Publications

Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen (2020). “BIAS: Bluetooth Impersonation AttackS”. IEEE Symposium on Security and Privacy (S&P).

PDF Code Project Video DOI

Nils Ole Tippenhauer, Rajib Ranjan Maiti, Siby Sandra, Ragav Sridharan (2020). “Apparatus and method for monitoring a wireless network”.

Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen (2020). “Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy”. Transactions on Privacy and Security (TOPS).

DOI

Hamid Reza Ghaeini, Matthew Chan, Raad Bahmani, Ferdinand Brasser and, Luis Garcia, Jianying Zhou, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer, Saman Zonouz (2019). “PAtt: Physics-based Attestation of Control Systems”. Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

PDF Project Custom Link

Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen (2019). “The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR”. Proceedings of the USENIX Security Symposium (USENIX Security).

Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici (2019). “HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices”. Proceedings of the Asia Conference on Information, Computer and Communications Security (ASIACCS).

Jairo Giraldo, David Urbina, Alvaro Cárdenas, Nils Ole Tippenhauer (2019). “Hide and Seek: An Architecture for Improving Attack Visibility in Industrial Control Systems”. Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS).

Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martin Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici (2019). “Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots”. ACM Conference on Data and Application Security and Privacy (CODASPY).

DOI

Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen (2019). “Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android”. Proceedings of the Network and Distributed System Security Symposium (NDSS).

DOI

Hamid Reza Ghaeini, Nils Ole Tippenhauer, Jianying Zhou (2019). “Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures”. Proceedings of the Conference on Availability, Reliability and Security.

PDF DOI

Nils Ole Tippenhauer (2019). “Design and Realization of Testbeds for Security Research in the Industrial Internet of Things”. Security and Privacy Trends in the Industrial Internet of Things.

DOI

R. Taormina, S. Galelli, H. C. Douglas, N. O. Tippenhauer, E. Salomons, A. Ostfeld (2019). “A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems”. Environmental Modelling & Software.

DOI

Xueou Wang, Xiaolu Hou, Ruben Rios, Per Hallgren, Nils Ole Tippenhauer, Martín Ochoa (2018). “Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies”. Proceedings of the European Symposium on Research in Computer Security (ESORICS).

DOI

Riccardo Taormina, Stefano Galelli, Nils Ole Tippenhauer, Elad Salomons, Avi Ostfeld, Demetrios G. Eliades, Mohsen Aghashahi, Raanju Sundararajan, Mohsen Pourahmadi, M. Katherine Banks, B. M. Brentan, Enrique Campbell, G. Lima, D. Manzi, D. Ayala-Cabrera, M. Herrera, I. Montalvo, J. Izquierdo, Jr, E. Luvizotto, Sarin E. Chandy, Amin Rasekh, Zachary A. Barker, Bruce Campbell, M. Ehsan Shafiee, Marcio Giacomoni, Nikolaos Gatsis, Ahmad Taha, Ahmed A. Abokifa, Kelsey Haddad, Cynthia S. Lo, Pratim Biswas, M. Fayzul K.and Kc, Bijay Pasha, Saravanakumar Lakshmanan Somasundaram, Mashor Housh, Ziv Ohar (2018). “The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks”. Journal of Water Resources Planning and Management.

DOI

Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, Richard Candell (2018). “A Survey of Physics-Based Attack Detection in Cyber-Physical Systems”. ACM Computing Surveys (CSUR).

DOI

Ragav Sridharan, Rajib Ranjan Maiti, Nils Ole Tippenhauer (2018). “WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic”. Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).

DOI

Ahnaf Siddiqi, Nils Ole Tippenhauer, Daisuke Mashima, Binbin Chen (2018). “On Practical Threat Scenario Testing in an Electric Power ICS Testbed”. Proceedings of the Cyber-Physical System Security Workshop (CPSS), co-located with ASIACCS.

DOI

Aymen Fakhreddine, Nils Ole Tippenhauer, Domenico Giustiniano (2018). “Design and Large-Scale Evaluation of WiFi Proximity Metrics”. Proceedings of European Wireless.

Hamid Reza Ghaeini, Daniele Antonioli, Ferdinand Brasser, Ahmad-Reza Sadeghi, Nils Ole Tippenhauer (2018). “State-Aware Anomaly Detection for Industrial Control Systems”. Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC).

DOI

Daniele Antonioli, Sandra Siby, Nils Ole Tippenhauer (2017). “Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN”. Proceedings of Conference on Cryptology And Network Security (CANS).

Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martín Ochoa, Nils Ole Tippenhauer (2017). “Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3”. Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS.

DOI

Naman Govil, Anand Agrawal, Nils Ole Tippenhauer (2017). “On Ladder Logic Bombs in Industrial Control Systems”. Proceedings of the Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS), co-located with ESORICS.

DOI

Rajib Ranjan Maiti, Sandra Siby, Ragav Sridharan, Nils Ole Tippenhauer (2017). “Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios”. Proceedings of the European Symposium on Research in Computer Security (ESORICS).

DOI

Nils Ole Tippenhauer (2017). “Messmanipulationen in Steuerungssystemen”. Zeitschrift für Datenrecht und Informationssicherheit (DIGMA).

John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, Martín Ochoa (2017). “Legacy-Compliant Data Authentication for Industrial Control System Traffic”. Proceedings of the Conference on Applied Cryptography and Network Security (ACNS).

DOI

Marco Rocchetto, Nils Ole Tippenhauer (2017). “Towards Formal Security Analysis of Industrial Control Systems”. Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS).

DOI

Juan Guarnizo, Amit Tambe, Suman Sankar Bunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici (2017). “SIPHON: Towards Scalable High-Interaction Physical Honeypots”. Proceedings of the Cyber-Physical System Security Workshop (CPSS), co-located with ASIACCS.

DOI

Yair Meidan, Michael Bohadana, Asaf Shabtai, Juan-David Guarnizo, Martín Ochoa, Nils Ole Tippenhauer, Yuval Elovici (2017). “ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis (Poster)”. Proceedings of the Security Track at ACM Symposium on Applied Computing (SAC).

DOI

Sandra Siby, Rajib Ranjan Maiti, Nils Ole Tippenhauer (2017). “IoTScanner: Detecting Privacy Threats in IoT Neighborhoods”. Proceedings of the Workshop on IoT Privacy, Trust, and Security (IoTPTS), co-located with ASIACCS.

DOI

Sandra Siby, Rajib Ranjan Maiti, Nils Ole Tippenhauer (2017). “IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods”.

PDF

Erik Wilhelm, Don MacKenzie, Yuren Zhou, Lynette Cheah, Nils Ole Tippenhauer (2017). “Evaluation of transport mode using wearable sensor data from 43,000 students”. Proceedings of Transportation Research Board Annual Meeting (TRB).

Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper (2016). “Multi-Receiver GPS Spoofing Detection: Error Models and Realization”. Proceedings of the Annual Computer Security Applications Conference (ACSAC).

DOI

Shachar Siboni, Asaf Shabtai, Nils Ole Tippenhauer, Jemin Lee, Yuval Elovici (2016). “Advanced Security Testbed Framework for Wearable IoT Devices”. Transactions on Internet Technology (TOIT).

DOI

Erik Wilhelm, Sandra Siby, Yuren Zhou, Xavier J. S. Ashok, Melani Jayasuriya, Shaohui Foong, Jacksheeng Kee, Kristin Wood, Nils Ole Tippenhauer (2016). “Wearable Environmental Sensors and Infrastructure for Mobile Large-scale Urban Deployment”. Sensors.

DOI

Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun (2016). “Physical-Layer Integrity for Wireless Messages”. Computer Networks.

DOI

Daniele Antonioli, Anand Agrawal, Nils Ole Tippenhauer (2016). “Towards High-Interaction Virtual ICS Honeypots-in-a-Box”. Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS.

DOI

David Urbina, Jairo Giraldo, Alvaro A. Cardenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Faisal, Justin Ruths, Richard Candell, Henrik Sandberg (2016). “Limiting The Impact of Stealthy Attacks on Industrial Control Systems”. Proceedings of the ACM Conference on Computer and Communications Security (CCS).

DOI

Hamid Ghaeini, Nils Ole Tippenhauer (2016). “HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems”. Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS.

DOI

Marco Rocchetto, Nils Ole Tippenhauer (2016). “CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions”. Proceedings of the International Conference on Formal Engineering Methods (ICFEM).

DOI

Marco Rocchetto, Nils Ole Tippenhauer (2016). “On Attacker Models and Profiles for Cyber-Physical Systems”. Proceedings of the European Symposium on Research in Computer Security (ESORICS).

DOI

Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol (2016). “The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment”. Proceedings of Workshop on Graphical Models for Security (GraMSec).

DOI

Riccardo Taormina, Stefano Galelli, Nils Ole Tippenhauer, Elad Salomons, Avi Ostfeld (2016). “Assessing the effect of cyber-physical attacks on water distribution systems”. Proceedings of World Congress on Environmental & Water Resources (EWRI).

DOI

Nils Ole Tippenhauer, Martín Ochoa, Aditya Mathur (2016). “Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures”. Proceedings of Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN).

PDF

Aditya Mathur, Nils Ole Tippenhauer (2016). “SWaT: A Water Treatment Testbed for Research and Training on ICS Security”. Proceedings of Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater).

DOI

Riccardo Taormina, Stefano Galelli, Nils Ole Tippenhauer, Elad Salomons, Avi Ostfeld (2016). “Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET”. Proceedings of Singapore Cyber Security Conference (SG-CRC).

DOI

Erik Wilhelm, Nils Ole Tippenhauer, Yuren Zhou, Nan Zhang (2016). “SENSg: Large-Scale Deployment of Wearable Sensors for Trip and Transport Mode Logging”. Proceedings of Transportation Research Board Annual Meeting (TRB).

Riccardo Taormina, Stefano Galelli, Nils Ole Tippenhauer, Elad Salomons, Avi Ostfeld (2016). “Characterizing Cyber-Physical Attacks on Water Distribution Systems”. Journal of Water Resources Planning and Management.

DOI

David Urbina, Jairo Giraldo, Nils Ole Tippenhauer, Alvaro Cárdenas (2016). “Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed”. Proceedings of Singapore Cyber Security Conference (SG-CRC).

DOI

Daniele Antonioli, Nils Ole Tippenhauer (2015). “MiniCPS: A toolkit for security research on CPS Networks”. Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS.

DOI

Nils Ole Tippenhauer, Heinrich Luecken, Marc Kuhn, Srdjan Capkun (2015). “UWB Rapid-Bit-Exchange System for Distance Bounding”. Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec).

DOI

Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, William Sanders (2014). “Automatic Generation of Security Argument Graphs”. Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC).

DOI

Domenico Giustiniano, Stefan Mangold, Nils Ole Tippenhauer (2014). “Visible light communication with flickering prevention”.

An Hoa Vu, Nils Ole Tippenhauer, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk (2014). “CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems”. Proceedings of the Conference on Quantitative Evaluation of SysTems (QEST).

DOI

William G. Temple, Binbin Chen, Nils Ole Tippenhauer (2013). “Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack”. Proceedings of the IEEE Conference on Smart Grid Communications (SmartGridComm).

DOI

Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun (2013). “On Limitations of Friendly Jamming for Confidentiality”. Proceedings of the IEEE Symposium on Security and Privacy (S&P).

DOI

Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K. Y. Yau (2013). “Go with the Flow: Toward Workflow-Oriented Security Assessment”. Proceedings of New Security Paradigm Workshop (NSPW).

DOI

Domenico Giustiniano, Nils Ole Tippenhauer, Stefan Mangold (2012). “Low-complexity Visible Light Networking with LED-to-LED communication”. Proceedings of IFIP Wireless Days.

DOI

Nils Ole Tippenhauer, Domenico Giustiniano, Stefan Mangold (2012). “Toys communicating with LEDs: Enabling toy cars interaction”. Proceedings of Consumer Communications and Networking Conference (CCNC).

DOI

Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelé, Srdjan Čapkun (2012). “Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System”. Proceedings of the European Symposium on Research in Computer Security (ESORICS).

DOI

Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Čapkun (2011). “On the Requirements for Successful GPS Spoofing Attacks”. Proceedings of the ACM Conference on Computer and Communications Security (CCS).

DOI

Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Čapkun (2011). “Investigation of Signal and Message Manipulations on the Wireless Channel”. Proceedings of the European Symposium on Research in Computer Security (ESORICS).

DOI

Marc Kuhn, Heinrich Luecken, Nils Ole Tippenhauer (2010). “UWB Impulse Radio Based Distance Bounding”. Proceedings of the Workshop on Positioning, Navigation and Communication (WPNC).

DOI

Srdjan Čapkun, Mario Čagalj, Ghassan Karame, Nils Ole Tippenhauer (2010). “Integrity Regions: Authentication Through Presence in Wireless Networks”. IEEE Transactions on Mobile Computing.

DOI

Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Čapkun (2009). “Secure Ranging With Message Temporal Integrity”. Cryptology ePrint Archive: Report 2009/602.

Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun, Srdjan Capkun, Srdjan Capkun (2009). “iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems”.

Nils Ole Tippenhauer, Srdjan Čapkun (2009). “ID-based Secure Distance Bounding and Localization”. Proceedings of the European Symposium on Research in Computer Security (ESORICS).

DOI

Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Čapkun (2009). “Attacks on Public WLAN-based Positioning”. Proceedings of the ACM Conference on Mobile Systems, Applications and Services (MobiSys).

DOI

Nils Ole Tippenhauer, Srdjan Čapkun (2008). “UWB-based Secure Ranging and Localization”.