Ivan Martinovic

According to our database1, Ivan Martinovic authored at least 145 papers between 2004 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Generating identities with mixture models for speaker anonymization.
Comput. Speech Lang., 2022

2021
#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones.
ACM Trans. Priv. Secur., 2021

Widen The Backdoor To Let More Attackers In.
CoRR, 2021

Signal Injection Attacks against CCD Image Sensors.
CoRR, 2021

Recurring Turking: Conducting Daily Task Studies on Mechanical Turk.
CoRR, 2021

SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021

Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Plug-and-Play: Framework for Remote Experimentation in Cyber Security.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

In the Same Boat: On Small Satellites, Big Rockets, and Cyber Trust.
Proceedings of the 13th International Conference on Cyber Conflict, 2021

Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses.
Proceedings of the Critical Information Infrastructures Security, 2021

MalPhase: Fine-Grained Malware Detection Using Network Flow Data.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

On Detecting Deception in Space Situational Awareness.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients.
CoRR, 2020

Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020.
CoRR, 2020

SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research.
CoRR, 2020

Understanding Realistic Attacks on Airborne Collision Avoidance Systems.
CoRR, 2020

QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband.
CoRR, 2020

A Tale of Sea and Sky On the Security of Maritime VSAT Communications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Seeing Red: PPG Biometrics Using Smartphone Cameras.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication.
ACM Trans. Priv. Secur., 2019

Classi-Fly: Inferring Aircraft Categories from Open Data.
CoRR, 2019

Safety vs. Security: Attacking Avionic Systems with Humans in the Loop.
CoRR, 2019

On the Applicability of Satellite-Based Air Traffic Control Communication for Security.
IEEE Commun. Mag., 2019

CompactFlow: A Hybrid Binary Format for Network Flow Data.
Proceedings of the Information Security Theory and Practice, 2019

Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging.
Proceedings of the 28th USENIX Security Symposium, 2019

Attacking Speaker Recognition Systems with Phoneme Morphing.
Proceedings of the Computer Security - ESORICS 2019, 2019

The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019

28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Peeves: Physical Event Verification in Smart Homes.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Robust Smartphone App Identification via Encrypted Network Traffic Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2018

MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features.
SIGMETRICS Perform. Evaluation Rev., 2018

Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS).
Proc. Priv. Enhancing Technol., 2018

Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Poster: Tracking Vehicles Through Encrypted Mix-Zones Using Physical Layer Properties.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Nowhere to hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Bionyms: Driver-centric Message Authentication using Biometric Measurements.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

EMPower: Detecting Malicious Power Line Networks from EM Emissions.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Device Pairing at the Touch of an Electrode.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Biomedical signals reconstruction under the compressive sensing approach.
Proceedings of the 7th Mediterranean Conference on Embedded Computing, 2018

Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Surveying Aviation Professionals on the Security of the Air Traffic Control System.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

MalClassifier: Malware family classification using network flow sequence behaviour.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

Utilizing air traffic communications for OSINT on state and government aircraft.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
On Perception and Reality in Wireless Air Traffic Communication Security.
IEEE Trans. Intell. Transp. Syst., 2017

Pulse-Response: Exploring Human Body Impedance for Biometric Recognition.
ACM Trans. Priv. Secur., 2017

Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones.
CoRR, 2017

Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS).
CoRR, 2017

Authentication using pulse-response biometrics.
Commun. ACM, 2017

Using EEG-Based BCI Devices to Subliminally Probe for Private Information.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

There are many apps for that: quantifying the availability of privacy-preserving apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Broken Hearted: How To Attack ECG Biometrics.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

FADEWICH: Fast Deauthentication Over the Wireless Channel.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store.
Proceedings of the Financial Cryptography and Data Security, 2017

Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS.
Proceedings of the Financial Cryptography and Data Security, 2017

Crowdsourcing security for wireless air traffic communications.
Proceedings of the 9th International Conference on Cyber Conflict, 2017

To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

VisAuth: Authentication over a Visual Channel Using an Embedded Image.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Friendly Jamming on Access Points: Analysis and Real-World Measurements.
IEEE Trans. Wirel. Commun., 2016

Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics.
ACM Trans. Priv. Secur., 2016

A Longitudinal Study of App Permission Usage across the Google Play Store.
CoRR, 2016

A Localization Approach for Crowdsourced Air Traffic Communication Networks.
CoRR, 2016

On Perception and Reality in Wireless Air Traffic Communications Security.
CoRR, 2016

TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition.
CoRR, 2016

Generating Secret Keys from Biometric Body Impedance Measurements.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Assessing the impact of aviation security on cyber power.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

DEMO: Starving Permission-Hungry Android Apps Using SecuRank.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Using Reflexive Eye Movements for Fast Challenge-Response Authentication.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Exposing Transmitters in Mobile Multi-Agent Games.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

Secure Location Verification with a Mobile Receiver.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol.
IEEE Commun. Surv. Tutorials, 2015

Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Intrusion Detection for Airborne Communication Using PHY-Layer Information.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

On Passive Data Link Layer Fingerprinting of Aircraft Transponders.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Lightweight Location Verification in Air Traffic Surveillance Networks.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

Using Channel State Information for Tamper Detection in the Internet of Things.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Realities and challenges of nextgen air traffic management: the case of ADS-B.
IEEE Commun. Mag., 2014

Gaining insight on friendly jamming in a real-world IEEE 802.11 network.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Demonstration abstract: OpenSky: a large-scale ADS-B sensor network for research.
Proceedings of the IPSN'14, 2014

Bringing up OpenSky: a large-scale ADS-B sensor network for research.
Proceedings of the IPSN'14, 2014

2013
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication.
IEEE Trans. Inf. Forensics Secur., 2013

Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels.
IEEE J. Sel. Areas Commun., 2013

A cyber-physical approach to secret key generation in smart environments.
J. Ambient Intell. Humaniz. Comput., 2013

Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference
CoRR, 2013

Security of ADS-B: State of the Art and Beyond.
CoRR, 2013

Subliminal Probing for Private Information via EEG-Based BCI Devices.
CoRR, 2013

Who do you sync you are?: smartphone fingerprinting via application behaviour.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

SAFE: Secure authentication with Face and Eyes.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

Neighborhood watch: On network coding throughput and key sharing.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Experimental Analysis of Attacks on Next Generation Air Traffic Communication.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
WiSec 2011 demo: RFReact - a real-time capable and channel-aware jamming platform.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Dynamic demultiplexing in network calculus - Theory and application.
Perform. Evaluation, 2011

Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

WiFire: a firewall for wireless networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Pay bursts only once holds for (some) non-FIFO systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis
CoRR, 2010

Secret keys from entangled sensor motes: implementation and analysis.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Experimental design and analysis of transmission properties in an indoor wireless sensor network.
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010

AmICA - A Flexible, Compact, Easy-to-Program and Low-Power WSN Platform.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling.
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2010

AmbiSec: Securing Smart Spaces Using Entropy Harvesting.
Proceedings of the Ambient Intelligence, 2010

2009
Security in wireless networks: a fresh approach.
PhD thesis, 2009

Minimizing contention through cooperation between densely deployed wireless LANs.
Wirel. Networks, 2009

Chaotic communication improves authentication: protecting WSNs against injection attacks.
Secur. Commun. Networks, 2009

Bringing law and order to IEEE 802.11 networks - A case for DiscoSec.
Pervasive Mob. Comput., 2009

Jamming for good: a fresh approach to authentic communication in WSNs.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Demultiplexing in Network Calculus- A Stochastic Scaling Approach.
Proceedings of the QEST 2009, 2009

A New Service Curve Model to Deal with Non-FIFO Systems.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

Turning the Tables: Using Wireless Communication Against an Attacker.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

Security by wireless: why play fairer than the attacker.
Proceedings of the AINTEC '09, 2009

2008
Design, implementation, and performance analysis of DiscoSec - Service pack for securing WLANs.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Wireless client puzzles in IEEE 802.11 networks: security by wireless.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once.
Proceedings of the Proceedings 14th GI/ITG Conference on Measurement, Modelling and Evaluation of Computer and Communication Systems (MMB 2008), March 31, 2008

The DISCO Network Calculator.
Proceedings of the Proceedings 14th GI/ITG Conference on Measurement, Modelling and Evaluation of Computer and Communication Systems (MMB 2008), March 31, 2008

Firewalling wireless sensor networks: Security by wireless.
Proceedings of the LCN 2008, 2008

2007
Phishing in the Wireless: Implementation and Analysis.
Proceedings of the New Approaches for Security, 2007

Regional-based authentication against dos attacks in wireless networks.
Proceedings of the Q2SWinet'07, 2007

2006
On Self-coordination in Wireless Community Networks.
Proceedings of the Personal Wireless Communications, 2006

The Case for Virtualized Wireless Access Networks.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

Self-protection in P2P Networks: Choosing the Right Neighbourhood.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

2005
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005

2004
Digital heritage application as an edutainment tool.
Proceedings of the Proceedings VRCAI 2004, 2004

A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004


  Loading...