Utz Roedig

Orcid: 0000-0002-4020-0889

Affiliations:
  • Lancaster University, UK


According to our database1, Utz Roedig authored at least 113 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Demonstration of LAN-type Communication for an Industrial 5G Network.
Proceedings of the IEEE INFOCOM 2023, 2023

Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

The State of Secure Coding Practice: Small Organisations and "Lone, Rogue Coders".
Proceedings of the 4th IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical System, 2023

Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who?
Proceedings of the 4th IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical System, 2023

Towards Trust-Based Data Weighting in Machine Learning.
Proceedings of the 31st IEEE International Conference on Network Protocols, 2023

EDT+: Energy Consumption Optimization of NB-IoT.
Proceedings of the 11th International Workshop on Energy Harvesting & Energy-Neutral Sensing Systems, 2023

Unhelpful Assumptions in Software Security Research.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Personal Voice Assistant Security and Privacy - A Survey.
Proc. IEEE, 2022

Dynamic Recognition of Speakers for Consent Management by Contrastive Embedding Replay.
CoRR, 2022

Detection of Voice Conversion Spoofing Attacks Using Voiced Speech.
Proceedings of the Secure IT Systems, 2022

Low-Complexity Speech Spoofing Detection using Instantaneous Spectral Features.
Proceedings of the 29th International Conference on Systems, Signals and Image Processing, 2022

NB-IoT Battery Depletion via Malicious Interference.
Proceedings of the 2022 International Conference on Embedded Wireless Systems and Networks, 2022

Wake Word Based Room Identification with Personal Voice Assistants.
Proceedings of the 2022 International Conference on Embedded Wireless Systems and Networks, 2022

2021
Resonant-Tunnelling Diodes as PUF Building Blocks.
IEEE Trans. Emerg. Top. Comput., 2021

Energy Theft in Smart Grids: A Survey on Data-Driven Attack Strategies and Detection Methods.
IEEE Access, 2021

Understanding Developer Security Archetypes.
Proceedings of the 2nd IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems, 2021

Battery Depletion Attacks on NB-IoT Devices Using Interference.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Adversarial Command Detection Using Parallel Speech Recognition Systems.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Room Identification with Personal Voice Assistants (Extended Abstract).
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
SonarSnoop: active acoustic side-channel attacks.
Int. J. Inf. Sec., 2020

LoRa-SDN: Providing Wireless IoT Edge Network Functions via SDN.
Proceedings of the 43rd International Convention on Information, 2020

Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

The benefits of Deceit: a Malicious client in a 5G Cellular Network.
Proceedings of the IEEE International Symposium on Local and Metropolitan Area Networks, 2019

Adversarial Machine Learning in Smart Energy Systems.
Proceedings of the Tenth ACM International Conference on Future Energy Systems, 2019

Optically Interrogated Unique Object with Simulation Attack Prevention.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
Differentiating Clear Channel Assessment Using Transmit Power Variation.
ACM Trans. Sens. Networks, 2018

Towards Reactive Acoustic Jamming for Personal Voice Assistants.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2017
Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

Mitigating Inter-network Interference in LoRa Networks.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

LoRa Transmission Parameter Selection.
Proceedings of the 13th International Conference on Distributed Computing in Sensor Systems, 2017

2016
Fusion: coalesced confidential storage and communication framework for the IoT.
Secur. Commun. Networks, 2016

Do LoRa Low-Power Wide-Area Networks Scale?
Proceedings of the 19th ACM International Conference on Modeling, 2016

Using context switches for VM scaling.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

Poster: RI-MAC Enhancements for Interference Resilience.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016

Competition: ContikiMAC with Differentiating Clear Channel Assessment.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016

LoRa for the Internet of Things.
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016

2015
Estimating node lifetime in interference environments.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

MultiBox: Lightweight Containers for Vendor-Independent Multi-cloud Deployments.
Proceedings of the Embracing Global Computing in Emerging Economies - First Workshop, 2015

Lifetime Bounds of Wi-Fi Enabled Sensor Nodes.
Proceedings of the 6th International Conference on Ambient Systems, 2015

Using Channel State Information for Tamper Detection in the Internet of Things.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Constructing Schedules for Time-Critical Data Delivery in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2014

Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN.
Secur. Commun. Networks, 2014

Reliability comparison of transmit/receive diversity and error control coding in low-power medium access control protocols.
IET Networks, 2014

Short paper: gathering tamper evidence in wi-fi networks based on channel state information.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

DCCA: Differentiating Clear Channel Assessment for improved 802.11/802.15.4 coexistence.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Security Mechanisms for Wireless Sensor Networks.
Proceedings of the SENSORNETS 2014 - Proceedings of the 3rd International Conference on Sensor Networks, Lisbon, Portugal, 7, 2014

Demo abstract: A testbed infrastructure to study the impact of temperature on WSN.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

Estimating packet reception rate in noisy environments.
Proceedings of the IEEE 39th Conference on Local Computer Networks, Edmonton, AB, Canada, 8-11 September, 2014, 2014

TempLab: a testbed infrastructure to study the impact of temperature on wireless sensor networks.
Proceedings of the IPSN'14, 2014

Socio-Technical Security Analysis of Industrial Control Systems (ICS).
Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, 2014

2013
Managing software evolution in large-scale wireless sensor and actuator networks.
ACM Trans. Sens. Networks, 2013

The GINSENG system for wireless monitoring and control: Design and deployment experiences.
ACM Trans. Sens. Networks, 2013

Combined secure storage and communication for the Internet of Things.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Node Identification Using Clock Skew.
Proceedings of the Real-World Wireless Sensor Networks, 2013

Neighborhood watch: On network coding throughput and key sharing.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
On the applicability of network coding in wireless sensor networks.
SIGBED Rev., 2012

Improving transmission reliability of low-power medium access control protocols using average diversity combining.
IET Wirel. Sens. Syst., 2012

A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks.
IEEE Commun. Surv. Tutorials, 2012

Codo: confidential data storage for wireless sensor networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

2011
Dimensioning of Time-Critical WSNs - Theory, Implementation and Evaluation.
J. Commun., 2011

Self-adaptive framelet-based communication for wireless sensor networks.
Comput. Networks, 2011

BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks - 8th European Conference, 2011

Demo abstract: Securing communication in 6LoWPAN with compressed IPsec.
Proceedings of the Distributed Computing in Sensor Systems, 2011

Securing communication in 6LoWPAN with compressed IPsec.
Proceedings of the Distributed Computing in Sensor Systems, 2011

WSN evaluation in industrial environments first results and lessons learned.
Proceedings of the Distributed Computing in Sensor Systems, 2011

Type-safe updating for modular WSN software.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
The Impact of Temperature on Outdoor Industrial WSN Applications.
IEEE Trans. Ind. Informatics, 2010

Vehicle-Driver Communication Using Off-the-Shelf Transceivers.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

The Lorien dynamic component based OS.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

GINSENG: Performance Control in Wireless Sensor Networks.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Deploying Wireless Sensor Networking Technology in a Rescue Team Context.
Proceedings of the Real-World Wireless Sensor Networks - 4th International Workshop, 2010

Implementation and Evaluation of Combined Positioning and Communication.
Proceedings of the Real-World Wireless Sensor Networks - 4th International Workshop, 2010

Implementation and evaluation of distance-based message authentication.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Towards multiprocessor sensor nodes.
Proceedings of the 6th Workshop on Hot Topics in Embedded Networked Sensors, 2010

Time-Critical Data Delivery in Wireless Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2009
Low-Power Radio Communication in Industrial Outdoor Deployments: The Impact of Weather Conditions and ATEX-Compliance.
Proceedings of the Sensor Applications, Experimentation, and Logistics, 2009

Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Combining Positioning and Communication Using UWB Transceivers.
Proceedings of the Distributed Computing in Sensor Systems, 2009

2008
A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems.
J. Networks, 2008

DHB-KEY: An efficient key distribution scheme for wireless sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Priority interrupts of Duty Cycled communications in wireless sensor networks.
Proceedings of the LCN 2008, 2008

Opportunistic Aggregation over Duty Cycled Communications in Wireless Sensor Networks.
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008

2007
Validating the sensor network calculus by simulations.
Proceedings of the 3rd International ICSTConference on Wireless Internet, 2007

On the Effects of Aggregation on Reliability in Sensor Networks.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

The D-Systems Project - Wireless Sensor Networks for Car-Park Management.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Reliability Control for Aggregation in Wireless Sensor Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Improving the Energy Efficiency of the MANTIS Kernel.
Proceedings of the Wireless Sensor Networks, 2007

Adding preemption to TinyOS.
Proceedings of the 4th Workshop on Embedded Networked Sensors, 2007

2006
Car-Park Management using Wireless Sensor Networks.
Proceedings of the LCN 2006, 2006

f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization.
Proceedings of the Wireless Sensor Networks, Third European Workshop, 2006

2005
Multimedia and firewalls: a performance perspective.
Multim. Syst., 2005

Use of Framelets for Efficient Transmitter-Receiviver rendezvous in Wireless Sensor Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

The development of a novel minaturized modular platform for wireless sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

µ-MAC: an energy-efficient medium access control for wireless sensor networks.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005

Sensor Network Calculus - A Framework for Worst Case Analysis.
Proceedings of the Distributed Computing in Sensor Systems, 2005

2004
The DSYS25 sensor platform.
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004

Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications.
Proceedings of the NETWORKING 2004, 2004

Determination of Aggregation Points in Wireless Sensor Networks.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

Session Introduction: Wireless Sensor Networks.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Hacker Contest - Sicherheitsprobleme, Lösungen, Beispiele.
Xpert.press, Springer, ISBN: 978-3-642-55834-4, 2003

Introduction from Session Chair - Multimedia and Telecommunications Track Session: Content Caching.
Proceedings of the 29th EUROMICRO Conference 2003, 2003

2002
Firewall-Architekturen für Multimedia-Applikationen.
PhD thesis, 2002

2001
IP-Telefonie und Firewalls, Probleme und Lösungen.
Prax. Inf.verarb. Kommun., 2001

RSVP as Firewall Signalling Protocol.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Vulnerabilities and Security Limitations of current IP Telephony Systems.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

2000
Open Internet Security - Von den Grundlagen zu den Anwendungen.
Xpert.press, Springer, ISBN: 978-3-642-57003-2, 2000

Angewandte Informationssicherheit Ein Hacker-Praktikum an Universitäten.
Inform. Spektrum, 2000

Associating network flows with user and application information.
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000

Using DMIF for Abstracting from IP-Telephony Signaling Protocols.
Proceedings of the Interactive Distributed Multimedia Systems and Telecommunication Services, 2000

1999
VDMFA, eine verteilte dynamische Firewallarchitektur für Multimedia-Dienste.
Proceedings of the Kommunikation in Verteilten Systemen, 1999


  Loading...