Publications

189 result(s)

Journal papers

IoTScanner: Detecting Privacy Threats in IoT Neighborhoods
Siby, S, Maiti, R, Tippenhauer, N, 2017, “IoTScanner: Detecting Privacy Threats in IoT Neighborhoods”, 3rd International Workshop on IoT Privacy, Trust, and Security (IoTPTS), pp. 23- 30

Conference papers/presentations

Legacy-Compliant Data Authentication for Industrial Control System Traffic
Castellanos J. H, Antonioli D,Tippenhauer N. O, Ochoa M, 2017, “Legacy-Compliant Data Authentication for Industrial Control System Traffic”, International Conference on Applied Cryptography and Network Security (ACNS)

Journal papers

Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things
Sachidananda, V, Toh, J, Siboni, S, Shabati, A, Elovici, Y, 2017, “Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things” 3rd International Workshop on IoT Privacy, Trust, and Security (IoTPTS), pp. 3-10

Journal papers

Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios
Maiti, R, Siby, S, Sridharan, R, Tippenhauer, N, 2017, “Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios”, 22nd European Symposium on Research in Computer Security (ESORICS), pp.247-264

Conference papers/presentations

Model-based Attack Detection Scheme for Smart Water Distribution Networks
Ahmed C. M, Murguia C, Ruths J, 2017, “Model-based Attack Detection Scheme for Smart Water Distribution Networks”, ACM Asia Conference on Computer and Communications Security (ASIACCS)

Conference papers/presentations

Multistage Downstream Attack Detection in a Cyber Physical System
Qadeer R, Murguia C, Ahmed C.M, and Ruths J, 2017, “Multistage Downstream Attack Detection in a Cyber Physical System,” CyberICPS Workshop 2017, in conjunction with ESORICS

Conference papers/presentations

Poster: ProfilIoT: A Machines learning Approach for IoT Device Identification Based on Network Traffic Analysis
Meidan, Y, Bohadana, M, Shabati, A, Elovici, Y, Ochoa, M, Tippenhauer, N, Guarnizo, J,D, 2017, “Poster: ProfilIoT: A Machines learning Approach for IoT Device Identification Based on Network Traffic Analysis”, The 32nd ACM Symposium on Applied Computing (SAC)

Conference papers/presentations

Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN
Antonioli, D, Siby, S, Tippenhauer, N, 2017, “Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN”, International Conference on Cryptology and Network Security (CANS)

Conference papers/presentations

Randomized Constraints Consensus for Distributed Robust Linear Programming
Chamambaz M, Notarstefano G, Bouffanais R, 2017, “Randomized Constraints Consensus for Distributed Robust Linear Programming”, The 20th World Congress of the International Federation of Automatic Control

Conference papers/presentations

Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools
Murguia C, van de Wouw N, Ruths J, 2017, “Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools”, IFAC 2017 World Congress