Decentralized privacy-preserving proximity tracing C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ... arXiv preprint arXiv:2005.12273, 2020 | 348 | 2020 |
MiniCPS: A toolkit for security research on CPS networks D Antonioli, NO Tippenhauer Proceedings of the First ACM workshop on cyber-physical systems-security and …, 2015 | 144 | 2015 |
BIAS: Bluetooth Impersonation AttackS D Antonioli, NO Tippenhauer, K Rasmussen 2020 IEEE symposium on security and privacy (SP), 549-562, 2020 | 117 | 2020 |
Early evidence of effectiveness of digital contact tracing for SARS-CoV-2 in Switzerland M Salathé, CL Althaus, N Anderegg, D Antonioli, T Ballauz, B Edouard, ... medRxiv, 2020.09. 07.20189274, 2020 | 112 | 2020 |
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR D Antonioli, NO Tippenhauer, K Rasmussen USENIX Security, 2019 | 101 | 2019 |
Towards high-interaction virtual ICS honeypots-in-a-box D Antonioli, A Agrawal, NO Tippenhauer Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and …, 2016 | 76 | 2016 |
Key negotiation downgrade attacks on bluetooth and bluetooth low energy D Antonioli, NO Tippenhauer, K Rasmussen ACM Transactions on Privacy and Security (TOPS) 23 (3), 1-28, 2020 | 61* | 2020 |
Gamifying ICS security training and research: Design, implementation, and results of S3 D Antonioli, HR Ghaeini, S Adepu, M Ochoa, NO Tippenhauer Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017 | 60* | 2017 |
State-Aware Anomaly Detection for Industrial Control Systems HR Ghaeini, D Antonioli, F Brasser, AR Sadeghi, NO Tippenhauer Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC), 2018 | 51 | 2018 |
Legacy-Compliant Data Authentication for Industrial Control System Traffic JH Castellanos, D Antonioli, NO Tippenhauer, M Ochoa Proceedings of the International Conference on Applied Cryptography and …, 2017 | 39 | 2017 |
Decentralized privacy-preserving proximity tracing (2020) C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ... arXiv preprint arXiv:2005.12273, 2020 | 35 | 2020 |
On-chip lightweight implementation of reduced NIST randomness test suite VB Suresh, D Antonioli, WP Burleson Proceedings of the IEEE Hardware-Oriented Security and Trust (HOST …, 2013 | 35 | 2013 |
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks J Wu, R Wu, D Antonioli, M Payer, NO Tippenhauer, D Xu, DJ Tian, ... Proceedings of the USENIX Security Symposium (USENIX Security), 2021 | 32 | 2021 |
BLURtooth: Exploiting cross-transport key derivation in Bluetooth Classic and Bluetooth Low Energy D Antonioli, NO Tippenhauer, K Rasmussen, M Payer Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 31 | 2022 |
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android D Antonioli, NO Tippenhauer, K Rasmussen Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019 | 28 | 2019 |
Taking control: Design and implementation of botnets for cyber-physical attacks with cpsbot D Antonioli, G Bernieri, NO Tippenhauer arXiv preprint arXiv:1802.00152, 2018 | 18 | 2018 |
Practical Evaluation of Passive COTS Eavesdropping in 802.11 b/n/ac WLAN D Antonioli, S Siby, NO Tippenhauer Proceedings of the International Conference on Cryptology and Network …, 2017 | 9 | 2017 |
Breakmi: Reversing, exploiting and fixing xiaomi fitness tracking ecosystem M Casagrande, E Losiouk, M Conti, M Payer, D Antonioli IACR Transactions on Cryptographic Hardware and Embedded Systems, 330-366, 2022 | 7 | 2022 |
BLUFFS: Bluetooth forward and future secrecy attacks and defenses D Antonioli Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 4 | 2023 |
On the insecurity of vehicles against protocol-level bluetooth threats D Antonioli, M Payer 2022 IEEE Security and Privacy Workshops (SPW), 353-362, 2022 | 3 | 2022 |