 2017 Eidgenössische Technische Hochschule Zürich