Dr.-Ing. Jiska Classen
Dr.-Ing. Jiska Classen
TU Darmstadt, Secure Mobile Networking Lab, Germany
Verified email at seemoo.tu-darmstadt.de - Homepage
Title
Cited by
Cited by
Year
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications
J Classen, J Chen, D Steinmetzer, M Hollick, E Knightly
Proceedings of the 2nd International Workshop on Visible Light …, 2015
522015
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves
D Steinmetzer, J Chen, J Classen, E Knightly, M Hollick
2015 IEEE Conference on Communications and Network Security (CNS), 335-343, 2015
382015
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit
H Fereidooni, J Classen, T Spink, P Patras, M Miettinen, AR Sadeghi, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 48-69, 2017
342017
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware
J Classen, D Wegemer, P Patras, T Spink, M Hollick
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
322018
Practical Covert Channels for WiFi Systems
J Classen, M Schulz, M Hollick
2015 IEEE Conference on Communications and Network Security (CNS), 209-217, 2015
302015
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain
J Chen, D Steinmetzer, J Classen, E Knightly, M Hollick
2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017
292017
CA Trust Management for the Web PKI
J Braun, F Volk, J Classen, J Buchmann, M Mühlhäuser
Journal of Computer Security 22 (6), 913-959, 2014
242014
InternalBlue – Bluetooth Binary Patching and Experimentation Framework
D Mantz, J Classen, M Schulz, M Hollick
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
222019
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Raytracing
D Steinmetzer, J Classen, M Hollick
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016
202016
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
J Classen, D Steinmetzer, M Hollick
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 19-24, 2016
182016
A Distributed Reputation System for Certification Authority Trust Management
J Classen, J Braun, F Volk, M Hollick, J Buchmann, M Mühlhäuser
2015 IEEE Trustcom/BigDataSE/ISPA 1, 1349-1356, 2015
82015
Improving the Reliability of Bluetooth Low Energy Connections.
M Spörk, J Classen, CA Boano, M Hollick, K Römer
Proceedings of the 2020 International Conference on Embedded Wireless …, 2020
62020
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices
J Classen, M Hollick
12th Conference on Security and Privacy in Wireless and Mobile Networks, 186-191, 2019
62019
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem
F Ullrich, J Classen, J Eger, M Hollick
13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019
52019
Analyzing TETRA Location Privacy and Network Availability
M Pfeiffer, JP Kwiotek, J Classen, R Klose, M Hollick
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016
42016
Practical VLC to WiFi Handover Mechanisms
R Meister, J Classen, MS Saud, M Katz, M Hollick
Proceedings of the 2019 International Conference on Embedded Wireless …, 2019
32019
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
J Ruge, J Classen, F Gringoli, M Hollick
29th USENIX Security Symposium (USENIX Security 20), 19-36, 2020
22020
Reversing and Exploiting Broadcom Bluetooth
J Classen, D Mantz
Montreal: REcon, 2019
22019
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace
D Steinmetzer, J Classen, M Hollick
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016
22016
ToothPicker: Apple Picking in the iOS Bluetooth Stack
D Heinze, J Classen, M Hollick
14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20