Follow
Dr.-Ing. Jiska Classen
Dr.-Ing. Jiska Classen
Hasso Plattner Institute, University Of Potsdam, Germany
Verified email at jiska.de - Homepage
Title
Cited by
Cited by
Year
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
J Ruge, J Classen, F Gringoli, M Hollick
29th USENIX Security Symposium (USENIX Security 20), 19-36, 2020
1062020
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware
J Classen, D Wegemer, P Patras, T Spink, M Hollick
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
892018
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications
J Classen, J Chen, D Steinmetzer, M Hollick, E Knightly
Proceedings of the 2nd International Workshop on Visible Light …, 2015
892015
Practical Covert Channels for WiFi Systems
J Classen, M Schulz, M Hollick
2015 IEEE Conference on Communications and Network Security (CNS), 209-217, 2015
772015
InternalBlue – Bluetooth Binary Patching and Experimentation Framework
D Mantz, J Classen, M Schulz, M Hollick
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
682019
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves
D Steinmetzer, J Chen, J Classen, E Knightly, M Hollick
2015 IEEE Conference on Communications and Network Security (CNS), 335-343, 2015
682015
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit
H Fereidooni, J Classen, T Spink, P Patras, M Miettinen, AR Sadeghi, ...
International Symposium on Research in Attacks, Intrusions, and Defenses, 48-69, 2017
512017
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain
J Chen, D Steinmetzer, J Classen, E Knightly, M Hollick
2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017
412017
CA Trust Management for the Web PKI
J Braun, F Volk, J Classen, J Buchmann, M Mühlhäuser
Journal of Computer Security 22 (6), 913-959, 2014
352014
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
J Classen, D Steinmetzer, M Hollick
Proceedings of the 3rd Workshop on Visible Light Communication Systems, 19-24, 2016
342016
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
P Leu, G Camurati, A Heinrich, M Roeschlin, C Anliker, M Hollick, ...
31st USENIX Security Symposium (USENIX Security 22), 1343-1359, 2022
332022
Improving the Reliability of Bluetooth Low Energy Connections.
M Spörk, J Classen, CA Boano, M Hollick, K Römer
Proceedings of the 2020 International Conference on Embedded Wireless …, 2020
272020
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Raytracing
D Steinmetzer, J Classen, M Hollick
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016
252016
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices
J Classen, M Hollick
12th Conference on Security and Privacy in Wireless and Mobile Networks, 186-191, 2019
212019
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information
M Weller, J Classen, F Ullrich, D Waßmann, E Tews
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
182020
AirTag of the clones: shenanigans with liberated item finders
T Roth, F Freyer, M Hollick, J Classen
2022 IEEE Security and Privacy Workshops (SPW), 301-311, 2022
162022
ToothPicker: Apple Picking in the iOS Bluetooth Stack
D Heinze, J Classen, M Hollick
14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020
142020
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem
F Ullrich, J Classen, J Eger, M Hollick
13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019
142019
Aristoteles–dissecting apple’s baseband interface
T Kröll, S Kleber, F Kargl, M Hollick, J Classen
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
132021
Firmware Insider: Bluetooth Randomness is Mostly Random
J Tillmanns, J Classen, F Rohrbach, M Hollick
14th USENIX Workshop on Offensive Technologies (WOOT 20), 2020
122020
The system can't perform the operation now. Try again later.
Articles 1–20