On the requirements for successful GPS spoofing attacks NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 745 | 2011 |
Implications of radio fingerprinting on the security of sensor networks KB Rasmussen, S Capkun 2007 Third International Conference on Security and Privacy in …, 2007 | 374 | 2007 |
Proximity-based access control for implantable medical devices KB Rasmussen, C Castelluccia, TS Heydt-Benjamin, S Capkun Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 302 | 2009 |
Realization of {RF} distance bounding KB Rasmussen, S Capkun 19th USENIX Security Symposium (USENIX Security 10), 2010 | 300 | 2010 |
Distance hijacking attacks on distance bounding protocols C Cremers, KB Rasmussen, B Schmidt, S Capkun 2012 IEEE symposium on security and privacy, 113-127, 2012 | 228 | 2012 |
A minimalist approach to remote attestation A Francillon, Q Nguyen, KB Rasmussen, G Tsudik 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014 | 181 | 2014 |
Secure location verification with hidden and mobile base stations S Capkun, K Rasmussen, M Cagalj, M Srivastava IEEE Transactions on Mobile Computing 7 (4), 470-483, 2008 | 177 | 2008 |
Attacks on public WLAN-based positioning systems NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun Proceedings of the 7th international conference on Mobile systems …, 2009 | 155 | 2009 |
Bias: Bluetooth impersonation attacks D Antonioli, NO Tippenhauer, K Rasmussen 2020 IEEE symposium on security and privacy (SP), 549-562, 2020 | 131 | 2020 |
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics S Eberz, KB Rasmussen, V Lenders, I Martinovic Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 120 | 2017 |
Location privacy of distance bounding protocols KB Rasmussen, S Čapkun Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 115 | 2008 |
Using reflexive eye movements for fast challenge-response authentication I Sluganovic, M Roeschlin, KB Rasmussen, I Martinovic Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 112 | 2016 |
On the security of password manager database formats P Gasti, KB Rasmussen Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 112 | 2012 |
The {KNOB} is broken: Exploiting low entropy in the encryption key negotiation of bluetooth {BR/EDR} D Antonioli, NO Tippenhauer, KB Rasmussen 28th USENIX security symposium (USENIX security 19), 1047-1061, 2019 | 111 | 2019 |
Taxonomy and challenges of out-of-band signal injection attacks and defenses I Giechaskiel, K Rasmussen IEEE Communications Surveys & Tutorials 22 (1), 645-670, 2019 | 110 | 2019 |
Leaky wires: Information leakage and covert communication between FPGA long wires I Giechaskiel, KB Rasmussen, K Eguro Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 99 | 2018 |
Security of distance-bounding: A survey G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ... ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018 | 97 | 2018 |
Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics S Eberz, K Rasmussen, V Lenders, I Martinovic Network and Distributed System Security (NDSS) Symposium, 2015 | 93 | 2015 |
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage I Giechaskiel, KB Rasmussen, J Szefer 2020 IEEE Symposium on Security and Privacy (SP), 1728-1741, 2020 | 92 | 2020 |
Detection of electromagnetic interference attacks on sensor systems Y Zhang, K Rasmussen 2020 IEEE Symposium on Security and Privacy (SP), 203-216, 2020 | 80 | 2020 |