SCy-Phy
SCy-Phy
Home
People
Featured Publications
Publications
Light
Dark
Automatic
Nils Ole Tippenhauer
Latest
Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicle
Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring
Constrained Proximity Attacks on Mobile Targets
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks
Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels
Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis
Attack Detection for CPS
COTS Drone Detection using Video Streaming Characteristics
COTS Drone Detection Using Video Streaming Characteristics
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems
A Statistical Analysis Framework for ICS Process Datasets
BIAS: Bluetooth Impersonation AttackS
Apparatus and method for monitoring a wireless network
Decentralized Privacy-Preserving Proximity Tracing
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
PAtt: Physics-based Attestation of Control Systems
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices
Hide and Seek: An Architecture for Improving Attack Visibility in Industrial Control Systems
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots
Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android
Design and Realization of Testbeds for Security Research in the Industrial Internet of Things
Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures
Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies
The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
On Practical Threat Scenario Testing in an Electric Power ICS Testbed
WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic
Design and Large-Scale Evaluation of WiFi Proximity Metrics
State-Aware Anomaly Detection for Industrial Control Systems
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3
Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN
Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios
On Ladder Logic Bombs in Industrial Control Systems
Legacy-Compliant Data Authentication for Industrial Control System Traffic
Messmanipulationen in Steuerungssystemen
IoTScanner: Detecting Privacy Threats in IoT Neighborhoods
ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis (Poster)
SIPHON: Towards Scalable High-Interaction Physical Honeypots
Towards Formal Security Analysis of Industrial Control Systems
Evaluation of transport mode using wearable sensor data from 43,000 students
IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods
Advanced Security Testbed Framework for Wearable IoT Devices
Multi-Receiver GPS Spoofing Detection: Error Models and Realization
Physical-Layer Integrity for Wireless Messages
Wearable Environmental Sensors and Infrastructure for Mobile Large-scale Urban Deployment
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems
Limiting The Impact of Stealthy Attacks on Industrial Control Systems
Towards High-Interaction Virtual ICS Honeypots-in-a-Box
On Attacker Models and Profiles for Cyber-Physical Systems
The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment
Assessing the effect of cyber-physical attacks on water distribution systems
SWaT: A Water Treatment Testbed for Research and Training on ICS Security
Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures
Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed
Characterizing Cyber-Physical Attacks on Water Distribution Systems
SENSg: Large-Scale Deployment of Wearable Sensors for Trip and Transport Mode Logging
Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET
MiniCPS: A toolkit for security research on CPS Networks
UWB Rapid-Bit-Exchange System for Distance Bounding
Automatic Generation of Security Argument Graphs
Visible light communication with flickering prevention
CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems
Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack
Go with the Flow: Toward Workflow-Oriented Security Assessment
On Limitations of Friendly Jamming for Confidentiality
Low-complexity Visible Light Networking with LED-to-LED communication
Physical-Layer Security Aspects of Wireless Localization
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Toys communicating with LEDs: Enabling toy cars interaction
Investigation of Signal and Message Manipulations on the Wireless Channel
On the Requirements for Successful GPS Spoofing Attacks
Integrity Regions: Authentication Through Presence in Wireless Networks
UWB Impulse Radio Based Distance Bounding
Attacks on Public WLAN-based Positioning
ID-based Secure Distance Bounding and Localization
iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems
Secure Ranging With Message Temporal Integrity
UWB-based Secure Ranging and Localization
Design and Cryptoanalysis of Multi-Precision Arithmetics on Smart Cards with SmartMIPS Architecture
Cite
×