Folgen
Dr.-Ing. Jiska Classen
Dr.-Ing. Jiska Classen
TU Darmstadt, Secure Mobile Networking Lab, Germany
Bestätigte E-Mail-Adresse bei seemoo.tu-darmstadt.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
J Ruge, J Classen, F Gringoli, M Hollick
29th USENIX Security Symposium (USENIX Security 20), 19-36, 2020
842020
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications
J Classen, J Chen, D Steinmetzer, M Hollick, E Knightly
Proceedings of the 2nd International Workshop on Visible Light …, 2015
832015
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware
J Classen, D Wegemer, P Patras, T Spink, M Hollick
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
812018
Practical Covert Channels for WiFi Systems
J Classen, M Schulz, M Hollick
2015 IEEE Conference on Communications and Network Security (CNS), 209-217, 2015
702015
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves
D Steinmetzer, J Chen, J Classen, E Knightly, M Hollick
2015 IEEE Conference on Communications and Network Security (CNS), 335-343, 2015
652015
InternalBlue – Bluetooth Binary Patching and Experimentation Framework
D Mantz, J Classen, M Schulz, M Hollick
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
642019
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit
H Fereidooni, J Classen, T Spink, P Patras, M Miettinen, AR Sadeghi, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 48-69, 2017
462017
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain
J Chen, D Steinmetzer, J Classen, E Knightly, M Hollick
2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017
412017
CA Trust Management for the Web PKI
J Braun, F Volk, J Classen, J Buchmann, M Mühlhäuser
Journal of Computer Security 22 (6), 913-959, 2014
352014
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
J Classen, D Steinmetzer, M Hollick
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 19-24, 2016
322016
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Raytracing
D Steinmetzer, J Classen, M Hollick
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016
262016
Improving the Reliability of Bluetooth Low Energy Connections.
M Spörk, J Classen, CA Boano, M Hollick, K Römer
Proceedings of the 2020 International Conference on Embedded Wireless …, 2020
242020
Ghost Peak: Practical Distance Reduction Attacks Against {HRP}{UWB} Ranging
P Leu, G Camurati, A Heinrich, M Roeschlin, C Anliker, M Hollick, ...
31st USENIX Security Symposium (USENIX Security 22), 1343-1359, 2022
222022
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices
J Classen, M Hollick
12th Conference on Security and Privacy in Wireless and Mobile Networks, 186-191, 2019
182019
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information
M Weller, J Classen, F Ullrich, D Waßmann, E Tews
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
162020
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem
F Ullrich, J Classen, J Eger, M Hollick
13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019
142019
A Distributed Reputation System for Certification Authority Trust Management
J Classen, J Braun, F Volk, M Hollick, J Buchmann, M Mühlhäuser
2015 IEEE Trustcom/BigDataSE/ISPA 1, 1349-1356, 2015
112015
ToothPicker: Apple Picking in the iOS Bluetooth Stack
D Heinze, J Classen, M Hollick
14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020
102020
Firmware Insider: Bluetooth Randomness is Mostly Random
J Tillmanns, J Classen, F Rohrbach, M Hollick
14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020
92020
MagicPairing: Apple's Take on Securing Bluetooth Peripherals
D Heinze, J Classen, F Rohrbach
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
92020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20