The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications J Classen, J Chen, D Steinmetzer, M Hollick, E Knightly Proceedings of the 2nd International Workshop on Visible Light …, 2015 | 52 | 2015 |
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves D Steinmetzer, J Chen, J Classen, E Knightly, M Hollick 2015 IEEE Conference on Communications and Network Security (CNS), 335-343, 2015 | 38 | 2015 |
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit H Fereidooni, J Classen, T Spink, P Patras, M Miettinen, AR Sadeghi, ... International Symposium on Research in Attacks, Intrusions, and Defenses, 48-69, 2017 | 34 | 2017 |
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware J Classen, D Wegemer, P Patras, T Spink, M Hollick Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018 | 32 | 2018 |
Practical Covert Channels for WiFi Systems J Classen, M Schulz, M Hollick 2015 IEEE Conference on Communications and Network Security (CNS), 209-217, 2015 | 30 | 2015 |
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain J Chen, D Steinmetzer, J Classen, E Knightly, M Hollick 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017 | 29 | 2017 |
CA Trust Management for the Web PKI J Braun, F Volk, J Classen, J Buchmann, M Mühlhäuser Journal of Computer Security 22 (6), 913-959, 2014 | 24 | 2014 |
InternalBlue – Bluetooth Binary Patching and Experimentation Framework D Mantz, J Classen, M Schulz, M Hollick Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 22 | 2019 |
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Raytracing D Steinmetzer, J Classen, M Hollick 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016 | 20 | 2016 |
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer J Classen, D Steinmetzer, M Hollick Proceedings of the 3rd Workshop on Visible Light Communication Systems, 19-24, 2016 | 18 | 2016 |
A Distributed Reputation System for Certification Authority Trust Management J Classen, J Braun, F Volk, M Hollick, J Buchmann, M Mühlhäuser 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1349-1356, 2015 | 8 | 2015 |
Improving the Reliability of Bluetooth Low Energy Connections. M Spörk, J Classen, CA Boano, M Hollick, K Römer Proceedings of the 2020 International Conference on Embedded Wireless …, 2020 | 6 | 2020 |
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices J Classen, M Hollick 12th Conference on Security and Privacy in Wireless and Mobile Networks, 186-191, 2019 | 6 | 2019 |
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem F Ullrich, J Classen, J Eger, M Hollick 13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019 | 5 | 2019 |
Analyzing TETRA Location Privacy and Network Availability M Pfeiffer, JP Kwiotek, J Classen, R Klose, M Hollick Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016 | 4 | 2016 |
Practical VLC to WiFi Handover Mechanisms R Meister, J Classen, MS Saud, M Katz, M Hollick Proceedings of the 2019 International Conference on Embedded Wireless …, 2019 | 3 | 2019 |
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets J Ruge, J Classen, F Gringoli, M Hollick 29th USENIX Security Symposium (USENIX Security 20), 19-36, 2020 | 2 | 2020 |
Reversing and Exploiting Broadcom Bluetooth J Classen, D Mantz Montreal: REcon, 2019 | 2 | 2019 |
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace D Steinmetzer, J Classen, M Hollick 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016 | 2 | 2016 |
ToothPicker: Apple Picking in the iOS Bluetooth Stack D Heinze, J Classen, M Hollick 14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020 | 1 | 2020 |