Æȷοì
Kasper Rasmussen
Á¦¸ñ
Àοë
Àοë
¿¬µµ
On the requirements for successful GPS spoofing attacks
NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun
Proceedings of the 18th ACM conference on Computer and communications ¡¦, 2011
6932011
Implications of radio fingerprinting on the security of sensor networks
KB Rasmussen, S Capkun
2007 Third International Conference on Security and Privacy in ¡¦, 2007
3612007
Proximity-based access control for implantable medical devices
KB Rasmussen, C Castelluccia, TS Heydt-Benjamin, S Capkun
Proceedings of the 16th ACM conference on Computer and communications ¡¦, 2009
3022009
Realization of {RF} distance bounding
KB Rasmussen, S Capkun
19th USENIX Security Symposium (USENIX Security 10), 2010
2892010
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE symposium on security and privacy, 113-127, 2012
2222012
A minimalist approach to remote attestation
A Francillon, Q Nguyen, KB Rasmussen, G Tsudik
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2014
1762014
Secure location verification with hidden and mobile base stations
S Capkun, K Rasmussen, M Cagalj, M Srivastava
IEEE Transactions on Mobile Computing 7 (4), 470-483, 2008
1682008
Attacks on public WLAN-based positioning systems
NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun
Proceedings of the 7th international conference on Mobile systems ¡¦, 2009
1502009
Evaluating behavioral biometrics for continuous authentication: Challenges and metrics
S Eberz, KB Rasmussen, V Lenders, I Martinovic
Proceedings of the 2017 ACM on Asia conference on computer and ¡¦, 2017
1132017
Location privacy of distance bounding protocols
KB Rasmussen, S Čapkun
Proceedings of the 15th ACM conference on Computer and communications ¡¦, 2008
1102008
Bias: Bluetooth impersonation attacks
D Antonioli, NO Tippenhauer, K Rasmussen
2020 IEEE symposium on security and privacy (SP), 549-562, 2020
1082020
On the security of password manager database formats
P Gasti, KB Rasmussen
Computer Security–ESORICS 2012: 17th European Symposium on Research in ¡¦, 2012
1052012
Using reflexive eye movements for fast challenge-response authentication
I Sluganovic, M Roeschlin, KB Rasmussen, I Martinovic
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications ¡¦, 2016
992016
The {KNOB} is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth {BR/EDR}
D Antonioli, NO Tippenhauer, KB Rasmussen
28th USENIX security symposium (USENIX security 19), 1047-1061, 2019
922019
Taxonomy and challenges of out-of-band signal injection attacks and defenses
I Giechaskiel, K Rasmussen
IEEE Communications Surveys & Tutorials 22 (1), 645-670, 2019
872019
Leaky wires: Information leakage and covert communication between FPGA long wires
I Giechaskiel, KB Rasmussen, K Eguro
Proceedings of the 2018 on Asia Conference on Computer and Communications ¡¦, 2018
872018
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
832018
Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics
S Eberz, K Rasmussen, V Lenders, I Martinovic
Network and Distributed System Security (NDSS) Symposium, 2015
832015
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage
I Giechaskiel, KB Rasmussen, J Szefer
2020 IEEE Symposium on Security and Privacy (SP), 1728-1741, 2020
792020
Authentication Using Pulse− Response Biometrics
K Rasmussen, M Roeschlin, I Martinovic, G Tsudik
782014
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20