Martin Strohmeier

Orcid: 0000-0002-1936-0933

Affiliations:
  • armasuisse, Switzerland


According to our database1, Martin Strohmeier authored at least 64 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks.
CoRR, 2024

Secret Collusion Among Generative AI Agents.
CoRR, 2024

Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks.
CoRR, 2024

2023
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach.
IEEE Secur. Priv., 2023

Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks.
CoRR, 2023

Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Firefly: Spoofing Earth Observation Satellite Data through Radio Overshadowing.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023

QPEP in the Real World: A Testbed for Secure Satellite Communication Performance.
Proceedings of the 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, 2023

Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Perfectly Secure Steganography Using Minimum Entropy Coupling.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Modeling 5G Threat Scenarios for Critical Infrastructure Protection.
Proceedings of the 15th International Conference on Cyber Conflict: Meeting Reality, 2023

Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Improving Aircraft Localization: Experiences and Lessons Learned from an Open Competition.
CoRR, 2022

Building an Avionics Laboratory for Cybersecurity Testing.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.
Proceedings of the 31st USENIX Security Symposium, 2022

Aggregate-based congestion control for pulse-wave DDoS defense.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022

Communicating via Markov Decision Processes.
Proceedings of the International Conference on Machine Learning, 2022

Security and Privacy Issues of Satellite Communication in the Avlatlon Domain.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

Building Collaborative Cybersecurity for Critical Infrastructure Protection: Empirical Evidence of Collective Intelligence Information Sharing Dynamics on ThreatFox.
Proceedings of the Critical Information Infrastructures Security, 2022

Demo: End-to-End Wireless Disruption of CCS EV Charging.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

On the Security of the FLARM Collision Warning System.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Flying in Private Mode: Understanding and Improving the Privacy ICAO Address Program.
J. Aerosp. Inf. Syst., August, 2021

Classi-Fly: Inferring Aircraft Categories from Open Data.
ACM Trans. Intell. Syst. Technol., 2021

LocaRDS: A Localization Reference Data Set.
Sensors, 2021

Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS.
CoRR, 2021

Orbit-based authentication using TDOA signatures in satellite networks.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021

QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

In the Same Boat: On Small Satellites, Big Rockets, and Cyber Trust.
Proceedings of the 13th International Conference on Cyber Conflict, 2021

Studying Neutrality in Cyber-Space: a Comparative Geographical Analysis of Honeypot Responses.
Proceedings of the Critical Information Infrastructures Security, 2021

You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

2020
Understanding Realistic Attacks on Airborne Collision Avoidance Systems.
CoRR, 2020

QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband.
CoRR, 2020

A Tale of Sea and Sky On the Security of Maritime VSAT Communications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Safety vs. Security: Attacking Avionic Systems with Humans in the Loop.
CoRR, 2019

On the Applicability of Satellite-Based Air Traffic Control Communication for Security.
IEEE Commun. Mag., 2019

Anomalies in the Sky: Experiments with traffic densities and airport runway use.
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019

Jamming/Garbling assessment and possible mitigations in the OpenSky network.
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019., 2019

BlackWidow: Monitoring the Dark Web for Cyber Security Information.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

2018
A k-NN-Based Localization Approach for Crowdsourced Air Traffic Communication Networks.
IEEE Trans. Aerosp. Electron. Syst., 2018

Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS).
Proc. Priv. Enhancing Technol., 2018

The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Surveying Aviation Professionals on the Security of the Air Traffic Control System.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

Utilizing air traffic communications for OSINT on state and government aircraft.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

2017
On Perception and Reality in Wireless Air Traffic Communication Security.
IEEE Trans. Intell. Transp. Syst., 2017

Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS).
CoRR, 2017

Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS.
Proceedings of the Financial Cryptography and Data Security, 2017

Crowdsourcing security for wireless air traffic communications.
Proceedings of the 9th International Conference on Cyber Conflict, 2017

2016
Security in next generation air traffic communication networks.
PhD thesis, 2016

A Localization Approach for Crowdsourced Air Traffic Communication Networks.
CoRR, 2016

On Perception and Reality in Wireless Air Traffic Communications Security.
CoRR, 2016

Assessing the impact of aviation security on cyber power.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

2015
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol.
IEEE Commun. Surv. Tutorials, 2015

Intrusion Detection for Airborne Communication Using PHY-Layer Information.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

On Passive Data Link Layer Fingerprinting of Aircraft Transponders.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Lightweight Location Verification in Air Traffic Surveillance Networks.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Realities and challenges of nextgen air traffic management: the case of ADS-B.
IEEE Commun. Mag., 2014

Demonstration abstract: OpenSky: a large-scale ADS-B sensor network for research.
Proceedings of the IPSN'14, 2014

Bringing up OpenSky: a large-scale ADS-B sensor network for research.
Proceedings of the IPSN'14, 2014

2013
Security of ADS-B: State of the Art and Beyond.
CoRR, 2013

Neighborhood watch: On network coding throughput and key sharing.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Proceedings of the Computer Security - ESORICS 2012, 2012


  Loading...