What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ivan Martinovic
Google Scholar
71
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/wisec
SpaceJam: Protocol-aware Jamming Attacks against Space Communications.
Edd Salkield
Sebastian Köhler
Simon Birnbach
Martin Strohmeier
Ivan Martinovic
2025
conf/uss
Current Affairs: A Security Measurement Study of CCS EV Charging Deployments.
Marcell Szakály
Sebastian Köhler
Ivan Martinovic
2025
conf/uss
GLaDoS: Location-aware Denial-of-Service of Cellular Networks.
Simon Erni
Martin Kotuliak
Richard Baker
Ivan Martinovic
Srdjan Capkun
2024
conf/acsac
Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks.
Marcell Szakály
Sebastian Köhler
Martin Strohmeier
Ivan Martinovic
2023
conf/ccs
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting.
Joshua Smailes
Sebastian Köhler
Simon Birnbach
Martin Strohmeier
Ivan Martinovic
2023
conf/csr2
To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection.
Yashovardhan Sharma
Eleonora Giunchiglia
Simon Birnbach
Ivan Martinovic
2023
conf/ndss
Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging.
Sebastian Köhler
Richard Baker
Martin Strohmeier
Ivan Martinovic
2023
conf/wisec
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks.
Edd Salkield
Marcell Szakály
Joshua Smailes
Sebastian Köhler
Simon Birnbach
Martin Strohmeier
Ivan Martinovic
2022
conf/ccs
Demo: End-to-End Wireless Disruption of CCS EV Charging.
Sebastian Köhler
Richard Baker
Martin Strohmeier
Ivan Martinovic
2022
conf/uss
99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms.
Bushra A. AlAhmadi
Louise Axon
Ivan Martinovic
2022
conf/sp
Biometric Identification System based on Object Interactions in Internet of Things Environments.
Klaudia Krawiecka
Simon Birnbach
Simon Eberz
Ivan Martinovic
2022
conf/eurosp
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch.
Jack Sturgess
Simon Eberz
Ivo Sluganovic
Ivan Martinovic
2022
conf/asiaccs
Common Evaluation Pitfalls in Touch-Based Authentication Systems.
Martin Georgiev
Simon Eberz
Henry Turner
Giulio Lovisotto
Ivan Martinovic
2022
conf/asiaccs
Signal Injection Attacks against CCD Image Sensors.
Sebastian Köhler
Richard Baker
Ivan Martinovic
2021
conf/uss
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations.
Giulio Lovisotto
Henry Turner
Ivo Sluganovic
Martin Strohmeier
Ivan Martinovic
2021
conf/sp
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land.
Frederick Barr-Smith
Xabier Ugarte-Pedrero
Mariano Graziano
Riccardo Spolaor
Ivan Martinovic
2021
conf/asiaccs
On Detecting Deception in Space Situational Awareness.
James Pavur
Ivan Martinovic
2021
conf/asiaccs
MalPhase: Fine-Grained Malware Detection Using Network Flow Data.
Michal Piskozub
Fabio De Gaspari
Freddie Barr-Smith
Luigi V. Mancini
Ivan Martinovic
2021
conf/ndss
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Kai Jansen
Liang Niu
Nian Xue
Ivan Martinovic
Christina Pöpper
2021
conf/ndss
QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit.
James Pavur
Martin Strohmeier
Vincent Lenders
Ivan Martinovic
2021
conf/acsac
They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors.
Sebastian Köhler
Giulio Lovisotto
Simon Birnbach
Richard Baker
Ivan Martinovic
2020
conf/ccs
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior.
Bushra A. AlAhmadi
Enrico Mariconti
Riccardo Spolaor
Gianluca Stringhini
Ivan Martinovic
2020
conf/sp
A Tale of Sea and Sky On the Security of Maritime VSAT Communications.
James Pavur
Daniel Moser
Martin Strohmeier
Vincent Lenders
Ivan Martinovic
2020
conf/eurosp
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating.
Giulio Lovisotto
Simon Eberz
Ivan Martinovic
2020
conf/ndss
A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems.
Matthew Smith
Martin Strohmeier
Jon Harman
Vincent Lenders
Ivan Martinovic
2019
conf/ccs
Peeves: Physical Event Verification in Smart Homes.
Simon Birnbach
Simon Eberz
Ivan Martinovic
2019
conf/ccs
On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks.
Michal Piskozub
Riccardo Spolaor
Mauro Conti
Ivan Martinovic
2019
conf/ccs
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics.
Simon Eberz
Giulio Lovisotto
Kasper Bonne Rasmussen
Vincent Lenders
Ivan Martinovic
2019
conf/uss
Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging.
Richard Baker
Ivan Martinovic
2019
conf/esorics
Attacking Speaker Recognition Systems with Phoneme Morphing.
Henry Turner
Giulio Lovisotto
Ivan Martinovic
2019
conf/wisec
Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband.
James Pavur
Daniel Moser
Vincent Lenders
Ivan Martinovic
2018
journals/tifs
Robust Smartphone App Identification via Encrypted Network Traffic Analysis.
Vincent F. Taylor
Riccardo Spolaor
Mauro Conti
Ivan Martinovic
2018
journals/popets
Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS).
Matthew Smith
Daniel Moser
Martin Strohmeier
Vincent Lenders
Ivan Martinovic
2018
conf/sec
EMPower: Detecting Malicious Power Line Networks from EM Emissions.
Richard Baker
Ivan Martinovic
2018
conf/sp
When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts.
Simon Eberz
Giulio Lovisotto
Andrea Patane
Marta Kwiatkowska
Vincent Lenders
Ivan Martinovic
2018
conf/eurosp
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories.
Christian Vaas
Mika Juuti
N. Asokan
Ivan Martinovic
2018
conf/eurosp
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication.
Martin Strohmeier
Matthew Smith
Vincent Lenders
Ivan Martinovic
2018
conf/esorics
Surveying Aviation Professionals on the Security of the Air Traffic Control System.
Martin Strohmeier
Anna K. Niedbala
Matthias Schäfer
Vincent Lenders
Ivan Martinovic
2018
conf/ndss
Device Pairing at the Touch of an Electrode.
Marc Roeschlin
Ivan Martinovic
Kasper Bonne Rasmussen
2018
conf/wisec
Increasing Mix-Zone Efficacy for Pseudonym Change in VANETs using Chaff Messages.
Christian Vaas
Panos Papadimitratos
Ivan Martinovic
2017
conf/ccs
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Simon Eberz
Kasper Bonne Rasmussen
Vincent Lenders
Ivan Martinovic
2017
conf/ccs
To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution.
Vincent F. Taylor
Ivan Martinovic
2017
conf/fc
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS.
Matthew Smith
Daniel Moser
Martin Strohmeier
Vincent Lenders
Ivan Martinovic
2017
conf/fc
Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store.
Vincent F. Taylor
Ivan Martinovic
2017
conf/ndss
Broken Hearted: How To Attack ECG Biometrics.
Simon Eberz
Nicola Paoletti
Marc Roeschlin
Andrea Patané
Marta Kwiatkowska
Ivan Martinovic
2017
conf/ndss
Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones.
Simon Birnbach
Richard Baker
Ivan Martinovic
2017
conf/acsac
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens.
Ivo Sluganovic
Matej Serbec
Ante Derek
Ivan Martinovic
2017
conf/wisec
There are many apps for that: quantifying the availability of privacy-preserving apps.
Vincent F. Taylor
Alastair R. Beresford
Ivan Martinovic
2017
conf/cans
VisAuth: Authentication over a Visual Channel Using an Embedded Image.
Jack Sturgess
Ivan Martinovic
2016
conf/ccs
SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis.
Vincent F. Taylor
Ivan Martinovic
2016
conf/ccs
Using Reflexive Eye Movements for Fast Challenge-Response Authentication.
Ivo Sluganovic
Marc Roeschlin
Kasper Bonne Rasmussen
Ivan Martinovic
2016
conf/ccs
Secure Location Verification with a Mobile Receiver.
Richard Baker
Ivan Martinovic
2016
conf/ccs
DEMO: Starving Permission-Hungry Android Apps Using SecuRank.
Vincent F. Taylor
Ivan Martinovic
2016
conf/ccs
Exposing Transmitters in Mobile Multi-Agent Games.
Mai Ben-Adar Bessos
Simon Birnbach
Amir Herzberg
Ivan Martinovic
2016
conf/eurosp
AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network Traffic.
Vincent F. Taylor
Riccardo Spolaor
Mauro Conti
Ivan Martinovic
2015
conf/ccs
On Passive Data Link Layer Fingerprinting of Aircraft Transponders.
Martin Strohmeier
Ivan Martinovic
2015
conf/ccs
Lightweight Location Verification in Air Traffic Surveillance Networks.
Martin Strohmeier
Vincent Lenders
Ivan Martinovic
2015
conf/ndss
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.
Simon Eberz
Kasper Bonne Rasmussen
Vincent Lenders
Ivan Martinovic
2015
conf/acsac
Using Channel State Information for Tamper Detection in the Internet of Things.
Ibrahim Ethem Bagci
Utz Roedig
Ivan Martinovic
Matthias Schulz
Matthias Hollick
2014
conf/ndss
Authentication Using Pulse-Response Biometrics.
Kasper Bonne Rasmussen
Marc Roeschlin
Ivan Martinovic
Gene Tsudik
2014
conf/wisec
Gaining insight on friendly jamming in a real-world IEEE 802.11 network.
Daniel S. Berger
Francesco Gringoli
Nicolò Facchi
Ivan Martinovic
Jens B. Schmitt
2013
journals/tifs
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication.
Mario Frank
Ralf Biedert
Eugene Ma
Ivan Martinovic
Dawn Song
2013
conf/acns
Experimental Analysis of Attacks on Next Generation Air Traffic Communication.
Matthias Schäfer
Vincent Lenders
Ivan Martinovic
2013
conf/wisec
Who do you sync you are?: smartphone fingerprinting via application behaviour.
Tim Stöber
Mario Frank
Jens B. Schmitt
Ivan Martinovic
2012
conf/uss
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces.
Ivan Martinovic
Doug Davies
Mario Frank
Daniele Perito
Tomas Ros
Dawn Song
2012
conf/esorics
A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Simon Eberz
Martin Strohmeier
Matthias Wilhelm
Ivan Martinovic
2011
conf/wisec
Short paper: reactive jamming in wireless networks: how realistic is the threat?
Matthias Wilhelm
Ivan Martinovic
Jens B. Schmitt
Vincent Lenders
2010
conf/wisec
Secret keys from entangled sensor motes: implementation and analysis.
Matthias Wilhelm
Ivan Martinovic
Jens B. Schmitt
2009
conf/wisec
Jamming for good: a fresh approach to authentic communication in WSNs.
Ivan Martinovic
Paul Pichota
Jens B. Schmitt
2008
conf/wisec
Wireless client puzzles in IEEE 802.11 networks: security by wireless.
Ivan Martinovic
Frank A. Zdarsky
Matthias Wilhelm
Christian Wegmann
Jens B. Schmitt
2007
conf/sec
Phishing in the Wireless: Implementation and Analysis.
Ivan Martinovic
Frank A. Zdarsky
Adam Bachorek
Christian Jung
Jens B. Schmitt
Coauthors
Adam Bachorek
(1)
Alastair R. Beresford
(1)
Amir Herzberg
(1)
Andrea Patane
(2)
Anna K. Niedbala
(1)
Ante Derek
(1)
Bushra A. AlAhmadi
(2)
Christian Jung
(1)
Christian Vaas
(2)
Christian Wegmann
(1)
Christina Pöpper
(1)
Daniel Moser
(4)
Daniel S. Berger
(1)
Daniele Perito
(1)
Dawn Song
(2)
Doug Davies
(1)
Edd Salkield
(2)
Eleonora Giunchiglia
(1)
Enrico Mariconti
(1)
Eugene Ma
(1)
Fabio De Gaspari
(1)
Francesco Gringoli
(1)
Frank A. Zdarsky
(2)
Freddie Barr-Smith
(1)
Frederick Barr-Smith
(1)
Gene Tsudik
(1)
Gianluca Stringhini
(1)
Giulio Lovisotto
(7)
Henry Turner
(3)
Ibrahim Ethem Bagci
(1)
Ivan Martinovic
(71)
Ivo Sluganovic
(4)
Jack Sturgess
(2)
James Pavur
(4)
Jens B. Schmitt
(7)
Jon Harman
(1)
Joshua Smailes
(2)
Kai Jansen
(1)
Kasper Bonne Rasmussen
(6)
Klaudia Krawiecka
(1)
Liang Niu
(1)
Louise Axon
(1)
Luigi V. Mancini
(1)
Mai Ben-Adar Bessos
(1)
Marc Roeschlin
(4)
Marcell Szakály
(3)
Mariano Graziano
(1)
Mario Frank
(3)
Marta Kwiatkowska
(2)
Martin Georgiev
(1)
Martin Kotuliak
(1)
Martin Strohmeier
(17)
Matej Serbec
(1)
Matthew Smith
(4)
Matthias Hollick
(1)
Matthias Schäfer
(2)
Matthias Schulz
(1)
Matthias Wilhelm
(4)
Mauro Conti
(3)
Michal Piskozub
(2)
Mika Juuti
(1)
N. Asokan
(1)
Nian Xue
(1)
Nicola Paoletti
(1)
Nicolò Facchi
(1)
Panos Papadimitratos
(1)
Paul Pichota
(1)
Ralf Biedert
(1)
Riccardo Spolaor
(5)
Richard Baker
(9)
Sebastian Köhler
(9)
Simon Birnbach
(9)
Simon Eberz
(11)
Simon Erni
(1)
Srdjan Capkun
(1)
Tim Stöber
(1)
Tomas Ros
(1)
Utz Roedig
(1)
Vincent F. Taylor
(7)
Vincent Lenders
(15)
Xabier Ugarte-Pedrero
(1)
Yashovardhan Sharma
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to