Srdjan Capkun

According to our database1, Srdjan Capkun authored at least 166 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Securing Cloud Data Under Key Exposure.
IEEE Trans. Cloud Computing, 2019

Secure Brokered Delegation Through DelegaTEE.
IEEE Security & Privacy, 2019

ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts.
IACR Cryptology ePrint Archive, 2019

Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies.
IACR Cryptology ePrint Archive, 2019

ProtectIOn: Root-of-Trust for IO in Compromised Platforms.
IACR Cryptology ePrint Archive, 2019

Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

2FA-PP: 2nd factor phishing prevention.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Digital radio signal cancellation attacks: an experimental evaluation.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband.
Proceedings of the 28th USENIX Security Symposium, 2019

BITE: Bitcoin Lightweight Client Privacy using Trusted Execution.
Proceedings of the 28th USENIX Security Symposium, 2019

Deniable Upload and Download via Passive Participation.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Toward Shared Ownership in the Cloud.
IEEE Trans. Information Forensics and Security, 2018

Blockchain Security and Privacy.
IEEE Security & Privacy, 2018

PRCash: Centrally-Issued Digital Currency with Privacy and Regulation.
IACR Cryptology ePrint Archive, 2018

ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution.
IACR Cryptology ePrint Archive, 2018

ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification.
IACR Cryptology ePrint Archive, 2018

I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

DelegaTEE: Brokered Delegation Using Trusted Execution Environments.
Proceedings of the 27th USENIX Security Symposium, 2018

TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Secure Positioning and Location-Based Security for IoT and Beyond.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2017
Are We Really Close? Verifying Proximity in Wireless Systems.
IEEE Security & Privacy, 2017

TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation.
IACR Cryptology ePrint Archive, 2017

Towards Shared Ownership in the Cloud.
IACR Cryptology ePrint Archive, 2017

μchain: How to Forget without Hard Forks.
IACR Cryptology ePrint Archive, 2017

IntegriKey: End-to-End Integrity Protection of User Input.
IACR Cryptology ePrint Archive, 2017

Software Grand Exposure: SGX Cache Attacks Are Practical.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Using hover to compromise the confidentiality of user input on Android.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

ROTE: Rollback Protection for Trusted Execution.
Proceedings of the 26th USENIX Security Symposium, 2017

Quantifying Web Adblocker Privacy.
Proceedings of the Computer Security - ESORICS 2017, 2017

Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

On the Security of Carrier Phase-Based Ranging.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Physical-layer integrity for wireless messages.
Computer Networks, 2016

Verena: End-to-End Integrity Protection for Web Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

SALVE: server authentication with location verification.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

SPREE: a spoofing resistant GPS receiver.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Mobile Application Impersonation Detection Using Dynamic User Interface Extraction.
Proceedings of the Computer Security - ESORICS 2016, 2016

Quantifying Location Privacy Leakage from Transaction Prices.
Proceedings of the Computer Security - ESORICS 2016, 2016

Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

On Information Leakage in Deduplicated Storage Systems.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

On the Security and Performance of Proof of Work Blockchains.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Types and Origins of Fingerprints.
Proceedings of the Digital Fingerprinting, 2016

2015
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability.
ACM Trans. Inf. Syst. Secur., 2015

Introduction to the Issue on Signal and Information Processing for Privacy.
J. Sel. Topics Signal Processing, 2015

W-SPS: Designing a Wide-Area Secure Positioning System.
IACR Cryptology ePrint Archive, 2015

Quantifying Location Privacy Leakage from Transaction Prices.
IACR Cryptology ePrint Archive, 2015

UWB rapid-bit-exchange system for distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Thermal Covert Channels on Multi-core Platforms.
Proceedings of the 24th USENIX Security Symposium, 2015

Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound.
Proceedings of the 24th USENIX Security Symposium, 2015

Commune: Shared Ownership in an Agnostic Cloud.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Tampering with the Delivery of Blocks and Transactions in Bitcoin.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Proximity Verification for Contactless Access Control and Authentication Systems.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Logical Partitions on Many-Core Platforms.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Microcomputations as Micropayments in Web-based Services.
ACM Trans. Internet Techn., 2014

On Secure Data Deletion.
IEEE Security & Privacy, 2014

Is Bitcoin a Decentralized Currency?
IEEE Security & Privacy, 2014

Isolated Execution on Many-core Architectures.
IACR Cryptology ePrint Archive, 2014

Securing Cloud Data in the New Attacker Model.
IACR Cryptology ePrint Archive, 2014

On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients.
IACR Cryptology ePrint Archive, 2014

Short paper: detection of GPS spoofing attacks in power grids.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Smartphones as Practical and Secure Location Verification Tokens for Payments.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Enforcing Location and Time-Based Access Control on Cloud-Stored Data.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Enabling Short Fragments for Uncoordinated Spread Spectrum Communication.
Proceedings of the Computer Security - ESORICS 2014, 2014

Quantifying Web-Search Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Assisted deletion of related content.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

On the privacy provisions of Bloom filters in lightweight bitcoin clients.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions.
IEEE Trans. Information Forensics and Security, 2013

Is Bitcoin a Decentralized Currency?
IACR Cryptology ePrint Archive, 2013

On Limitations of Friendly Jamming for Confidentiality.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SoK: Secure Data Deletion.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Tailing RFID Tags for Clone Detection.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Evaluating User Privacy in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2013

For some eyes only: protecting online information sharing.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Secure data deletion from persistent media.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

An architecture for concurrent execution of secure environments in clouds.
Proceedings of the CCSW'13, 2013

Secure enrollment and practical migration for mobile trusted execution environments.
Proceedings of the SPSM'13, 2013

2012
Towards Practical Identification of HF RFID Devices.
ACM Trans. Inf. Syst. Secur., 2012

Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.
IACR Cryptology ePrint Archive, 2012

On physical-layer identification of wireless devices.
ACM Comput. Surv., 2012

The research value of publishing attacks.
Commun. ACM, 2012

Physical-layer attacks on chirp-based ranging systems.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Distance Hijacking Attacks on Distance Bounding Protocols.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Distance Hijacking Attacks on Distance Bounding Protocols.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Proceedings of the Computer Security - ESORICS 2012, 2012

User-level secure deletion on log-structured file systems.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Double-spending fast payments in bitcoin.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

4th cloud computing security workshop (CCSW 2012).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Enabling trusted scheduling in embedded systems.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Analysis of the communication between colluding applications on modern smartphones.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Uncoordinated Frequency Hopping Spread Spectrum.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Uncoordinated Direct Sequence Spread Spectrum.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Distance Bounding Protocols.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Jamming Resistance.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Formal Reasoning about Physical Properties of Security Protocols.
ACM Trans. Inf. Syst. Secur., 2011

Pay as you browse: microcomputations as micropayments in web-based services.
Proceedings of the 20th International Conference on World Wide Web, 2011

Group Distance Bounding Protocols - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Home is safer than the cloud!: privacy concerns for consumer cloud storage.
Proceedings of the Symposium On Usable Privacy and Security, 2011

On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.
Proceedings of the Network and Distributed System Security Symposium, 2011

Investigation of Signal and Message Manipulations on the Wireless Channel.
Proceedings of the Computer Security - ESORICS 2011, 2011

On the requirements for successful GPS spoofing attacks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Privacy-preserving outsourcing of brute-force key searches.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

Enabling secure VM-vTPM migration in private clouds.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Detection of reactive jamming in sensor networks.
TOSN, 2010

Integrity Regions: Authentication through Presence in Wireless Networks.
IEEE Trans. Mob. Comput., 2010

Anti-jamming broadcast communication using uncoordinated spread spectrum techniques.
IEEE Journal on Selected Areas in Communications, 2010

Attacks on physical-layer identification.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Realization of RF Distance Bounding.
Proceedings of the 19th USENIX Security Symposium, 2010

Influence of user perception, security needs, and social factors on device pairing method choices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Physical-layer identification of UHF RFID tags.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

Low-Cost Client Puzzles Based on Modular Exponentiation.
Proceedings of the Computer Security, 2010

Keeping data secret under full compromise using porter devices.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Secure Ranging With Message Temporal Integrity.
IACR Cryptology ePrint Archive, 2009

Jamming-resistant Broadcast Communication without Shared Keys.
Proceedings of the 18th USENIX Security Symposium, 2009

Physical-layer Identification of RFID Devices.
Proceedings of the 18th USENIX Security Symposium, 2009

Let's Get Physical: Models and Methods for Real-World Security Protocols.
Proceedings of the Theorem Proving in Higher Order Logics, 22nd International Conference, 2009

On the Security of Bottleneck Bandwidth Estimation Techniques.
Proceedings of the Security and Privacy in Communication Networks, 2009

Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Attacks on public WLAN-based positioning systems.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Efficient uncoordinated FHSS anti-jamming communication.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

Transient-based identification of wireless sensor nodes.
Proceedings of the 8th International Conference on Information Processing in Sensor Networks, 2009

Secure Remote Execution of Sequential Computations.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

ID-Based Secure Distance Bounding and Localization.
Proceedings of the Computer Security, 2009

Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Proximity-based access control for implantable medical devices.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Secure Location Verification with Hidden and Mobile Base Stations.
IEEE Trans. Mob. Comput., 2008

Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions.
ACM Trans. Inf. Syst. Secur., 2008

Secure Time Synchronization in Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels.
IEEE Trans. Dependable Sec. Comput., 2008

Secure neighborhood discovery: a fundamental element for mobile ad hoc networking.
IEEE Communications Magazine, 2008

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (S&P 2008), 2008

Protecting Sensitive Business Information While Sharing Serial-Level Data.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Location privacy of distance bounding protocols.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Securing Timing Synchronization in Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Securing Localization in Wireless Networks (using Verifiable Multilateration and Covert Base Stations).
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Wormhole-Based Antijamming Techniques in Sensor Networks.
IEEE Trans. Mob. Comput., 2007

Implications of radio fingerprinting on the security of sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

SecNav: secure broadcast localization and time synchronization in wireless networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

BAP: Broadcast Authentication Using Cryptographic Puzzles.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Mobility Helps Peer-to-Peer Security.
IEEE Trans. Mob. Comput., 2006

Key Agreement in Peer-to-Peer Wireless Networks.
Proceedings of the IEEE, 2006

Secure positioning in wireless networks.
IEEE Journal on Selected Areas in Communications, 2006

Integrity regions: authentication through presence in wireless networks.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Secure Localization with Hidden and Mobile Base Stations.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Secure time synchronization service for sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Distance enlargement and reduction attacks on ultrasound ranging.
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005

Rope: robust position estimation in wireless sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

Secure positioning of wireless devices with application to sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
A formal model of rational exchange and its application to the analysis of Syverson's protocol.
Journal of Computer Security, 2004

The Security and Privacy of Smart Vehicles.
IEEE Security & Privacy, 2004

SOWER: self-organizing wireless network for messaging.
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004

2003
Self-Organized Public-Key Management for Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2003

BISS: building secure routing out of an incomplete set of security associations.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

SECTOR: secure tracking of node encounters in multi-hop wireless networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Mobility helps security in ad hoc networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

2002
Small worlds in security systems: an analysis of the PGP certificate graph.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

A Formal Analysis of Syverson?s Rational Exchange Protocol.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
The quest for security in mobile ad hoc networks.
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001

GPS-Free Positioning in Mobile ad-hoc Networks.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001


  Loading...