Folgen
Simon Birnbach
Simon Birnbach
Bestätigte E-Mail-Adresse bei cs.ox.ac.uk
Titel
Zitiert von
Zitiert von
Jahr
Peeves: Physical Event Verification in Smart Homes
S Birnbach, S Eberz, I Martinovic
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
892019
Wi-fly?: Detecting privacy invasion attacks by consumer drones
S Birnbach, R Baker, I Martinovic
NDSS 2017, 2017
70*2017
They see me rollin’: Inherent vulnerability of the rolling shutter in cmos image sensors
S Köhler, G Lovisotto, S Birnbach, R Baker, I Martinovic
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
362021
Haunted House: Physical Smart Home Event Verification in the Presence of Compromised Sensors
S Birnbach, S Eberz, I Martinovic
ACM Transactions on Internet of Things 3 (3), 1-28, 2022
262022
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
E Salkield, M Szakály, J Smailes, S Köhler, S Birnbach, M Strohmeier, ...
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023
152023
Watch this space: Securing satellite communication through resilient transmitter fingerprinting
J Smailes, S Köhler, S Birnbach, M Strohmeier, I Martinovic
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
122023
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection
Y Sharma, S Birnbach, I Martinovic
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference …, 2023
9*2023
Towards a statistical network calculus—Dealing with uncertainty in arrivals
MA Beck, SA Henningsen, SB Birnbach, JB Schmitt
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2382-2390, 2014
92014
# PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones
S Birnbach, R Baker, S Eberz, I Martinovic
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-34, 2021
72021
Firefly: spoofing Earth observation satellite data through radio overshadowing
E Salkield, S Köhler, S Birnbach, R Baker, M Strohmeier, I Martinovic
Internet Society, 2023
52023
Dishing out dos: How to disable and secure the starlink user terminal
J Smailes, E Salkield, S Köhler, S Birnbach, I Martinovic
arXiv preprint arXiv:2303.00582, 2023
52023
Adaptable Hardware Fingerprinting for Radio Data Links and Avionics Buses in Adversarial Settings
S Birnbach, J Smailes, R Baker, I Martinovic
2023 IEEE/AIAA 42nd Digital Avionics Systems Conference (DASC), 1-10, 2023
42023
To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection
Y Sharma, E Giunchiglia, S Birnbach, I Martinovic
2023 IEEE International Conference on Cyber Security and Resilience (CSR), 8-15, 2023
42023
RingAuth: Wearable Authentication using a Smart Ring
J Sturgess, S Birnbach, S Eberz, I Martinovic
arXiv preprint arXiv:2301.03594, 2022
42022
CableAuth: a biometric second factor authentication scheme for electric vehicle charging
J Sturgess, S Köhler, S Birnbach, I Martinovic
Internet Society, 2023
32023
On the Security of the Wireless Electric Vehicle Charging Communication
S Köhler, S Birnbach, R Baker, I Martinovic
2022 IEEE International Conference on Communications, Control, and Computing …, 2022
22022
BeeHIVE: Behavioral Biometric System based on Object Interactions in Smart Environments
K Krawiecka, S Birnbach, S Eberz, I Martinovic
arXiv preprint arXiv:2202.03845, 2022
22022
Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks
J Smailes, E Salkield, S Köhler, S Birnbach, M Strohmeier, I Martinovic
arXiv preprint arXiv:2402.05042, 2024
12024
Biometric Identification System based on Object Interactions in Internet of Things Environments
K Krawiecka, S Birnbach, S Eberz, I Martinovic
2022 IEEE Security and Privacy Workshops (SPW), 215-221, 2022
12022
Exploiting TTPs to design an extensible and explainable malware detection system
Y Sharma, S Birnbach, I Martinovic
Journal of Universal Computer Science 30 (9), 2024
2024
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20