-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathindex.json
1 lines (1 loc) · 65.4 KB
/
index.json
1
[{"authors":["not"],"categories":null,"content":"I am a faculty at the CISPA Helmholtz Center for Information Security since August 2018. Before that, I was an Assistant Professor at the Information Systems Technology and Design Pillar, at the Singapore University of Technology and Design (SUTD). I earned my Dr. Sc. in Computer Science from ETH Zurich (Switzerland) in 2012. At ETH, I was part of the System Security group led by Prof. Srdjan Capkun. Before my studies at ETH, I received a degree in Computer Engineering (Dipl. Ing.) from the Hamburg University of Technology (Germany) in 2007. My thesis on side-channel attack-resistant embedded crypto was supervised by Prof. Dieter Gollmann (TUHH), and Dr. Heike Neumann (NXP). The thesis won the K-H Ditze award for TUHH’s best thesis in 2007. I was also awarded a DAAD scholarship to study for one year at the University of Waterloo, Ontario, Canada between 2004-2005. My full CV is available here.\n","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"e0963cdae377e463e5d5b129b45c41a7","permalink":"","publishdate":"0001-01-01T00:00:00Z","relpermalink":"","section":"authors","summary":"I am a faculty at the CISPA Helmholtz Center for Information Security since August 2018. Before that, I was an Assistant Professor at the Information Systems Technology and Design Pillar, at the Singapore University of Technology and Design (SUTD). I earned my Dr. Sc. in Computer Science from ETH Zurich (Switzerland) in 2012. At ETH, I was part of the System Security group led by Prof. Srdjan Capkun. Before my studies at ETH, I received a degree in Computer Engineering (Dipl. Ing.) from the Hamburg University of Technology (Germany) in 2007. My thesis on side-channel attack-resistant embedded crypto was supervised by Prof. Dieter Gollmann (TUHH), and Dr. Heike Neumann (NXP). The thesis won the K-H Ditze award for TUHH’s best thesis in 2007. I was also awarded a DAAD scholarship to study for one year at the University of Waterloo, Ontario, Canada between 2004-2005. My full CV is available here.\n","tags":null,"title":"Nils Ole Tippenhauer","type":"authors"},{"authors":[],"categories":null,"content":"Slides can be added in a few ways:\nCreate slides using Academic\u0026rsquo;s Slides feature and link using slides parameter in the front matter of the talk file Upload an existing slide deck to static/ and link using url_slides parameter in the front matter of the talk file Embed your slides (e.g. Google Slides) or presentation video on this page using shortcodes. Further talk details can easily be added to this page using Markdown and $\\rm \\LaTeX$ math code.\n","date":1906549200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1906549200,"objectID":"96344c08df50a1b693cc40432115cbe3","permalink":"https://scy-phy.net/talk/example/","publishdate":"2017-01-01T00:00:00Z","relpermalink":"/talk/example/","section":"talk","summary":"An example talk using Academic's Markdown slides feature.","tags":[],"title":"Example Talk","type":"talk"},{"authors":["Alessandro Erba","Andres Murillo","Riccardo Taormina","Stefano Galelli","Nils Ole Tippenhauer"],"categories":null,"content":"Add the full text or supplementary notes for the publication here using Markdown formatting.\n","date":1727740800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1727740800,"objectID":"86fd452eb985b259a7afc8f52a8f4748","permalink":"https://scy-phy.net/publication/erba-24-practical/","publishdate":"2025-01-17T09:54:31.379957Z","relpermalink":"/publication/erba-24-practical/","section":"publication","summary":"Add the full text or supplementary notes for the publication here using Markdown formatting.\n","tags":[],"title":"On Practical Realization of Evasion Attacks for Industrial Control Systems","type":"publication"},{"authors":["Cornelia Brülhart","Nurefşan Sertbaş Bülbül","Mathias Fischer","Nils Ole Tippenhauer"],"categories":[],"content":"","date":1727740800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1724741277,"objectID":"6c48cd01ba93e33a7db06f5fa70c3211","permalink":"https://scy-phy.net/publication/brulhart-2024/","publishdate":"2024-08-27T06:47:57.373995Z","relpermalink":"/publication/brulhart-2024/","section":"publication","summary":"","tags":[],"title":"Transparent TSN for Agnostic End-hosts via P4-based Traffic Characterization at Switches","type":"publication"},{"authors":["Andrés Murillo","Riccardo Taormina","Nils Tippenhauer","Stefano Galelli"],"categories":null,"content":"Add the full text or supplementary notes for the publication here using Markdown formatting.\n","date":1704067200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1704067200,"objectID":"1bc472be4c68be6d334d4d754eac0718","permalink":"https://scy-phy.net/publication/murillo-2024-thorough/","publishdate":"2025-01-17T09:54:31.392268Z","relpermalink":"/publication/murillo-2024-thorough/","section":"publication","summary":"Add the full text or supplementary notes for the publication here using Markdown formatting.\n","tags":[],"title":"A Thorough Cybersecurity Dataset for Intrusion Detection in Smart Water Networks","type":"publication"},{"authors":["Taekkyung Oh","Sangwook Bae","Junho Ahn","Yonghwa Lee","Dinh-Tuan Hoang","Min Suk Kang","Nils Ole Tippenhauer","Yongdae Kim"],"categories":[],"content":"","date":1704067200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1724741210,"objectID":"c931af9c6e18864769a4c8f8c034641e","permalink":"https://scy-phy.net/publication/oh-24-uncooperative/","publishdate":"2024-08-27T06:46:50.823184Z","relpermalink":"/publication/oh-24-uncooperative/","section":"publication","summary":"","tags":[],"title":"Enabling Uncooperative Physical Localization in Cellular Networks","type":"publication"},{"authors":["Andrei Bytes","Prashant Hari Narayan Rajput","Constantine Doumanidis","Nils Ole Tippenhauer","Michail Maniatakos","Jianying Zhou"],"categories":[],"content":"","date":1696118400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1724738048,"objectID":"31528a2a6dc3cec34db8373dcac1f169","permalink":"https://scy-phy.net/publication/bytes-23-ffuzz/","publishdate":"2024-08-27T05:54:08.818401Z","relpermalink":"/publication/bytes-23-ffuzz/","section":"publication","summary":"","tags":[],"title":"FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network","type":"publication"},{"authors":["Tim Walita","Alessandro, Erba","John H. Castellanos","Nils Ole Tippenhauer"],"categories":[],"content":"","date":1688169600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1683135958,"objectID":"64201828354c6907d350095f8ce282fa","permalink":"https://scy-phy.net/publication/walita-23-blind/","publishdate":"2023-05-03T17:45:58.361249Z","relpermalink":"/publication/walita-23-blind/","section":"publication","summary":"","tags":[],"title":"Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks","type":"publication"},{"authors":["Till Schlüter","Amit Choudhari","Lorenz Hetterich","Leon Trampert","Hamed Nemati","Ahmad Ibrahim","Michael Schwarz","Christian Rossow","Nils Ole Tippenhauer"],"categories":[],"content":"","date":1688169600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1724738049,"objectID":"b9ea6b8162dbd9d8adf7a243a4b86ac9","permalink":"https://scy-phy.net/publication/schluter-23-fetchbench/","publishdate":"2024-08-27T05:54:08.977669Z","relpermalink":"/publication/schluter-23-fetchbench/","section":"publication","summary":"","tags":[],"title":"FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers","type":"publication"},{"authors":["S. Banerjee","S. D. Galbraith","T. Khan","John H. Castellanos","G. Russello"],"categories":[],"content":"","date":1688169600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1683135958,"objectID":"6eec26efdff6e961c469727113bcc766","permalink":"https://scy-phy.net/publication/banerjee-23-preventing/","publishdate":"2023-05-03T17:45:58.361249Z","relpermalink":"/publication/banerjee-23-preventing/","section":"publication","summary":"","tags":[],"title":"Preventing Reverse Engineering of Control Programs in Industrial Control Systems","type":"publication"},{"authors":["Aolin Ding","Matthew Chan","Amin Hassanzadeh","Nils Ole Tippenhauer","Shiqing Ma","Saman Zonouz"],"categories":[],"content":"","date":1672531200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1683135958,"objectID":"c4e162c57daa2d9e087d6113ee4574f8","permalink":"https://scy-phy.net/publication/ding-23-robotic/","publishdate":"2023-05-03T17:45:58.230024Z","relpermalink":"/publication/ding-23-robotic/","section":"publication","summary":"","tags":[],"title":"Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicle","type":"publication"},{"authors":["Davide Berardi","Nils Ole Tippenhauer","Andrea Melis","Marco Prandini","Franco Callegati"],"categories":[],"content":"","date":1672531200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1724738048,"objectID":"df034009a0cfd0cb4ff7a922a4a34997","permalink":"https://scy-phy.net/publication/berardi-23-time/","publishdate":"2024-08-27T05:54:06.691208Z","relpermalink":"/publication/berardi-23-time/","section":"publication","summary":"","tags":[],"title":"Time sensitive networking security: issues of precision time protocol and its implementation","type":"publication"},{"authors":["Alessandro Erba","Nils Ole Tippenhauer"],"categories":[],"content":"","date":1672531200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1724738048,"objectID":"56c69cec431d05b488ee30303a1d815a","permalink":"https://scy-phy.net/publication/erba-23-whitebox/","publishdate":"2024-08-27T05:54:08.657268Z","relpermalink":"/publication/erba-23-whitebox/","section":"publication","summary":"","tags":[],"title":"White-box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems","type":"publication"},{"authors":["Aditya Mathur","Sridhar Adepu","Siddhant Shrivastava","Myat Aung Kaung","Nils Tippenhauer","Giedre Sabaliauskaite"],"categories":[],"content":"","date":1659312000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1674810267,"objectID":"772d4bd0b9dcf8d640aeb42575ce40b8","permalink":"https://scy-phy.net/publication/mathur-2022-defense/","publishdate":"2023-01-27T09:04:27.185672Z","relpermalink":"/publication/mathur-2022-defense/","section":"publication","summary":"","tags":[],"title":"Defense system and method against cyber-physical attacks","type":"publication"},{"authors":["Yi Han","Matthew Chan","Zahra Aref","Nils Ole Tippenhauer","Saman Zonouz"],"categories":[],"content":"","date":1659312000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1647595605,"objectID":"3837b50a1c8fdc5e748b753a703f94d8","permalink":"https://scy-phy.net/publication/han-22-hiding/","publishdate":"2022-03-18T09:26:45.300487Z","relpermalink":"/publication/han-22-hiding/","section":"publication","summary":"","tags":[],"title":"Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring","type":"publication"},{"authors":["Xueou Wang","Xiaolu Hou","Ruben Rios","Nils Ole Tippenhauer","Martín Ochoa"],"categories":[],"content":"","date":1646092800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1647595605,"objectID":"dce67df2377f5a00302d5a20e8593c87","permalink":"https://scy-phy.net/publication/wang-22-constrained/","publishdate":"2022-03-18T09:26:45.551649Z","relpermalink":"/publication/wang-22-constrained/","section":"publication","summary":"","tags":[],"title":"Constrained Proximity Attacks on Mobile Targets","type":"publication"},{"authors":["Alessandro Erba","Nils Ole Tippenhauer"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1666078988,"objectID":"74b0b2e84dbb50f07970452584ef56db","permalink":"https://scy-phy.net/publication/erba-2022-modelfree/","publishdate":"2022-10-18T07:43:07.943471Z","relpermalink":"/publication/erba-2022-modelfree/","section":"publication","summary":"","tags":[],"title":"Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks","type":"publication"},{"authors":["Daniele Antonioli","Nils Ole Tippenhauer","Kasper Rasmussen","Mathias Payer"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1647595605,"objectID":"7d37f6926c14c55aabc1344402dd9c4c","permalink":"https://scy-phy.net/publication/antonioli-22-blurtooth/","publishdate":"2022-03-18T09:26:45.471168Z","relpermalink":"/publication/antonioli-22-blurtooth/","section":"publication","summary":"","tags":[],"title":"Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy","type":"publication"},{"authors":["Herson Esquivel-Vargas","John Henry Castellanos","Marco Caselli","Nils Ole Tippenhauer","Andreas Peter"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1724738048,"objectID":"d5e4c06b302ab3e1112ffaf7a835cb13","permalink":"https://scy-phy.net/publication/esquivel-2022-identifying/","publishdate":"2024-08-27T05:54:08.475449Z","relpermalink":"/publication/esquivel-2022-identifying/","section":"publication","summary":"","tags":[],"title":"Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge","type":"publication"},{"authors":["Ahmad Ibrahim","Hamed Nemati","Till Schlüter","Nils Ole Tippenhauer","Christian Rossow"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1666078987,"objectID":"f995e687f4bfbd4d5da328eec84c2f4e","permalink":"https://scy-phy.net/publication/ibrahim-22-templates/","publishdate":"2022-10-18T07:43:06.659112Z","relpermalink":"/publication/ibrahim-22-templates/","section":"publication","summary":"","tags":[],"title":"Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels","type":"publication"},{"authors":["Alessandro Erba","Anne Müller","Nils Ole Tippenhauer"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1674810267,"objectID":"4e73a7658383d862cf1468f11a939c13","permalink":"https://scy-phy.net/publication/erba-22-opcua/","publishdate":"2023-01-27T09:04:27.279724Z","relpermalink":"/publication/erba-22-opcua/","section":"publication","summary":"","tags":[],"title":"Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems","type":"publication"},{"authors":["Jianliang Wu","Ruoyu Wu","Daniele Antonioli","Mathias Payer","Nils Ole Tippenhauer","Dongyan Xu","Dave (Jing) Tian","Antonio Bianchi"],"categories":[],"content":"","date":1627776000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1611305885,"objectID":"7638b99ea56c2d8ec5b9aaf2a9e930a4","permalink":"https://scy-phy.net/publication/wu-21-lightblue/","publishdate":"2021-01-22T08:58:05.106876Z","relpermalink":"/publication/wu-21-lightblue/","section":"publication","summary":"","tags":[],"title":"LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks","type":"publication"},{"authors":["Giovanni Barbieri","Mauro Conti","Nils Ole Tippenhauer","Federico Turrin"],"categories":[],"content":"","date":1625097600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1628151949,"objectID":"dddaa488aba1bc3b95af3d4fa8026fb9","permalink":"https://scy-phy.net/publication/barbieri-21-assessing/","publishdate":"2021-08-05T08:25:49.475287Z","relpermalink":"/publication/barbieri-21-assessing/","section":"publication","summary":"","tags":[],"title":"Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis","type":"publication"},{"authors":["Nils Ole Tippenhauer"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1628151949,"objectID":"859393b5d3f4f86a70f2fd53eb01cde1","permalink":"https://scy-phy.net/publication/tippenhauer-2021-detection/","publishdate":"2021-08-05T08:25:49.24638Z","relpermalink":"/publication/tippenhauer-2021-detection/","section":"publication","summary":"","tags":[],"title":"Attack Detection for CPS","type":"publication"},{"authors":["Anas Alsoliman","Giulio Rigoni","Marco Levorato","Cristina M. Pinotti","Nils Ole Tippenhauer","Mauro Conti"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1647595605,"objectID":"649ada5d8a3f35b090a88f76eb6d7e68","permalink":"https://scy-phy.net/publication/alsoliman-21-drone/","publishdate":"2022-03-18T09:26:45.388796Z","relpermalink":"/publication/alsoliman-21-drone/","section":"publication","summary":"","tags":[],"title":"COTS Drone Detection using Video Streaming Characteristics","type":"publication"},{"authors":["Anas Alsoliman","Giulio Rigoni","Marco Levorato","Cristina Pinotti","Nils Ole Tippenhauer","Mauro Conti"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1611305885,"objectID":"6d795da6a7130158ec8f7ec893474ac7","permalink":"https://scy-phy.net/publication/alsoliman-21-drones/","publishdate":"2021-01-22T08:58:05.179145Z","relpermalink":"/publication/alsoliman-21-drones/","section":"publication","summary":"","tags":[],"title":"COTS Drone Detection Using Video Streaming Characteristics","type":"publication"},{"authors":["Nils Ole Tippenhauer","Binbin Chen","Daisuke Mashima","David M. Nicol"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1650697663,"objectID":"79e09f8b0eca1d679dbf8bbc4b7392c0","permalink":"https://scy-phy.net/publication/tippenhauer-21-vbump/","publishdate":"2022-04-23T07:07:43.747952Z","relpermalink":"/publication/tippenhauer-21-vbump/","section":"publication","summary":"","tags":[],"title":"vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation","type":"publication"},{"authors":["Alessandro Erba","Riccardo Taormina","Stefano Galelli","Marcello Pogliani","Michele Carminati","Stefano Zanero","Nils Ole Tippenhauer"],"categories":[],"content":"","date":1607299200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1604130273,"objectID":"20588498aa38aaf82e086a0b29313278","permalink":"https://scy-phy.net/publication/erba-2020-concealment/","publishdate":"2020-10-07T18:37:45.112796Z","relpermalink":"/publication/erba-2020-concealment/","section":"publication","summary":"","tags":[],"title":"Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems","type":"publication"},{"authors":["Till Schlüter","Kerstin Lemke-Rust"],"categories":null,"content":"","date":1605657600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1605657600,"objectID":"7f024517d29cd8aa78e6782e0caab5f5","permalink":"https://scy-phy.net/publication/schlueter-20-differential/","publishdate":"2020-10-18T09:56:44.766327Z","relpermalink":"/publication/schlueter-20-differential/","section":"publication","summary":"","tags":null,"title":"Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers","type":"publication"},{"authors":["Federico Turrin","Alessandro Erba","Nils Ole Tippenhauer","Mauro Conti"],"categories":[],"content":"","date":1604880000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1604130876,"objectID":"5705d48a058c0255298614eb99145e50","permalink":"https://scy-phy.net/publication/turrin-20-analysis/","publishdate":"2020-10-31T07:54:36.773536Z","relpermalink":"/publication/turrin-20-analysis/","section":"publication","summary":"","tags":[],"title":"A Statistical Analysis Framework for ICS Process Datasets","type":"publication"},{"authors":["Daniele Antonioli","Nils Ole Tippenhauer","Kasper Rasmussen"],"categories":null,"content":"","date":1589760000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1589760000,"objectID":"534d89454fdbb5497766adfac39b870a","permalink":"https://scy-phy.net/publication/antonioli-20-bias/","publishdate":"2020-03-26T09:56:44.766327Z","relpermalink":"/publication/antonioli-20-bias/","section":"publication","summary":"","tags":null,"title":"BIAS: Bluetooth Impersonation AttackS","type":"publication"},{"authors":["Nils Ole Tippenhauer","Rajib Ranjan Maiti","Siby Sandra","Ragav Sridharan"],"categories":null,"content":"","date":1580515200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1580515200,"objectID":"9d9d7b2298ae9af89279ce8c26b139fc","permalink":"https://scy-phy.net/publication/tippenhauer-20-apparatus/","publishdate":"2020-04-18T18:37:45.112329Z","relpermalink":"/publication/tippenhauer-20-apparatus/","section":"publication","summary":"","tags":null,"title":"Apparatus and method for monitoring a wireless network","type":"publication"},{"authors":["Andres Murillo","Riccardo Taormina","Nils Tippenhauer","Stefano Galelli"],"categories":[],"content":"","date":1577836800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1628151949,"objectID":"e4df435d1f14d0a6ca8e8a94151f0a23","permalink":"https://scy-phy.net/publication/murillo-20-cosimulating/","publishdate":"2021-08-05T08:25:49.362255Z","relpermalink":"/publication/murillo-20-cosimulating/","section":"publication","summary":"","tags":[],"title":"Co-Simulating Physical Processes and Network Data for High-Fidelity Cyber-Security Experiments","type":"publication"},{"authors":["Carmela Troncoso","Mathias Payer","Jean-Pierre Hubaux","Marcel Salathé","James Larus","Edouard Bugnion","Wouter Lueks","Theresa Stadler","Apostolos Pyrgelis","Daniele Antonioli","Ludovic Barman","Sylvain Chatel","Kenneth Paterson","Srdjan Čapkun","David Basin","Jan Beutel","Dennis Jackson","Marc Roeschlin","Patrick Leu","Bart Preneel","Nigel Smart","Aysajan Abidin","Seda Gürses","Michael Veale","Cas Cremers","Michael Backes","Nils Ole Tippenhauer","Reuben Binns","Ciro Cattuto","Alain Barrat","Dario Fiore","Manuel Barbosa","Rui Oliveira","José Pereira"],"categories":[],"content":"","date":1577836800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1611305885,"objectID":"4911d2395f35d6af9b0d8e1afa97e784","permalink":"https://scy-phy.net/publication/troncoso-2020-decentralized/","publishdate":"2021-01-22T08:58:04.999975Z","relpermalink":"/publication/troncoso-2020-decentralized/","section":"publication","summary":"","tags":[],"title":"Decentralized Privacy-Preserving Proximity Tracing","type":"publication"},{"authors":["Daniele Antonioli","Nils Ole Tippenhauer","Kasper Rasmussen"],"categories":null,"content":"","date":1577836800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1577836800,"objectID":"6995c121e9057c6f7340fe7fa61ee898","permalink":"https://scy-phy.net/publication/antonioli-20-tops/","publishdate":"2020-04-18T18:37:45.112796Z","relpermalink":"/publication/antonioli-20-tops/","section":"publication","summary":"","tags":null,"title":"Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy","type":"publication"},{"authors":["Hamid Reza Ghaeini","Matthew Chan","Raad Bahmani","Ferdinand Brasser and","Luis Garcia","Jianying Zhou","Ahmad-Reza Sadeghi","Nils Ole Tippenhauer","Saman Zonouz"],"categories":null,"content":"","date":1567296000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1567296000,"objectID":"f6f21ae1e275c087015968ee37c30414","permalink":"https://scy-phy.net/publication/ghaeini-19-patt/","publishdate":"2019-12-12T14:23:31.278993Z","relpermalink":"/publication/ghaeini-19-patt/","section":"publication","summary":"In this work, we present PAtt, a system that combines remote software attestation with control process validation. PAtt leverages operation permutations -- subtle changes in the operation sequences based on integrity measurements -- which do not affect the physical process but yield unique traces ofsensor readings during execution. By encoding integrity measurements of the PLC’s memory state (software and data) into its control operation, our system allows us to remotely verifythe integrity of the control logic based on the resulting sensor traces.","tags":["Source Themes"],"title":"PAtt: Physics-based Attestation of Control Systems","type":"publication"},{"authors":["Daniele Antonioli","Nils Ole Tippenhauer","Kasper Rasmussen"],"categories":null,"content":"","date":1564617600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1564617600,"objectID":"5eee0b4911edc822449cf45069b2d336","permalink":"https://scy-phy.net/publication/antonioli-19-knob/","publishdate":"2019-12-13T13:56:44.766327Z","relpermalink":"/publication/antonioli-19-knob/","section":"publication","summary":"","tags":null,"title":"The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR","type":"publication"},{"authors":["Dominik Breitenbacher","Ivan Homoliak","Yan Lin Aung","Nils Ole Tippenhauer","Yuval Elovici"],"categories":null,"content":"","date":1561939200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1561939200,"objectID":"75362a370641b71de9ea94dd1a2475cc","permalink":"https://scy-phy.net/publication/breitenbacher-19-hades/","publishdate":"2019-12-12T14:23:31.278367Z","relpermalink":"/publication/breitenbacher-19-hades/","section":"publication","summary":"","tags":null,"title":"HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices","type":"publication"},{"authors":["Jairo Giraldo","David Urbina","Alvaro Cárdenas","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1559347200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1559347200,"objectID":"ae51e2eeaafbde39e804b45a70eacd5e","permalink":"https://scy-phy.net/publication/giraldo-19-hide/","publishdate":"2019-12-12T14:23:31.278147Z","relpermalink":"/publication/giraldo-19-hide/","section":"publication","summary":"","tags":null,"title":"Hide and Seek: An Architecture for Improving Attack Visibility in Industrial Control Systems","type":"publication"},{"authors":["Amit Tambe","Yan Lin Aung","Ragav Sridharan","Martin Ochoa","Nils Ole Tippenhauer","Asaf Shabtai","Yuval Elovici"],"categories":null,"content":"","date":1551398400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1551398400,"objectID":"bc2690cf99cb154b3b2751952a176605","permalink":"https://scy-phy.net/publication/tambe-19-vpn/","publishdate":"2019-12-12T14:23:31.277724Z","relpermalink":"/publication/tambe-19-vpn/","section":"publication","summary":"","tags":null,"title":"Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots","type":"publication"},{"authors":["Daniele Antonioli","Nils Ole Tippenhauer","Kasper Rasmussen"],"categories":null,"content":"","date":1548979200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1548979200,"objectID":"bce015f234f66af8af91dfa31fa3fb10","permalink":"https://scy-phy.net/publication/antonioli-19-nearby/","publishdate":"2019-12-12T14:23:31.277504Z","relpermalink":"/publication/antonioli-19-nearby/","section":"publication","summary":"","tags":null,"title":"Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android","type":"publication"},{"authors":["R. Taormina","S. Galelli","H. C. Douglas","N. O. Tippenhauer","E. Salomons","A. Ostfeld"],"categories":null,"content":"","date":1546300800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1546300800,"objectID":"a0961e7e180b5141f418ef0704c45621","permalink":"https://scy-phy.net/publication/taormina-19-toolbox/","publishdate":"2019-12-12T14:23:31.277952Z","relpermalink":"/publication/taormina-19-toolbox/","section":"publication","summary":"","tags":null,"title":"A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems","type":"publication"},{"authors":["Nils Ole Tippenhauer"],"categories":null,"content":"","date":1546300800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1546300800,"objectID":"8fc97bad7dc455ea13888bb39566fc6d","permalink":"https://scy-phy.net/publication/tippenhauer-2019-design/","publishdate":"2019-12-12T14:23:31.278798Z","relpermalink":"/publication/tippenhauer-2019-design/","section":"publication","summary":"","tags":null,"title":"Design and Realization of Testbeds for Security Research in the Industrial Internet of Things","type":"publication"},{"authors":["Hamid Reza Ghaeini","Nils Ole Tippenhauer","Jianying Zhou"],"categories":null,"content":"","date":1546300800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1546300800,"objectID":"5019b090da8e9c747e7534827db047cd","permalink":"https://scy-phy.net/publication/ghaeini-19-zera/","publishdate":"2019-12-12T14:23:31.279217Z","relpermalink":"/publication/ghaeini-19-zera/","section":"publication","summary":"","tags":["Industrial Control System","Stateful Anomaly Detection","Stealthy Attack"],"title":"Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures","type":"publication"},{"authors":["Xueou Wang","Xiaolu Hou","Ruben Rios","Per Hallgren","Nils Ole Tippenhauer","Martín Ochoa"],"categories":null,"content":"","date":1535760000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1535760000,"objectID":"42320a609506bba1b109ca6f6f26c41b","permalink":"https://scy-phy.net/publication/wang-18-location/","publishdate":"2019-12-12T14:23:31.277276Z","relpermalink":"/publication/wang-18-location/","section":"publication","summary":"","tags":null,"title":"Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies","type":"publication"},{"authors":["Riccardo Taormina","Stefano Galelli","Nils Ole Tippenhauer","Elad Salomons","Avi Ostfeld","Demetrios G. Eliades","Mohsen Aghashahi","Raanju Sundararajan","Mohsen Pourahmadi","M. Katherine Banks","B. M. Brentan","Enrique Campbell","G. Lima","D. Manzi","D. Ayala-Cabrera","M. Herrera","I. Montalvo","J. Izquierdo","Jr, E. Luvizotto","Sarin E. Chandy","Amin Rasekh","Zachary A. Barker","Bruce Campbell","M. Ehsan Shafiee","Marcio Giacomoni","Nikolaos Gatsis","Ahmad Taha","Ahmed A. Abokifa","Kelsey Haddad","Cynthia S. Lo","Pratim Biswas","M. Fayzul K.and Kc, Bijay Pasha","Saravanakumar Lakshmanan Somasundaram","Mashor Housh","Ziv Ohar"],"categories":null,"content":"","date":1533081600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1533081600,"objectID":"b6cf661cf675e428537e869808b69666","permalink":"https://scy-phy.net/publication/taormina-18-battle/","publishdate":"2019-12-12T14:23:31.276132Z","relpermalink":"/publication/taormina-18-battle/","section":"publication","summary":"","tags":null,"title":"The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks","type":"publication"},{"authors":["Jairo Giraldo","David Urbina","Alvaro Cardenas","Junia Valente","Mustafa Faisal","Justin Ruths","Nils Ole Tippenhauer","Henrik Sandberg","Richard Candell"],"categories":null,"content":"","date":1530403200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1530403200,"objectID":"c24524c4adcb05919673907afe7bde11","permalink":"https://scy-phy.net/publication/giraldo-18-survey/","publishdate":"2019-12-12T14:23:31.276832Z","relpermalink":"/publication/giraldo-18-survey/","section":"publication","summary":"","tags":null,"title":"A Survey of Physics-Based Attack Detection in Cyber-Physical Systems","type":"publication"},{"authors":["Ahnaf Siddiqi","Nils Ole Tippenhauer","Daisuke Mashima","Binbin Chen"],"categories":null,"content":"","date":1527811200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1527811200,"objectID":"4ef70000e02f8ffa2e882ffb69747089","permalink":"https://scy-phy.net/publication/siddiqi-18-epic/","publishdate":"2019-12-12T14:23:31.276399Z","relpermalink":"/publication/siddiqi-18-epic/","section":"publication","summary":"","tags":null,"title":"On Practical Threat Scenario Testing in an Electric Power ICS Testbed","type":"publication"},{"authors":["Ragav Sridharan","Rajib Ranjan Maiti","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1527811200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1527811200,"objectID":"0dcd44ae76abf0d8230025fa0944639f","permalink":"https://scy-phy.net/publication/sridharan-18-detection/","publishdate":"2019-12-12T14:23:31.277058Z","relpermalink":"/publication/sridharan-18-detection/","section":"publication","summary":"","tags":null,"title":"WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic","type":"publication"},{"authors":["Aymen Fakhreddine","Nils Ole Tippenhauer","Domenico Giustiniano"],"categories":null,"content":"","date":1525132800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1525132800,"objectID":"0c7f4b3755a557da9c203bab2592d67f","permalink":"https://scy-phy.net/publication/fakhreddine-18-proximity/","publishdate":"2019-12-12T14:23:31.27662Z","relpermalink":"/publication/fakhreddine-18-proximity/","section":"publication","summary":"","tags":null,"title":"Design and Large-Scale Evaluation of WiFi Proximity Metrics","type":"publication"},{"authors":["Hamid Reza Ghaeini","Daniele Antonioli","Ferdinand Brasser","Ahmad-Reza Sadeghi","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1522540800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1522540800,"objectID":"5fe2f5c6b2a52795e72986d2803cf08c","permalink":"https://scy-phy.net/publication/ghaeini-18-stateaware/","publishdate":"2019-12-12T14:23:31.275917Z","relpermalink":"/publication/ghaeini-18-stateaware/","section":"publication","summary":"","tags":null,"title":"State-Aware Anomaly Detection for Industrial Control Systems","type":"publication"},{"authors":["Daniele Antonioli","Hamid Reza Ghaeini","Sridhar Adepu","Martín Ochoa","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1509494400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1509494400,"objectID":"a373997c88f0df4f64e1f16bd76c8e7b","permalink":"https://scy-phy.net/publication/antonioli-17-s-3/","publishdate":"2019-12-12T14:23:31.275456Z","relpermalink":"/publication/antonioli-17-s-3/","section":"publication","summary":"","tags":null,"title":"Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3","type":"publication"},{"authors":["Daniele Antonioli","Sandra Siby","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1509494400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1509494400,"objectID":"23fb0384a34071013cd0a9fa3d03a44c","permalink":"https://scy-phy.net/publication/antonioli-17-eavesdropping/","publishdate":"2019-12-12T14:23:31.275685Z","relpermalink":"/publication/antonioli-17-eavesdropping/","section":"publication","summary":"","tags":null,"title":"Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN","type":"publication"},{"authors":["Rajib Ranjan Maiti","Sandra Siby","Ragav Sridharan","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1504224000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1504224000,"objectID":"8c65697f934cff35006f462cd6c8d3b5","permalink":"https://scy-phy.net/publication/maiti-17-linklayer/","publishdate":"2019-12-12T14:23:31.274806Z","relpermalink":"/publication/maiti-17-linklayer/","section":"publication","summary":"","tags":null,"title":"Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios","type":"publication"},{"authors":["Naman Govil","Anand Agrawal","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1504224000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1504224000,"objectID":"afc59488b517dad98dae6a84f110dbf5","permalink":"https://scy-phy.net/publication/govil-17-ladder/","publishdate":"2019-12-12T14:23:31.27524Z","relpermalink":"/publication/govil-17-ladder/","section":"publication","summary":"","tags":null,"title":"On Ladder Logic Bombs in Industrial Control Systems","type":"publication"},{"authors":["John Henry Castellanos","Daniele Antonioli","Nils Ole Tippenhauer","Martín Ochoa"],"categories":null,"content":"","date":1498867200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1498867200,"objectID":"43a6198c6c7374155046bee603f54202","permalink":"https://scy-phy.net/publication/castellanos-17-legacy/","publishdate":"2019-12-12T14:23:31.274589Z","relpermalink":"/publication/castellanos-17-legacy/","section":"publication","summary":"","tags":null,"title":"Legacy-Compliant Data Authentication for Industrial Control System Traffic","type":"publication"},{"authors":["Nils Ole Tippenhauer"],"categories":null,"content":"","date":1498867200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1498867200,"objectID":"c1ef8874e3987ed02c8b50b33eeb5d8c","permalink":"https://scy-phy.net/publication/tippenhauer-17-digma/","publishdate":"2019-12-12T14:23:31.275023Z","relpermalink":"/publication/tippenhauer-17-digma/","section":"publication","summary":"","tags":null,"title":"Messmanipulationen in Steuerungssystemen","type":"publication"},{"authors":["Sandra Siby","Rajib Ranjan Maiti","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1491004800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1491004800,"objectID":"721a1d60c39a7debbfbf529a597a9a7b","permalink":"https://scy-phy.net/publication/siby-17-iotscannershort/","publishdate":"2019-12-12T14:23:31.274374Z","relpermalink":"/publication/siby-17-iotscannershort/","section":"publication","summary":"","tags":null,"title":"IoTScanner: Detecting Privacy Threats in IoT Neighborhoods","type":"publication"},{"authors":["Yair Meidan","Michael Bohadana","Asaf Shabtai","Juan-David Guarnizo","Martín Ochoa","Nils Ole Tippenhauer","Yuval Elovici"],"categories":null,"content":"","date":1491004800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1491004800,"objectID":"6ae184928109766e816b9f655418ed33","permalink":"https://scy-phy.net/publication/meidan-17-profiliot/","publishdate":"2019-12-12T14:23:31.27348Z","relpermalink":"/publication/meidan-17-profiliot/","section":"publication","summary":"","tags":null,"title":"ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis (Poster)","type":"publication"},{"authors":["Juan Guarnizo","Amit Tambe","Suman Sankar Bunia","Martín Ochoa","Nils Ole Tippenhauer","Asaf Shabtai","Yuval Elovici"],"categories":null,"content":"","date":1491004800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1491004800,"objectID":"31c1b2ab04b8f8b6abc05199525348b7","permalink":"https://scy-phy.net/publication/guarnizo-17-siphon/","publishdate":"2019-12-12T14:23:31.274146Z","relpermalink":"/publication/guarnizo-17-siphon/","section":"publication","summary":"","tags":null,"title":"SIPHON: Towards Scalable High-Interaction Physical Honeypots","type":"publication"},{"authors":["Marco Rocchetto","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1491004800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1491004800,"objectID":"6bab5f89f84d07cdaee7571e5f05b455","permalink":"https://scy-phy.net/publication/towards-17-rocchetto/","publishdate":"2019-12-12T14:23:31.273933Z","relpermalink":"/publication/towards-17-rocchetto/","section":"publication","summary":"","tags":null,"title":"Towards Formal Security Analysis of Industrial Control Systems","type":"publication"},{"authors":["Erik Wilhelm","Don MacKenzie","Yuren Zhou","Lynette Cheah","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1483228800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1483228800,"objectID":"e12013cfb18b258e397209eaabcccb5f","permalink":"https://scy-phy.net/publication/wilhelm-17-evaluation/","publishdate":"2019-12-12T14:23:31.273266Z","relpermalink":"/publication/wilhelm-17-evaluation/","section":"publication","summary":"","tags":null,"title":"Evaluation of transport mode using wearable sensor data from 43,000 students","type":"publication"},{"authors":["Sandra Siby","Rajib Ranjan Maiti","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1483228800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1483228800,"objectID":"a8955baa05a89a3a89ea8060c40cadeb","permalink":"https://scy-phy.net/publication/siby-17-iotscanner/","publishdate":"2019-12-12T14:23:31.273708Z","relpermalink":"/publication/siby-17-iotscanner/","section":"publication","summary":"","tags":null,"title":"IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods","type":"publication"},{"authors":["Shachar Siboni","Asaf Shabtai","Nils Ole Tippenhauer","Jemin Lee","Yuval Elovici"],"categories":null,"content":"","date":1480550400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1480550400,"objectID":"a742280e4f832242e9868e1dfb5af30e","permalink":"https://scy-phy.net/publication/siboni-16-testbed/","publishdate":"2019-12-12T14:23:31.272213Z","relpermalink":"/publication/siboni-16-testbed/","section":"publication","summary":"","tags":null,"title":"Advanced Security Testbed Framework for Wearable IoT Devices","type":"publication"},{"authors":["Kai Jansen","Nils Ole Tippenhauer","Christina Pöpper"],"categories":null,"content":"","date":1480550400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1480550400,"objectID":"01c48312a1e9e5b00a6c75d340c59670","permalink":"https://scy-phy.net/publication/jansen-16-gps/","publishdate":"2019-12-12T14:23:31.271533Z","relpermalink":"/publication/jansen-16-gps/","section":"publication","summary":"","tags":null,"title":"Multi-Receiver GPS Spoofing Detection: Error Models and Realization","type":"publication"},{"authors":["Nils Ole Tippenhauer","Kasper Bonne Rasmussen","Srdjan Capkun"],"categories":null,"content":"","date":1477958400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1477958400,"objectID":"182a17a6c13ff8503757aa9c81e05072","permalink":"https://scy-phy.net/publication/tippenhauer-16-integrity/","publishdate":"2019-12-12T14:23:31.269533Z","relpermalink":"/publication/tippenhauer-16-integrity/","section":"publication","summary":"","tags":null,"title":"Physical-Layer Integrity for Wireless Messages","type":"publication"},{"authors":["Erik Wilhelm","Sandra Siby","Yuren Zhou","Xavier J. S. Ashok","Melani Jayasuriya","Shaohui Foong","Jacksheeng Kee","Kristin Wood","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1477958400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1477958400,"objectID":"6b204505686ecb355205f72da39db2f8","permalink":"https://scy-phy.net/publication/wilhelm-16-wearable/","publishdate":"2019-12-12T14:23:31.271755Z","relpermalink":"/publication/wilhelm-16-wearable/","section":"publication","summary":"","tags":null,"title":"Wearable Environmental Sensors and Infrastructure for Mobile Large-scale Urban Deployment","type":"publication"},{"authors":["Marco Rocchetto","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1475280000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1475280000,"objectID":"e13603b0d4d752d036a6b2d003be7e75","permalink":"https://scy-phy.net/publication/rocchetto-16-cpdy/","publishdate":"2019-12-12T14:23:31.272435Z","relpermalink":"/publication/rocchetto-16-cpdy/","section":"publication","summary":"","tags":null,"title":"CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions","type":"publication"},{"authors":["Hamid Ghaeini","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1475280000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1475280000,"objectID":"c9ac46311796e78a944c0b2e69d015f1","permalink":"https://scy-phy.net/publication/ghaeini-16-hamids/","publishdate":"2019-12-12T14:23:31.272863Z","relpermalink":"/publication/ghaeini-16-hamids/","section":"publication","summary":"","tags":null,"title":"HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems","type":"publication"},{"authors":["David Urbina","Jairo Giraldo","Alvaro A. Cardenas","Nils Ole Tippenhauer","Junia Valente","Mustafa Faisal","Justin Ruths","Richard Candell","Henrik Sandberg"],"categories":null,"content":"","date":1475280000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1475280000,"objectID":"96b6e25561340472295d02f5ccf637cd","permalink":"https://scy-phy.net/publication/urbina-16-limiting/","publishdate":"2019-12-12T14:23:31.271989Z","relpermalink":"/publication/urbina-16-limiting/","section":"publication","summary":"","tags":null,"title":"Limiting The Impact of Stealthy Attacks on Industrial Control Systems","type":"publication"},{"authors":["Daniele Antonioli","Anand Agrawal","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1475280000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1475280000,"objectID":"3d4a14ca0217a3b20fccc51aedce77d8","permalink":"https://scy-phy.net/publication/antonioli-16-towards/","publishdate":"2019-12-12T14:23:31.272649Z","relpermalink":"/publication/antonioli-16-towards/","section":"publication","summary":"","tags":null,"title":"Towards High-Interaction Virtual ICS Honeypots-in-a-Box","type":"publication"},{"authors":["Marco Rocchetto","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1472688000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1472688000,"objectID":"0140f28f3ad7f6b95f67b6233d341c2d","permalink":"https://scy-phy.net/publication/rocchetto-16-models/","publishdate":"2019-12-12T14:23:31.269299Z","relpermalink":"/publication/rocchetto-16-models/","section":"publication","summary":"","tags":null,"title":"On Attacker Models and Profiles for Cyber-Physical Systems","type":"publication"},{"authors":["Xinshu Dong","Sumeet Jauhar","William G. Temple","Binbin Chen","Zbigniew Kalbarczyk","William H. Sanders","Nils Ole Tippenhauer","David M. Nicol"],"categories":null,"content":"","date":1464739200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1464739200,"objectID":"959625153878f55d27f337c7099637c2","permalink":"https://scy-phy.net/publication/dong-16-cissa/","publishdate":"2019-12-12T14:23:31.269756Z","relpermalink":"/publication/dong-16-cissa/","section":"publication","summary":"","tags":null,"title":"The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment","type":"publication"},{"authors":["Riccardo Taormina","Stefano Galelli","Nils Ole Tippenhauer","Elad Salomons","Avi Ostfeld"],"categories":null,"content":"","date":1462060800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1462060800,"objectID":"9acbdd7018bad0e6b8cc4c662341f3ef","permalink":"https://scy-phy.net/publication/taormina-16-assessing/","publishdate":"2019-12-12T14:23:31.270202Z","relpermalink":"/publication/taormina-16-assessing/","section":"publication","summary":"","tags":null,"title":"Assessing the effect of cyber-physical attacks on water distribution systems","type":"publication"},{"authors":null,"categories":null,"content":"","date":1461715200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1461715200,"objectID":"d1311ddf745551c9e117aa4bb7e28516","permalink":"https://scy-phy.net/project/external-project/","publishdate":"2016-04-27T00:00:00Z","relpermalink":"/project/external-project/","section":"project","summary":"An example of linking directly to an external project website using `external_link`.","tags":["Demo"],"title":"External Project","type":"project"},{"authors":null,"categories":null,"content":"Lorem ipsum dolor sit amet, consectetur adipiscing elit. Duis posuere tellus ac convallis placerat. Proin tincidunt magna sed ex sollicitudin condimentum. Sed ac faucibus dolor, scelerisque sollicitudin nisi. Cras purus urna, suscipit quis sapien eu, pulvinar tempor diam. Quisque risus orci, mollis id ante sit amet, gravida egestas nisl. Sed ac tempus magna. Proin in dui enim. Donec condimentum, sem id dapibus fringilla, tellus enim condimentum arcu, nec volutpat est felis vel metus. Vestibulum sit amet erat at nulla eleifend gravida.\nNullam vel molestie justo. Curabitur vitae efficitur leo. In hac habitasse platea dictumst. Sed pulvinar mauris dui, eget varius purus congue ac. Nulla euismod, lorem vel elementum dapibus, nunc justo porta mi, sed tempus est est vel tellus. Nam et enim eleifend, laoreet sem sit amet, elementum sem. Morbi ut leo congue, maximus velit ut, finibus arcu. In et libero cursus, rutrum risus non, molestie leo. Nullam congue quam et volutpat malesuada. Sed risus tortor, pulvinar et dictum nec, sodales non mi. Phasellus lacinia commodo laoreet. Nam mollis, erat in feugiat consectetur, purus eros egestas tellus, in auctor urna odio at nibh. Mauris imperdiet nisi ac magna convallis, at rhoncus ligula cursus.\nCras aliquam rhoncus ipsum, in hendrerit nunc mattis vitae. Duis vitae efficitur metus, ac tempus leo. Cras nec fringilla lacus. Quisque sit amet risus at ipsum pharetra commodo. Sed aliquam mauris at consequat eleifend. Praesent porta, augue sed viverra bibendum, neque ante euismod ante, in vehicula justo lorem ac eros. Suspendisse augue libero, venenatis eget tincidunt ut, malesuada at lorem. Donec vitae bibendum arcu. Aenean maximus nulla non pretium iaculis. Quisque imperdiet, nulla in pulvinar aliquet, velit quam ultrices quam, sit amet fringilla leo sem vel nunc. Mauris in lacinia lacus.\nSuspendisse a tincidunt lacus. Curabitur at urna sagittis, dictum ante sit amet, euismod magna. Sed rutrum massa id tortor commodo, vitae elementum turpis tempus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean purus turpis, venenatis a ullamcorper nec, tincidunt et massa. Integer posuere quam rutrum arcu vehicula imperdiet. Mauris ullamcorper quam vitae purus congue, quis euismod magna eleifend. Vestibulum semper vel augue eget tincidunt. Fusce eget justo sodales, dapibus odio eu, ultrices lorem. Duis condimentum lorem id eros commodo, in facilisis mauris scelerisque. Morbi sed auctor leo. Nullam volutpat a lacus quis pharetra. Nulla congue rutrum magna a ornare.\nAliquam in turpis accumsan, malesuada nibh ut, hendrerit justo. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Quisque sed erat nec justo posuere suscipit. Donec ut efficitur arcu, in malesuada neque. Nunc dignissim nisl massa, id vulputate nunc pretium nec. Quisque eget urna in risus suscipit ultricies. Pellentesque odio odio, tincidunt in eleifend sed, posuere a diam. Nam gravida nisl convallis semper elementum. Morbi vitae felis faucibus, vulputate orci placerat, aliquet nisi. Aliquam erat volutpat. Maecenas sagittis pulvinar purus, sed porta quam laoreet at.\n","date":1461715200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1461715200,"objectID":"8f66d660a9a2edc2d08e68cc30f701f7","permalink":"https://scy-phy.net/project/internal-project/","publishdate":"2016-04-27T00:00:00Z","relpermalink":"/project/internal-project/","section":"project","summary":"An example of using the in-built project page.","tags":["Deep Learning"],"title":"Internal Project","type":"project"},{"authors":["Aditya Mathur","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1459468800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1459468800,"objectID":"f96d5ccdb8e6b1674f1d7b839bf8ec92","permalink":"https://scy-phy.net/publication/mathur-16-swat/","publishdate":"2019-12-12T14:23:31.270646Z","relpermalink":"/publication/mathur-16-swat/","section":"publication","summary":"","tags":null,"title":"SWaT: A Water Treatment Testbed for Research and Training on ICS Security","type":"publication"},{"authors":["Nils Ole Tippenhauer","Martín Ochoa","Aditya Mathur"],"categories":null,"content":"","date":1459468800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1459468800,"objectID":"58416331ee8c80c11a4c4d50eb793cee","permalink":"https://scy-phy.net/publication/tippenhauer-16-testbeds/","publishdate":"2019-12-12T14:23:31.270425Z","relpermalink":"/publication/tippenhauer-16-testbeds/","section":"publication","summary":"","tags":null,"title":"Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures","type":"publication"},{"authors":["David Urbina","Jairo Giraldo","Nils Ole Tippenhauer","Alvaro Cárdenas"],"categories":null,"content":"","date":1451606400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1451606400,"objectID":"bbf3bb6fd947a40bac38b7ef6cca76ee","permalink":"https://scy-phy.net/publication/urbina-16-fieldbus/","publishdate":"2019-12-12T14:23:31.270875Z","relpermalink":"/publication/urbina-16-fieldbus/","section":"publication","summary":"","tags":null,"title":"Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed","type":"publication"},{"authors":["Riccardo Taormina","Stefano Galelli","Nils Ole Tippenhauer","Elad Salomons","Avi Ostfeld"],"categories":null,"content":"","date":1451606400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1451606400,"objectID":"10dc2fa7c64edf46210714d1c11186f0","permalink":"https://scy-phy.net/publication/taormina-16-characterizing/","publishdate":"2019-12-12T14:23:31.273078Z","relpermalink":"/publication/taormina-16-characterizing/","section":"publication","summary":"","tags":null,"title":"Characterizing Cyber-Physical Attacks on Water Distribution Systems","type":"publication"},{"authors":["Erik Wilhelm","Nils Ole Tippenhauer","Yuren Zhou","Nan Zhang"],"categories":null,"content":"","date":1451606400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1451606400,"objectID":"637f6e1e75133d1fa7058be58ab712e1","permalink":"https://scy-phy.net/publication/wilhelm-16-sensg/","publishdate":"2019-12-12T14:23:31.271317Z","relpermalink":"/publication/wilhelm-16-sensg/","section":"publication","summary":"","tags":null,"title":"SENSg: Large-Scale Deployment of Wearable Sensors for Trip and Transport Mode Logging","type":"publication"},{"authors":["Riccardo Taormina","Stefano Galelli","Nils Ole Tippenhauer","Elad Salomons","Avi Ostfeld"],"categories":null,"content":"","date":1451606400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1451606400,"objectID":"29131870c79cb55f84080532b4d0725f","permalink":"https://scy-phy.net/publication/taormina-16-simulation/","publishdate":"2019-12-12T14:23:31.271098Z","relpermalink":"/publication/taormina-16-simulation/","section":"publication","summary":"","tags":null,"title":"Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET","type":"publication"},{"authors":["Daniele Antonioli","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1443657600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1443657600,"objectID":"ec1529c6a0ddeeda569b427d56968d0b","permalink":"https://scy-phy.net/publication/antonioli-15-minicps/","publishdate":"2019-12-12T14:23:31.269084Z","relpermalink":"/publication/antonioli-15-minicps/","section":"publication","summary":"","tags":null,"title":"MiniCPS: A toolkit for security research on CPS Networks","type":"publication"},{"authors":["Nils Ole Tippenhauer","Heinrich Luecken","Marc Kuhn","Srdjan Capkun"],"categories":null,"content":"","date":1433116800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1433116800,"objectID":"48fe922fc00fdb42183757db69364daf","permalink":"https://scy-phy.net/publication/tippenhauer-15-uwb/","publishdate":"2019-12-12T14:23:31.268866Z","relpermalink":"/publication/tippenhauer-15-uwb/","section":"publication","summary":"","tags":null,"title":"UWB Rapid-Bit-Exchange System for Distance Bounding","type":"publication"},{"authors":["Nils Ole Tippenhauer","William G. Temple","An Hoa Vu","Binbin Chen","David M. Nicol","Zbigniew Kalbarczyk","William Sanders"],"categories":null,"content":"","date":1414800000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1414800000,"objectID":"513cd2073a3a742b486c0e441820571c","permalink":"https://scy-phy.net/publication/tippenhauer-14-automatic/","publishdate":"2019-12-12T14:23:31.268425Z","relpermalink":"/publication/tippenhauer-14-automatic/","section":"publication","summary":"","tags":null,"title":"Automatic Generation of Security Argument Graphs","type":"publication"},{"authors":["Domenico Giustiniano","Stefan Mangold","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1412121600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1412121600,"objectID":"e8f3efa06639675616288b0be81d9147","permalink":"https://scy-phy.net/publication/giustiniano-2014-visible/","publishdate":"2019-12-12T14:23:31.269989Z","relpermalink":"/publication/giustiniano-2014-visible/","section":"publication","summary":"","tags":null,"title":"Visible light communication with flickering prevention","type":"publication"},{"authors":["An Hoa Vu","Nils Ole Tippenhauer","Binbin Chen","David M. Nicol","Zbigniew Kalbarczyk"],"categories":null,"content":"","date":1409529600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1409529600,"objectID":"422106cb63df69a43e31807db766ecbc","permalink":"https://scy-phy.net/publication/vu-14-cybersage/","publishdate":"2019-12-12T14:23:31.268647Z","relpermalink":"/publication/vu-14-cybersage/","section":"publication","summary":"","tags":null,"title":"CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems","type":"publication"},{"authors":["William G. Temple","Binbin Chen","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1380585600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1380585600,"objectID":"426adf95fa9e34888149df6015218dea","permalink":"https://scy-phy.net/publication/temple-13-delay/","publishdate":"2019-12-12T14:23:31.268025Z","relpermalink":"/publication/temple-13-delay/","section":"publication","summary":"","tags":null,"title":"Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack","type":"publication"},{"authors":["Binbin Chen","Zbigniew Kalbarczyk","David M. Nicol","William H. Sanders","Rui Tan","William G. Temple","Nils Ole Tippenhauer","An Hoa Vu","David K. Y. Yau"],"categories":null,"content":"","date":1356998400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1356998400,"objectID":"d4c7b63a69c297cf747efaa565441c16","permalink":"https://scy-phy.net/publication/chen-13-flow/","publishdate":"2019-12-12T14:23:31.267836Z","relpermalink":"/publication/chen-13-flow/","section":"publication","summary":"","tags":null,"title":"Go with the Flow: Toward Workflow-Oriented Security Assessment","type":"publication"},{"authors":["Nils Ole Tippenhauer","Luka Malisa","Aanjhan Ranganathan","Srdjan Capkun"],"categories":null,"content":"","date":1356998400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1356998400,"objectID":"4cfa783877d25919b381b4662c87ff7c","permalink":"https://scy-phy.net/publication/tippenhauer-2013-limitations/","publishdate":"2019-12-12T14:23:31.268242Z","relpermalink":"/publication/tippenhauer-2013-limitations/","section":"publication","summary":"","tags":null,"title":"On Limitations of Friendly Jamming for Confidentiality","type":"publication"},{"authors":["Domenico Giustiniano","Nils Ole Tippenhauer","Stefan Mangold"],"categories":null,"content":"","date":1351728000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1351728000,"objectID":"2a238654e992c3cf6baed24fecfd3369","permalink":"https://scy-phy.net/publication/giustiniano-12-low/","publishdate":"2019-12-12T14:23:31.267026Z","relpermalink":"/publication/giustiniano-12-low/","section":"publication","summary":"","tags":null,"title":"Low-complexity Visible Light Networking with LED-to-LED communication","type":"publication"},{"authors":["Nils Ole Tippenhauer"],"categories":null,"content":"","date":1330560000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1330560000,"objectID":"3d5f6ea7ca1b50133f7b25356f3838d5","permalink":"https://scy-phy.net/publication/tippenhauer-12-phd/","publishdate":"2019-12-12T14:23:31.267244Z","relpermalink":"/publication/tippenhauer-12-phd/","section":"publication","summary":"","tags":null,"title":"Physical-Layer Security Aspects of Wireless Localization","type":"publication"},{"authors":["Aanjhan Ranganathan","Nils Ole Tippenhauer","Boris Skoric","Dave Singelé","Srdjan Čapkun"],"categories":null,"content":"","date":1325376000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1325376000,"objectID":"a45ae70f1c34db871f9426bb510e4c8d","permalink":"https://scy-phy.net/publication/ranganathan-12-terrorist/","publishdate":"2019-12-12T14:23:31.267458Z","relpermalink":"/publication/ranganathan-12-terrorist/","section":"publication","summary":"","tags":null,"title":"Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System","type":"publication"},{"authors":["Nils Ole Tippenhauer","Domenico Giustiniano","Stefan Mangold"],"categories":null,"content":"","date":1325376000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1325376000,"objectID":"887baa76060dbc7e4b3259f33ad500af","permalink":"https://scy-phy.net/publication/tippenhauer-2012-toys/","publishdate":"2019-12-12T14:23:31.267653Z","relpermalink":"/publication/tippenhauer-2012-toys/","section":"publication","summary":"","tags":null,"title":"Toys communicating with LEDs: Enabling toy cars interaction","type":"publication"},{"authors":["Christina Pöpper","Nils Ole Tippenhauer","Boris Danev","Srdjan Čapkun"],"categories":null,"content":"","date":1293840000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1293840000,"objectID":"9649ebeef989e3b7b5218dc342591c4e","permalink":"https://scy-phy.net/publication/poepper-11-manipulations/","publishdate":"2019-12-12T14:23:31.266841Z","relpermalink":"/publication/poepper-11-manipulations/","section":"publication","summary":"","tags":null,"title":"Investigation of Signal and Message Manipulations on the Wireless Channel","type":"publication"},{"authors":["Nils Ole Tippenhauer","Christina Pöpper","Kasper Bonne Rasmussen","Srdjan Čapkun"],"categories":null,"content":"","date":1293840000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1293840000,"objectID":"489c61cbc80bb1616e05de28c90646a7","permalink":"https://scy-phy.net/publication/tippenhauer-11-gps/","publishdate":"2019-12-12T14:23:31.266649Z","relpermalink":"/publication/tippenhauer-11-gps/","section":"publication","summary":"","tags":null,"title":"On the Requirements for Successful GPS Spoofing Attacks","type":"publication"},{"authors":["Srdjan Čapkun","Mario Čagalj","Ghassan Karame","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1262304000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1262304000,"objectID":"bfc0ca92e4ed8fdbf883fe118f1bca8d","permalink":"https://scy-phy.net/publication/capkun-tmc-10/","publishdate":"2019-12-12T14:23:31.266458Z","relpermalink":"/publication/capkun-tmc-10/","section":"publication","summary":"","tags":null,"title":"Integrity Regions: Authentication Through Presence in Wireless Networks","type":"publication"},{"authors":["Marc Kuhn","Heinrich Luecken","Nils Ole Tippenhauer"],"categories":null,"content":"","date":1262304000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1262304000,"objectID":"848111fc15114448a5ecccc9a6ec9b35","permalink":"https://scy-phy.net/publication/kuhn-10-uwbdb/","publishdate":"2019-12-12T14:23:31.266282Z","relpermalink":"/publication/kuhn-10-uwbdb/","section":"publication","summary":"","tags":null,"title":"UWB Impulse Radio Based Distance Bounding","type":"publication"},{"authors":["Nils Ole Tippenhauer","Kasper Bonne Rasmussen","Christina Pöpper","Srdjan Čapkun"],"categories":null,"content":"","date":1230768000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1230768000,"objectID":"4ec1135a1ec4c0f67fd1de58ed5ff060","permalink":"https://scy-phy.net/publication/tippenhauer-09-attacks/","publishdate":"2019-12-12T14:23:31.266092Z","relpermalink":"/publication/tippenhauer-09-attacks/","section":"publication","summary":"","tags":null,"title":"Attacks on Public WLAN-based Positioning","type":"publication"},{"authors":["Nils Ole Tippenhauer","Srdjan Čapkun"],"categories":null,"content":"","date":1230768000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1230768000,"objectID":"cded4a84664a8287d25cdaec1ae610e1","permalink":"https://scy-phy.net/publication/tippenhauer-09-idbased/","publishdate":"2019-12-12T14:23:31.265896Z","relpermalink":"/publication/tippenhauer-09-idbased/","section":"publication","summary":"","tags":null,"title":"ID-based Secure Distance Bounding and Localization","type":"publication"},{"authors":["Nils Ole Tippenhauer","Kasper Bonne Rasmussen","Christina Pöpper","Srdjan Capkun","Srdjan Capkun","Srdjan Capkun"],"categories":null,"content":"","date":1230768000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1230768000,"objectID":"fc8d14159301c534b04b2b79ada9538d","permalink":"https://scy-phy.net/publication/tippenhauer-2009-iphone/","publishdate":"2019-12-12T14:23:31.265704Z","relpermalink":"/publication/tippenhauer-2009-iphone/","section":"publication","summary":"","tags":null,"title":"iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems","type":"publication"},{"authors":["Nils Ole Tippenhauer","Kasper Bonne Rasmussen","Srdjan Čapkun"],"categories":null,"content":"","date":1230768000,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1230768000,"objectID":"357ae561a0010ab85fe57d877f89c0b6","permalink":"https://scy-phy.net/publication/tippenhauer-09-temp/","publishdate":"2019-12-12T14:23:31.265509Z","relpermalink":"/publication/tippenhauer-09-temp/","section":"publication","summary":"","tags":null,"title":"Secure Ranging With Message Temporal Integrity","type":"publication"},{"authors":["Nils Ole Tippenhauer","Srdjan Čapkun"],"categories":null,"content":"","date":1199145600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1199145600,"objectID":"9f0f402c4b99e1222ff79078300e43c0","permalink":"https://scy-phy.net/publication/tippenhauer-08-uwbsr-tr/","publishdate":"2019-12-12T14:23:31.26526Z","relpermalink":"/publication/tippenhauer-08-uwbsr-tr/","section":"publication","summary":"","tags":null,"title":"UWB-based Secure Ranging and Localization","type":"publication"},{"authors":["Nils Ole Tippenhauer"],"categories":null,"content":"","date":1167609600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1167609600,"objectID":"022073df798098e8fa4ec302a4862408","permalink":"https://scy-phy.net/publication/tippenhauer-07-smartmips/","publishdate":"2019-12-12T14:23:31.264953Z","relpermalink":"/publication/tippenhauer-07-smartmips/","section":"publication","summary":"","tags":null,"title":"Design and Cryptoanalysis of Multi-Precision Arithmetics on Smart Cards with SmartMIPS Architecture","type":"publication"}]