What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nils Ole Tippenhauer
Google Scholar
ORCID:
0000-0001-8424-2602
47
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
PreFence: A Fine-Grained and Scheduling-Aware Defense Against Prefetching-Based Attacks.
Till Schlüter
Nils Ole Tippenhauer
2025
conf/uss
GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays.
Tobias Scharnowski
Simeon Hoffmann
Moritz Bley
Simon Wörner
Daniel Klischies
Felix Buchmann
Nils Ole Tippenhauer
Thorsten Holz
Marius Muench
2023
conf/ccs
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Till Schlüter
Amit Choudhari
Lorenz Hetterich
Leon Trampert
Hamed Nemati
Ahmad Ibrahim
Michael Schwarz
Christian Rossow
Nils Ole Tippenhauer
2023
conf/dsn
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles.
Aolin Ding
Matthew Chan
Amin Hass
Nils Ole Tippenhauer
Shiqing Ma
Saman A. Zonouz
2022
conf/ccs
Déjà Vu? Challenges and Opportunities for AM Security from an ICS perspective.
Nils Ole Tippenhauer
2022
conf/ccs
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Ahmad Ibrahim
Hamed Nemati
Till Schlüter
Nils Ole Tippenhauer
Christian Rossow
2022
conf/ccs
Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
Alessandro Erba
Anne Müller
Nils Ole Tippenhauer
2022
conf/uss
Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
Yi Han
Matthew Chan
Zahra Aref
Nils Ole Tippenhauer
Saman A. Zonouz
2022
conf/acns
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
Herson Esquivel-Vargas
John Henry Castellanos
Marco Caselli
Nils Ole Tippenhauer
Andreas Peter
2022
conf/asiaccs
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy.
Daniele Antonioli
Nils Ole Tippenhauer
Kasper Rasmussen
Mathias Payer
2022
conf/acsac
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
Alessandro Erba
Nils Ole Tippenhauer
2021
conf/ccs
vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation.
Nils Ole Tippenhauer
Binbin Chen
Daisuke Mashima
David M. Nicol
2021
conf/uss
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Jianliang Wu
Ruoyu Wu
Daniele Antonioli
Mathias Payer
Nils Ole Tippenhauer
Dongyan Xu
Dave (Jing) Tian
Antonio Bianchi
2020
conf/ccs
A Statistical Analysis Framework for ICS Process Datasets.
Federico Turrin
Alessandro Erba
Nils Ole Tippenhauer
Mauro Conti
2020
conf/ccs
Trust, But Verify? Perspectives On Industrial Device Security.
Nils Ole Tippenhauer
2020
conf/sp
BIAS: Bluetooth Impersonation AttackS.
Daniele Antonioli
Nils Ole Tippenhauer
Kasper Rasmussen
2020
conf/acsac
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Alessandro Erba
Riccardo Taormina
Stefano Galelli
Marcello Pogliani
Michele Carminati
Stefano Zanero
Nils Ole Tippenhauer
2019
conf/ccs
CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy.
Nils Ole Tippenhauer
Avishai Wool
2019
conf/ccs
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
Dominik Breitenbacher
Ivan Homoliak
Yan Lin Aung
Nils Ole Tippenhauer
Yuval Elovici
2019
conf/uss
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
Daniele Antonioli
Nils Ole Tippenhauer
Kasper Bonne Rasmussen
2019
conf/acns
Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Jairo Giraldo
David I. Urbina
Alvaro A. Cárdenas
Nils Ole Tippenhauer
2019
conf/ndss
Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android.
Daniele Antonioli
Nils Ole Tippenhauer
Kasper Bonne Rasmussen
2018
conf/ccs
On Practical Threat Scenario Testing in an Electric Power ICS Testbed.
Ahnaf Siddiqi
Nils Ole Tippenhauer
Daisuke Mashima
Binbin Chen
2018
conf/ccs
CPS-SPC 2018: Fourth Workshop on Cyber-Physical Systems Security and PrivaCy.
Awais Rashid
Nils Ole Tippenhauer
2018
conf/esorics
Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies.
Xueou Wang
Xiaolu Hou
Ruben Rios
Per A. Hallgren
Nils Ole Tippenhauer
Martín Ochoa
2018
conf/wisec
WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic.
Ragav Sridharan
Rajib Ranjan Maiti
Nils Ole Tippenhauer
2017
conf/ccs
Towards Formal Security Analysis of Industrial Control Systems.
Marco Rocchetto
Nils Ole Tippenhauer
2017
conf/ccs
SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Juan David Guarnizo
Amit Tambe
Suman Sankar Bhunia
Martín Ochoa
Nils Ole Tippenhauer
Asaf Shabtai
Yuval Elovici
2017
conf/ccs
IoTScanner: Detecting Privacy Threats in IoT Neighborhoods.
Sandra Siby
Rajib Ranjan Maiti
Nils Ole Tippenhauer
2017
conf/ccs
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3.
Daniele Antonioli
Hamid Reza Ghaeini
Sridhar Adepu
Martín Ochoa
Nils Ole Tippenhauer
2017
conf/acns
Legacy-Compliant Data Authentication for Industrial Control System Traffic.
John Henry Castellanos
Daniele Antonioli
Nils Ole Tippenhauer
Martín Ochoa
2017
conf/esorics
Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios.
Rajib Ranjan Maiti
Sandra Siby
Ragav Sridharan
Nils Ole Tippenhauer
2017
conf/esorics
On Ladder Logic Bombs in Industrial Control Systems.
Naman Govil
Anand Agrawal
Nils Ole Tippenhauer
2017
conf/cans
Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN.
Daniele Antonioli
Sandra Siby
Nils Ole Tippenhauer
2016
conf/ccs
Limiting the Impact of Stealthy Attacks on Industrial Control Systems.
David I. Urbina
Jairo Alonso Giraldo
Alvaro A. Cárdenas
Nils Ole Tippenhauer
Junia Valente
Mustafa Amir Faisal
Justin Ruths
Richard Candell
Henrik Sandberg
2016
conf/ccs
Towards High-Interaction Virtual ICS Honeypots-in-a-Box.
Daniele Antonioli
Anand Agrawal
Nils Ole Tippenhauer
2016
conf/ccs
HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems.
Hamid Reza Ghaeini
Nils Ole Tippenhauer
2016
conf/esorics
On Attacker Models and Profiles for Cyber-Physical Systems.
Marco Rocchetto
Nils Ole Tippenhauer
2016
conf/acsac
Multi-receiver GPS spoofing detection: error models and realization.
Kai Jansen
Nils Ole Tippenhauer
Christina Pöpper
2015
conf/ccs
MiniCPS: A Toolkit for Security Research on CPS Networks.
Daniele Antonioli
Nils Ole Tippenhauer
2015
conf/wisec
UWB rapid-bit-exchange system for distance bounding.
Nils Ole Tippenhauer
Heinrich Luecken
Marc Kuhn
Srdjan Capkun
2013
conf/nspw
Go with the flow: toward workflow-oriented security assessment.
Binbin Chen
Zbigniew Kalbarczyk
David M. Nicol
William H. Sanders
Rui Tan
William G. Temple
Nils Ole Tippenhauer
An Hoa Vu
David K. Y. Yau
2013
conf/sp
On Limitations of Friendly Jamming for Confidentiality.
Nils Ole Tippenhauer
Luka Malisa
Aanjhan Ranganathan
Srdjan Capkun
2012
conf/esorics
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Aanjhan Ranganathan
Nils Ole Tippenhauer
Boris Skoric
Dave Singelée
Srdjan Capkun
2011
conf/ccs
On the requirements for successful GPS spoofing attacks.
Nils Ole Tippenhauer
Christina Pöpper
Kasper Bonne Rasmussen
Srdjan Capkun
2011
conf/esorics
Investigation of Signal and Message Manipulations on the Wireless Channel.
Christina Pöpper
Nils Ole Tippenhauer
Boris Danev
Srdjan Capkun
2009
conf/esorics
ID-Based Secure Distance Bounding and Localization.
Nils Ole Tippenhauer
Srdjan Capkun
Coauthors
Aanjhan Ranganathan
(2)
Ahmad Ibrahim
(2)
Ahnaf Siddiqi
(1)
Alessandro Erba
(4)
Alvaro A. Cárdenas
(2)
Amin Hass
(1)
Amit Choudhari
(1)
Amit Tambe
(1)
An Hoa Vu
(1)
Anand Agrawal
(2)
Andreas Peter
(1)
Anne Müller
(1)
Antonio Bianchi
(1)
Aolin Ding
(1)
Asaf Shabtai
(1)
Avishai Wool
(1)
Awais Rashid
(1)
Binbin Chen
(3)
Boris Danev
(1)
Boris Skoric
(1)
Christian Rossow
(2)
Christina Pöpper
(3)
Daisuke Mashima
(2)
Daniel Klischies
(1)
Daniele Antonioli
(10)
Dave (Jing) Tian
(1)
Dave Singelée
(1)
David I. Urbina
(2)
David K. Y. Yau
(1)
David M. Nicol
(2)
Dominik Breitenbacher
(1)
Dongyan Xu
(1)
Federico Turrin
(1)
Felix Buchmann
(1)
Hamed Nemati
(2)
Hamid Reza Ghaeini
(2)
Heinrich Luecken
(1)
Henrik Sandberg
(1)
Herson Esquivel-Vargas
(1)
Ivan Homoliak
(1)
Jairo Alonso Giraldo
(1)
Jairo Giraldo
(1)
Jianliang Wu
(1)
John Henry Castellanos
(2)
Juan David Guarnizo
(1)
Junia Valente
(1)
Justin Ruths
(1)
Kai Jansen
(1)
Kasper Bonne Rasmussen
(3)
Kasper Rasmussen
(2)
Leon Trampert
(1)
Lorenz Hetterich
(1)
Luka Malisa
(1)
Marc Kuhn
(1)
Marcello Pogliani
(1)
Marco Caselli
(1)
Marco Rocchetto
(2)
Marius Muench
(1)
Martín Ochoa
(4)
Mathias Payer
(2)
Matthew Chan
(2)
Mauro Conti
(1)
Michael Schwarz
(1)
Michele Carminati
(1)
Moritz Bley
(1)
Mustafa Amir Faisal
(1)
Naman Govil
(1)
Nils Ole Tippenhauer
(47)
Per A. Hallgren
(1)
Ragav Sridharan
(2)
Rajib Ranjan Maiti
(3)
Riccardo Taormina
(1)
Richard Candell
(1)
Ruben Rios
(1)
Rui Tan
(1)
Ruoyu Wu
(1)
Saman A. Zonouz
(2)
Sandra Siby
(3)
Shiqing Ma
(1)
Simeon Hoffmann
(1)
Simon Wörner
(1)
Srdjan Capkun
(6)
Sridhar Adepu
(1)
Stefano Galelli
(1)
Stefano Zanero
(1)
Suman Sankar Bhunia
(1)
Thorsten Holz
(1)
Till Schlüter
(3)
Tobias Scharnowski
(1)
William G. Temple
(1)
William H. Sanders
(1)
Xiaolu Hou
(1)
Xueou Wang
(1)
Yan Lin Aung
(1)
Yi Han
(1)
Yuval Elovici
(2)
Zahra Aref
(1)
Zbigniew Kalbarczyk
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to