Author of the publication

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.

, , , , , and . MobiCom, page 375-386. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of Multicarrier Time-of-Flight Ranging., , , and . ACSAC, page 887-899. ACM, (2021)LTrack: Stealthy Tracking of Mobile Phones in LTE., , , , and . CoRR, (2021)AdaptOver: adaptive overshadowing attacks in cellular networks., , , , and . MobiCom, page 743-755. ACM, (2022)Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging., , , , , , , and . USENIX Security Symposium, page 1343-1359. USENIX Association, (2022)Security analysis of IEEE 802.15.4z/HRP UWB time-of-flight distance measurement., , , , and . WISEC, page 227-237. ACM, (2021)Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement., , , , and . IACR Cryptology ePrint Archive, (2019)I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks., , , and . WISEC, page 23-33. ACM, (2018)UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband., , , and . USENIX Security Symposium, page 73-88. USENIX Association, (2019)LTrack: Stealthy Tracking of Mobile Phones in LTE., , , , and . USENIX Security Symposium, page 1291-1306. USENIX Association, (2022)Secure Ranging: Physical-Layer Attacks and Countermeasures.. ETH Zurich, Zürich, Switzerland, (2023)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/609178).