The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications J Classen, J Chen, D Steinmetzer, M Hollick, E Knightly Proceedings of the 2nd International Workshop on Visible Light …, 2015 | 79 | 2015 |
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware J Classen, D Wegemer, P Patras, T Spink, M Hollick Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018 | 76 | 2018 |
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets J Ruge, J Classen, F Gringoli, M Hollick 29th USENIX Security Symposium (USENIX Security 20), 19-36, 2020 | 62 | 2020 |
Practical Covert Channels for WiFi Systems J Classen, M Schulz, M Hollick 2015 IEEE Conference on Communications and Network Security (CNS), 209-217, 2015 | 62 | 2015 |
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves D Steinmetzer, J Chen, J Classen, E Knightly, M Hollick 2015 IEEE Conference on Communications and Network Security (CNS), 335-343, 2015 | 59 | 2015 |
InternalBlue – Bluetooth Binary Patching and Experimentation Framework D Mantz, J Classen, M Schulz, M Hollick Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 56 | 2019 |
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit H Fereidooni, J Classen, T Spink, P Patras, M Miettinen, AR Sadeghi, ... International Symposium on Research in Attacks, Intrusions, and Defenses, 48-69, 2017 | 44 | 2017 |
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain J Chen, D Steinmetzer, J Classen, E Knightly, M Hollick 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2017 | 36 | 2017 |
CA Trust Management for the Web PKI J Braun, F Volk, J Classen, J Buchmann, M Mühlhäuser Journal of Computer Security 22 (6), 913-959, 2014 | 30 | 2014 |
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer J Classen, D Steinmetzer, M Hollick Proceedings of the 3rd Workshop on Visible Light Communication Systems, 19-24, 2016 | 28 | 2016 |
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Raytracing D Steinmetzer, J Classen, M Hollick 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016 | 23 | 2016 |
Improving the Reliability of Bluetooth Low Energy Connections. M Spörk, J Classen, CA Boano, M Hollick, K Römer Proceedings of the 2020 International Conference on Embedded Wireless …, 2020 | 22 | 2020 |
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices J Classen, M Hollick 12th Conference on Security and Privacy in Wireless and Mobile Networks, 186-191, 2019 | 15 | 2019 |
Ghost Peak: Practical Distance Reduction Attacks Against {HRP}{UWB} Ranging P Leu, G Camurati, A Heinrich, M Roeschlin, C Anliker, M Hollick, ... 31st USENIX Security Symposium (USENIX Security 22), 1343-1359, 2022 | 14 | 2022 |
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information M Weller, J Classen, F Ullrich, D Waßmann, E Tews 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020 | 13 | 2020 |
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem F Ullrich, J Classen, J Eger, M Hollick 13th USENIX Workshop on Offensive Technologies (WOOT 19), 2019 | 13 | 2019 |
MagicPairing: Apple's Take on Securing Bluetooth Peripherals D Heinze, J Classen, F Rohrbach 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020 | 8 | 2020 |
A Distributed Reputation System for Certification Authority Trust Management J Classen, J Braun, F Volk, M Hollick, J Buchmann, M Mühlhäuser 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1349-1356, 2015 | 8 | 2015 |
ARIstoteles–Dissecting Apple’s Baseband Interface T Kröll, S Kleber, F Kargl, M Hollick, J Classen Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 7 | 2021 |
Evil never sleeps: when wireless malware stays on after turning off iphones J Classen, A Heinrich, R Reith, M Hollick Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | 6 | 2022 |