• Publications
  • Influence
On the requirements for successful GPS spoofing attacks
TLDR
We investigate the requirements for successful GPS spoofing attacks on individuals and groups of victims with civilian or military GPS receivers. Expand
  • 321
  • 19
  • PDF
Decentralized Privacy-Preserving Proximity Tracing
TLDR
This document describes and analyzes a system for secure and privacy-preserving proximity tracing at large scale. Expand
  • 107
  • 16
  • PDF
Limiting the Impact of Stealthy Attacks on Industrial Control Systems
TLDR
We propose a new metric to measure the impact of stealthy attacks and how they relate to our selection on an upper bound on false alarms. Expand
  • 185
  • 12
  • PDF
SWaT: a water treatment testbed for research and training on ICS security
TLDR
This paper presents the SWaT testbed, a modern industrial control system (ICS) for security research and training. Expand
  • 113
  • 9
Attacks on public WLAN-based positioning systems
TLDR
In this work, we study the security of public WLAN-based positioning systems, available on PCs and mobile platforms, including Apple's iPod touch and iPhone. Expand
  • 115
  • 8
  • PDF
Low-complexity Visible Light Networking with LED-to-LED communication
TLDR
We introduce the communication and networking protocols of LED-to-LED communication. Expand
  • 91
  • 8
  • PDF
Investigation of Signal and Message Manipulations on the Wireless Channel
TLDR
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. Expand
  • 76
  • 7
  • PDF
Detection of Unauthorized IoT Devices Using Machine Learning Techniques
TLDR
We train and evaluate multi-class classifiers to detect suspicious IoT device types from network traffic data and demonstrate their applicability to adversarial attacks. Expand
  • 88
  • 6
  • PDF
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis
TLDR
We apply machine learning algorithms on network traffic data for accurate identification of IoT devices connected to a network. Expand
  • 144
  • 4
  • PDF
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
TLDR
We review previous work on physics-based anomaly detection based on a unified taxonomy that allows us to identify limitations and unexplored challenges and propose new solutions. Expand
  • 81
  • 4
  • PDF