Nils Ole Tippenhauer

Orcid: 0000-0001-8424-2602

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany


According to our database1, Nils Ole Tippenhauer authored at least 96 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enabling Physical Localization of Uncooperative Cellular Devices.
CoRR, 2024

2023
Time sensitive networking security: issues of precision time protocol and its implementation.
Cybersecur., December, 2023

Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations.
CoRR, 2023

FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 2022

HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version).
IEEE Internet Things J., 2022

Smooth Transition of Vehicles' Maximum Speed for Lane Detection based on Computer Vision.
Proceedings of the 96th Vehicular Technology Conference, 2022

Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
Proceedings of the 31st USENIX Security Symposium, 2022

Déjà Vu? Challenges and Opportunities for AM Security from an ICS perspective.
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security, 2022

Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
Proceedings of the 4th Workshop on CPS & IoT Security and Privacy, 2022

Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
Proceedings of the Annual Computer Security Applications Conference, 2022

Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Practical Pitfalls for Security in OPC UA.
CoRR, 2021

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Proceedings of the 30th USENIX Security Symposium, 2021

COTS Drone Detection using Video Streaming Characteristics.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021

Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

2020
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy.
ACM Trans. Priv. Secur., 2020

Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Eng. Bull., 2020

No Need to Know Physics: Resilience of Process-based Model-free Anomaly Detection for Industrial Control Systems.
CoRR, 2020

Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis.
CoRR, 2020

Decentralized Privacy-Preserving Proximity Tracing.
CoRR, 2020

BIAS: Bluetooth Impersonation AttackS.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A Statistical Analysis Framework for ICS Process Datasets.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

Trust, But Verify? Perspectives On Industrial Device Security.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy.
IACR Cryptol. ePrint Arch., 2019

A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems.
Environ. Model. Softw., 2019

Real-time Evasion Attacks with Physical Constraints on Deep Learning-based Anomaly Detectors in Industrial Control Systems.
CoRR, 2019

Challenges for Security Assessment of Enterprises in the IoT Era.
CoRR, 2019

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version).
CoRR, 2019

The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
Proceedings of the 28th USENIX Security Symposium, 2019

PAtt: Physics-based Attestation of Control Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security, 2019

Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems.
ACM Comput. Surv., 2018

Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot.
CoRR, 2018

WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

State-aware anomaly detection for industrial control systems.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies.
Proceedings of the Computer Security, 2018

On Practical Threat Scenario Testing in an Electric Power ICS Testbed.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Detection of Unauthorized IoT Devices Using Machine Learning Techniques.
CoRR, 2017

IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods.
CoRR, 2017

Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3.
CoRR, 2017

ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis.
Proceedings of the Symposium on Applied Computing, 2017

Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios.
Proceedings of the Computer Security - ESORICS 2017, 2017

On Ladder Logic Bombs in Industrial Control Systems.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

IoTScanner: Detecting Privacy Threats in IoT Neighborhoods.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

Towards Formal Security Analysis of Industrial Control Systems.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Legacy-Compliant Data Authentication for Industrial Control System Traffic.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Advanced Security Testbed Framework for Wearable IoT Devices.
ACM Trans. Internet Techn., 2016

Unequal Importance Multipath Video Streaming for Wireless Networks.
J. Multim. Process. Technol., 2016

Physical-layer integrity for wireless messages.
Comput. Networks, 2016

Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions.
Proceedings of the Formal Methods and Software Engineering, 2016

On Attacker Models and Profiles for Cyber-Physical Systems.
Proceedings of the Computer Security - ESORICS 2016, 2016

The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

SWaT: a water treatment testbed for research and training on ICS security.
Proceedings of the 2016 International Workshop on Cyber-physical Systems for Smart Water Networks, 2016

Limiting the Impact of Stealthy Attacks on Industrial Control Systems.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

Towards High-Interaction Virtual ICS Honeypots-in-a-Box.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

Multi-receiver GPS spoofing detection: error models and realization.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
UWB rapid-bit-exchange system for distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

MiniCPS: A Toolkit for Security Research on CPS Networks.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

2014
CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

Automatic Generation of Security Argument Graphs.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

2013
On Limitations of Friendly Jamming for Confidentiality.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Delay makes a difference: Smart grid resilience under remote meter disconnect attack.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Go with the flow: toward workflow-oriented security assessment.
Proceedings of the New Security Paradigms Workshop, 2013

2012
Physical-layer security aspects of wireless localization.
PhD thesis, 2012

Low-complexity Visible Light Networking with LED-to-LED communication.
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Proceedings of the Computer Security - ESORICS 2012, 2012

Toys communicating with LEDs: Enabling toy cars interaction.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Investigation of Signal and Message Manipulations on the Wireless Channel.
Proceedings of the Computer Security - ESORICS 2011, 2011

On the requirements for successful GPS spoofing attacks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Integrity Regions: Authentication through Presence in Wireless Networks.
IEEE Trans. Mob. Comput., 2010

UWB impulse radio based distance bounding.
Proceedings of the 7th Workshop on Positioning Navigation and Communication, 2010

2009
Secure Ranging With Message Temporal Integrity.
IACR Cryptol. ePrint Arch., 2009

Attacks on public WLAN-based positioning systems.
Proceedings of the 7th International Conference on Mobile Systems, 2009

ID-Based Secure Distance Bounding and Localization.
Proceedings of the Computer Security, 2009


  Loading...