• Publications
  • Influence
Evaluating User Privacy in Bitcoin
TLDR
We evaluate the privacy that is provided by Bitcoin when it is used to support the daily transactions of individuals in a university setting. Expand
  • 458
  • 24
  • PDF
Decentralized Privacy-Preserving Proximity Tracing
TLDR
This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. Expand
  • 109
  • 17
  • PDF
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
TLDR
We show that unless new detection techniques are integrated in the Bitcoin implementation, double-spending attacks on fast payments succeed with considerable probability and can be mounted at low cost. Expand
  • 128
  • 9
  • PDF
Broken Hearted: How To Attack ECG Biometrics
In this work we present a systematic presentation attack against ECG biometrics. We demonstrate the attack’s effectiveness using the Nymi Band, a wrist band that uses electrocardiography (ECG) as aExpand
  • 35
  • 3
  • PDF
Device Pairing at the Touch of an Electrode
TLDR
Device pairing is the problem of having two devices securely establish a key that can be used to secure subsequent communication. Expand
  • 10
  • 3
  • PDF
Authentication using pulse-response biometrics
TLDR
We propose a new biometric based on the human body's response to an electric square pulse signal, called pulse-response. Expand
  • 61
  • 2
  • PDF
Using Reflexive Eye Movements for Fast Challenge-Response Authentication
TLDR
An interactive visual stimulus for elicitation of reflexive eye movements that supports the extraction of reliable biometric features in a matter of seconds, without requiring any memorization or cognitive effort on the part of the user. Expand
  • 43
  • 2
  • PDF
Look twice: Uncover hidden information in room climate sensor data
Connected sensors are on the march to become pervasive. While they are often deployed for a single purpose it is worth to take a second look. In this study, we show that the widespread NetatmoExpand
  • 12
  • 1
  • PDF
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication
TLDR
We develop an interactive visual stimulus for elicitation of reflexive eye movements that support the extraction of reliable biometric features in a matter of seconds, without requiring any memorization or cognitive effort on the part of the user. Expand
  • 4
  • 1
  • PDF
Pulse-Response
TLDR
We propose a new physiological trait based on the human body’s electrical response to a square pulse signal, called pulse-response, and analyze how this biometric characteristic can be used to enhance security in the context of two example applications: (1) an additional authentication mechanism in PIN entry systems and (2) a means of continuous authentication on a secure terminal. Expand
  • 4
  • 1
  • PDF