Jiska Classen

Affiliations:
  • TU Darmstadt, Department of Computer Science, Germany


According to our database1, Jiska Classen authored at least 34 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging.
Proceedings of the 31st USENIX Security Symposium, 2022

AirTag of the Clones: Shenanigans with Liberated Item Finders.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Happy MitM: fun and toys in every bluetooth device.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

ARIstoteles - Dissecting Apple's Baseband Interface.
Proceedings of the Computer Security - ESORICS 2021, 2021

Very Pwnable Network: Cisco AnyConnect Security Analysis.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
Security and Privacy for IoT Ecosystems.
PhD thesis, 2020

DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework.
CoRR, 2020

DEMO: Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips.
CoRR, 2020

Firmware Insider: Bluetooth Randomness is Mostly Random.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

ToothPicker: Apple Picking in the iOS Bluetooth Stack.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

Lost and found: stopping bluetooth finders from leaking private information.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Acoustic integrity codes: secure device pairing using short-range acoustic communication.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

MagicPairing: Apple's take on securing bluetooth peripherals.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets.
Proceedings of the 29th USENIX Security Symposium, 2020

Improving the Reliability of Bluetooth Low Energy Connections.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020

Demo: Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020

2019
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Inside job: diagnosing bluetooth lower layers using off-the-shelf devices.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Practical VLC to WiFi Handover Mechanisms.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

2018
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

2017
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

2016
Opportunities and pitfalls in securing visible light communication on the physical layer.
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 2016

Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

mmTrace: Modeling millimeter-wave indoor propagation with image-based ray-tracing.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Analyzing TETRA Location Privacy and Network Availability.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
A Distributed Reputation System for Certification Authority Trust Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
Proceedings of the 2nd International Workshop on Visible Light Communications Systems, 2015

Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Practical covert channels for WiFi systems.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
CA trust management for the Web PKI.
J. Comput. Secur., 2014


  Loading...