Nils Ole Tippenhauer

Learn More
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of mobile platforms, including Apple's iPod touch and iPhone. By implementing and analyzing several kinds of attacks, we demonstrate that this system is vulnerable to location(More)
An increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However, civilian GPS signals are known to be susceptible to spoofing attacks which make GPS receivers in range believe that they reside at locations different than their real physical locations. In this paper, we investigate the(More)
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless networks. It is defined on abstract messages exchanged between entities and includes arbitrary, real-time modification of messages by the attacker. In this work, we aim at(More)
Wireless communication provides unique security challenges, but also enables novel ways to defend against attacks. In the past few years, a number of works discussed the use of friendly jamming to protect the confidentiality of the communicated data as well as to enable message authentication and access control. In this work, we analytically and(More)
Today’s communication systems are often vulnerable to wormhole or relaying attacks, leading to severe security problems. Distance Bounding (DB) protocols are authentication protocols designed to protect against these attacks. They determine an upper bound on the physical distance between two communication parties — the verifier V (e.g. a door requiring an(More)
While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Attackers that want to remain undetected can attempt to hide(More)
This paper presents the SWaT testbed, a modern industrial control system (ICS) for security research and training. SWaT is currently in use to (a) understand the impact of cyber and physical attacks on a water treatment system, (b) assess the effectiveness of attack detection algorithms, (c) assess the effectiveness of defense mechanisms when the system is(More)
Transportation mode detection with personal devices has been investigated for over ten years due to its importance in monitoring ones’ activities, understanding human mobility, and assisting traffic management. However, two main limitations are still preventing it from large-scale deployments: high power consumption, and the lack of high-volume and diverse(More)
Visible Light Communication (VLC) is an emerging technology in which Light Emitting Diodes (LEDs) transport information wirelessly, using the visible light spectrum. While most of the research on VLC has focused on wideband white LEDs used in ambient illumination, narrowband and colored LEDs have received little attention. Short-range free-space optical(More)