关注
Richard Mitev
Richard Mitev
Doctoral Researcher at Technical University of Darmstadt
在 trust.tu-darmstadt.de 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Mind the gap: Security & privacy risks of contact tracing apps
L Baumgärtner, A Dmitrienko, B Freisleben, A Gruler, J Höchst, ...
2020 IEEE 19th international conference on trust, security and privacy in …, 2020
912020
Alexa lied to me: Skill-based man-in-the-middle attacks on virtual assistants
R Mitev, M Miettinen, AR Sadeghi
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
662019
Leakypick: Iot audio spy detector
R Mitev, A Pazii, M Miettinen, W Enck, AR Sadeghi
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
402020
GhostTouch: Targeted attacks on touchscreens without physical touch
K Wang, R Mitev, C Yan, X Ji, AR Sadeghi, W Xu
31st USENIX Security Symposium (USENIX Security 22), 1543-1559, 2022
222022
Fakewake: Understanding and mitigating fake wake-up words of voice assistants
Y Chen, Y Bai, R Mitev, K Wang, AR Sadeghi, W Xu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
202021
Wight: Wired ghost touch attack on capacitive touchscreens
Y Jiang, X Ji, K Wang, C Yan, R Mitev, AR Sadeghi, W Xu
2022 IEEE Symposium on Security and Privacy (SP), 984-1001, 2022
142022
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M
XM Saß, R Mitev, AR Sadeghi
32nd USENIX Security Symposium (USENIX Security 23), 6239-6256, 2023
92023
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users
D Koisser, R Mitev, M Chilese, AR Sadeghi
arXiv preprint arXiv:2307.14879, 2023
22023
Unleashing iot security: Assessing the effectiveness of best practices in protecting against threats
P Pütz, R Mitev, M Miettinen, AR Sadeghi
Proceedings of the 39th Annual Computer Security Applications Conference …, 2023
12023
Marionette: Manipulate your touchscreen via a charging cable
Y Jiang, X Ji, K Wang, C Yan, R Mitev, AR Sadeghi, W Xu
IEEE Transactions on Dependable and Secure Computing, 2023
12023
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
M Chilese, R Mitev, M Orenbach, R Thorburn, A Atamli, AR Sadeghi
arXiv preprint arXiv:2403.07465, 2024
2024
Analyzing and Defending GhostTouch Attack against Capacitive Touchscreens
K Wang, R Mitev, C Yan, X Ji, AR Sadeghi, W Xu
IEEE Transactions on Dependable and Secure Computing, 2024
2024
D3. 2: ASSURED LAYERED ATTESTATION AND RUNTIME VERIFICATION ENABLERS DESIGN & IMPLEMENTATION
R Mitev, P Rieger, M Orenbach
2020
D3. 6: ASSURED SECURE AND SCALABLE AGGREGATE NETWORK ATTESATION
R Mitev, P Rieger, D Karras
2020
D1. 3 OPERATIONAL SOS PROCESS MODELS & SPECIFICATION OF PROPERTIES
J Wang, F Brasser, R Mitev, I Avramidis
2020
系统目前无法执行此操作,请稍后再试。
文章 1–15