Kasper Bonne Rasmussen

Orcid: 0000-0002-9471-9985

According to our database1, Kasper Bonne Rasmussen authored at least 79 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Targeted Detection for Attacks on the MIL-STD-1553 Bus.
IEEE Trans. Aerosp. Electron. Syst., February, 2024

2023
A Visionary Look at the Security of Reconfigurable Cloud Computing.
Proc. IEEE, December, 2023

RegGuard: Leveraging CPU registers for mitigation of control- and data-oriented attacks.
Comput. Secur., June, 2023

Hardware-assisted remote attestation design for critical embedded systems.
IET Inf. Secur., May, 2023

Detecting CAN Attacks on J1939 and NMEA 2000 Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Iris: Dynamic Privacy Preserving Search in Structured Peer-to-Peer Networks.
CoRR, 2023

Ask for Alice: Online Covert Distress Signal in the Presence of a Strong Adversary.
CoRR, 2023

Electromagnetic Signal Injection Attacks on Differential Signaling.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine Communication.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Nakula: Coercion Resistant Data Storage against Time-Limited Adversary.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Long-Wire Leakage: The Threat of Crosstalk.
IEEE Des. Test, 2022

Orientation Estimation using Wireless Device Radiation Patterns.
CoRR, 2022

Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus.
CoRR, 2022

Detection of Electromagnetic Signal Injection Attacks on Actuator Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Private Data Exfiltration from Cyber-Physical Systems Using Channel State Information.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

Extended Abstract: Covert Channels and Data Exfiltration From FPGAs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy.
ACM Trans. Priv. Secur., 2020

Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses.
IEEE Commun. Surv. Tutorials, 2020

TruSD: Trust framework for service discovery among IoT devices.
Comput. Networks, 2020

TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Detection of Electromagnetic Interference Attacks on Sensor Systems.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

BIAS: Bluetooth Impersonation AttackS.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Fingerprinting Cloud FPGA Infrastructures.
Proceedings of the FPGA '20: The 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020

SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Leakier Wires: Exploiting FPGA Long Wires for Covert- and Side-channel Attacks.
ACM Trans. Reconfigurable Technol. Syst., 2019

Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication.
ACM Trans. Priv. Secur., 2019

Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy.
IACR Cryptol. ePrint Arch., 2019

On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name.
IACR Cryptol. ePrint Arch., 2019

What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS.
IACR Cryptol. ePrint Arch., 2019

Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

SoK: Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses.
CoRR, 2019

The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
Proceedings of the 28th USENIX Security Symposium, 2019

Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs.
Proceedings of the 29th International Conference on Field Programmable Logic and Applications, 2019

A Framework for Evaluating Security in the Presence of Signal Injection Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019

28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives.
IEEE Secur. Priv., 2018

Bionyms: Driver-centric Message Authentication using Biometric Measurements.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Device Pairing at the Touch of an Electrode.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Pulse-Response: Exploring Human Body Impedance for Biometric Recognition.
ACM Trans. Priv. Secur., 2017

Authentication using pulse-response biometrics.
Commun. ACM, 2017

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics.
ACM Trans. Priv. Secur., 2016

On Bitcoin Security in the Presence of Broken Crypto Primitives.
IACR Cryptol. ePrint Arch., 2016

Physical-layer integrity for wireless messages.
Comput. Networks, 2016

Generating Secret Keys from Biometric Body Impedance Measurements.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

On Bitcoin Security in the Presence of Broken Cryptographic Primitives.
Proceedings of the Computer Security - ESORICS 2016, 2016

Remote attestation for low-end embedded devices: the prover's perspective.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Using Reflexive Eye Movements for Fast Challenge-Response Authentication.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Privacy-preserving User Matching.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel.
Proceedings of the 10th ACM Symposium on Information, 2015

Mobility Independent Secret Key Generation for Wearable Health-care Devices.
Proceedings of the 10th EAI International Conference on Body Area Networks, 2015

2014
Undetectable communication: The Online Social Networks case.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A minimalist approach to Remote Attestation.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2012
Systematic Treatment of Remote Attestation.
IACR Cryptol. ePrint Arch., 2012

Distance Hijacking Attacks on Distance Bounding Protocols.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

On the Security of Password Manager Database Formats.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Distance Hijacking Attacks on Distance Bounding Protocols.
IACR Cryptol. ePrint Arch., 2011

On the requirements for successful GPS spoofing attacks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Optimal routing with failure-independent path protection.
Networks, 2010

Realization of RF Distance Bounding.
Proceedings of the 19th USENIX Security Symposium, 2010

2009
Secure Ranging With Message Temporal Integrity.
IACR Cryptol. ePrint Arch., 2009

Attacks on public WLAN-based positioning systems.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Proximity-based access control for implantable medical devices.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Secure Location Verification with Hidden and Mobile Base Stations.
IEEE Trans. Mob. Comput., 2008

Location privacy of distance bounding protocols.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Implications of radio fingerprinting on the security of sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

SecNav: secure broadcast localization and time synchronization in wireless networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007


  Loading...