关注
Ravishankar Borgaonkar
Ravishankar Borgaonkar
Research Fellow, University of Oxford
在 cs.ox.ac.uk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Practical Attacks Against Privacy and Availability in 4G/LTE
A Shaik, R Borgaonkar, JP Seifert, N Asokan, V Niem
23nd Annual Network and Distributed System Security Symposium, NDSS 2016 …, 2016
390*2016
Practical attacks against privacy and availability in 4G/LTE mobile communication systems
A Shaik, R Borgaonkar, N Asokan, V Niemi, JP Seifert
arXiv preprint arXiv:1510.07563, 2015
3902015
New privacy issues in mobile telephony: fix and verification
M Arapinis, L Mancini, E Ritter, M Ryan, N Golde, K Redon, R Borgaonkar
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2412012
SMS-Based One-Time Passwords: Attacks and Defense: (Short Paper)
C Mulliner, R Borgaonkar, P Stewin, JP Seifert
Detection of Intrusions and Malware, and Vulnerability Assessment: 10th …, 2013
1682013
New privacy threat on 3G, 4G, and upcoming 5G AKA protocols
R Borgaonkar, L Hirschi, S Park, A Shaik
Cryptology ePrint Archive, 2018
1432018
New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities
A Shaik, R Borgaonkar, S Park, JP Seifert
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
1362019
A security architecture for 5G networks
G Arfaoui, P Bisson, R Blom, R Borgaonkar, H Englund, E Félix, ...
IEEE access 6, 22466-22479, 2018
982018
Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications.
N Golde, K Redon, R Borgaonkar
NDSS, 2012
922012
White-Stingray: Evaluating IMSI Catchers Detection Applications
R Borgaonkar, S Park, A Shaik, A Martin, JP Seifert
60*2017
New paradigms for access control in constrained environments
A Cherkaoui, L Bossuet, L Seitz, G Selander, R Borgaonkar
2014 9th International Symposium on Reconfigurable and Communication-Centric …, 2014
522014
Improving smart grid security through 5G enabled IoT and edge computing
R Borgaonkar, I Anne Tøndel, M Zenebe Degefa, M Gilje Jaatun
Concurrency and Computation: Practice and Experience 33 (18), e6466, 2021
472021
On the impact of rogue base stations in 4g/lte self organizing networks
A Shaik, R Borgaonkar, S Park, JP Seifert
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
432018
Security analysis of a femtocell device
R Borgaonkar, K Redon, JP Seifert
Proceedings of the 4th International Conference on Security of Information …, 2011
402011
An analysis of the asprox botnet
R Borgaonkar
2010 Fourth International Conference on Emerging Security Information …, 2010
402010
Mobile subscriber wifi privacy
P O’hanlon, R Borgaonkar, L Hirschi
2017 IEEE Security and Privacy Workshops (SPW), 169-178, 2017
342017
Anatomy of commercial IMSI catchers and detectors
S Park, A Shaik, R Borgaonkar, JP Seifert
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 74-86, 2019
312019
Cellpot: A concept for next generation cellular network honeypots
S Liebergeld, M Lange, R Borgaonkar
Internet Society, 1-6, 2014
312014
Operator-based over-the-air M2M wireless sensor network security
S Agarwal, C Peylo, R Borgaonkar, JP Seifert
2010 14th International Conference on Intelligence in Next Generation …, 2010
292010
Analysis of trusted execution environment usage in samsung KNOX
A Atamli-Reineh, R Borgaonkar, RA Balisane, G Petracca, A Martin
Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016
262016
Security usability of petname systems
MS Ferdous, A Jøsang, K Singh, R Borgaonkar
Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure …, 2009
262009
系统目前无法执行此操作,请稍后再试。
文章 1–20