@inproceedings {291126, author = {Claudio Anliker and Giovanni Camurati and Srdjan Capkun}, title = {Time for Change: How Clocks Break {UWB} Secure Ranging}, booktitle = {32nd USENIX Security Symposium (USENIX Security 23)}, year = {2023}, isbn = {978-1-939133-37-3}, address = {Anaheim, CA}, pages = {19--36}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/anliker}, publisher = {USENIX Association}, month = aug } @inproceedings {279984, author = {Patrick Leu and Giovanni Camurati and Alexander Heinrich and Marc Roeschlin and Claudio Anliker and Matthias Hollick and Srdjan Capkun and Jiska Classen}, title = {Ghost Peak: Practical Distance Reduction Attacks Against {HRP} {UWB} Ranging}, booktitle = {31st USENIX Security Symposium (USENIX Security 22)}, year = {2022}, isbn = {978-1-939133-31-1}, address = {Boston, MA}, pages = {1343--1359}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/leu}, publisher = {USENIX Association}, month = aug } @inproceedings {277192, author = {Martin Kotuliak and Simon Erni and Patrick Leu and Marc R{\"o}schlin and Srdjan Capkun}, title = {{LTrack}: Stealthy Tracking of Mobile Phones in {LTE}}, booktitle = {31st USENIX Security Symposium (USENIX Security 22)}, year = {2022}, isbn = {978-1-939133-31-1}, address = {Boston, MA}, pages = {1291--1306}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/kotuliak}, publisher = {USENIX Association}, month = aug } @inproceedings {274699, author = {Ivan Puddu and Moritz Schneider and Miro Haller and Srdjan Capkun}, title = {Frontal Attack: Leaking {Control-Flow} in {SGX} via the {CPU} Frontend}, booktitle = {30th USENIX Security Symposium (USENIX Security 21)}, year = {2021}, isbn = {978-1-939133-24-3}, pages = {663--680}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/puddu}, publisher = {USENIX Association}, month = aug } @inproceedings {274610, author = {Enis Ulqinaku and Hala Assal and AbdelRahman Abdou and Sonia Chiasson and Srdjan Capkun}, title = {Is Real-time Phishing Eliminated with {FIDO}? Social Engineering Downgrade Attacks against {FIDO} Protocols}, booktitle = {30th USENIX Security Symposium (USENIX Security 21)}, year = {2021}, isbn = {978-1-939133-24-3}, pages = {3811--3828}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ulqinaku}, publisher = {USENIX Association}, month = aug } @inproceedings {235469, author = {Sinisa Matetic and Karl W{\"u}st and Moritz Schneider and Kari Kostiainen and Ghassan Karame and Srdjan Capkun}, title = {{BITE}: Bitcoin Lightweight Client Privacy using Trusted Execution}, booktitle = {28th USENIX Security Symposium (USENIX Security 19)}, year = {2019}, isbn = {978-1-939133-06-9}, address = {Santa Clara, CA}, pages = {783--800}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/matetic}, publisher = {USENIX Association}, month = aug } @inproceedings {225984, author = {David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani and Srdjan Capkun}, title = {Deniable Upload and Download via Passive Participation}, booktitle = {16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)}, year = {2019}, isbn = {978-1-931971-49-2}, address = {Boston, MA}, pages = {649--666}, url = {https://www.usenix.org/conference/nsdi19/presentation/sommer}, publisher = {USENIX Association}, month = feb } @inproceedings {235453, author = {Mridula Singh and Patrick Leu and AbdelRahman Abdou and Srdjan Capkun}, title = {{UWB-ED}: Distance Enlargement Attack Detection in {Ultra-Wideband}}, booktitle = {28th USENIX Security Symposium (USENIX Security 19)}, year = {2019}, isbn = {978-1-939133-06-9}, address = {Santa Clara, CA}, pages = {73--88}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/singh}, publisher = {USENIX Association}, month = aug } @inproceedings {217521, author = {Sinisa Matetic and Moritz Schneider and Andrew Miller and Ari Juels and Srdjan Capkun}, title = {{DelegaTEE}: Brokered Delegation Using Trusted Execution Environments}, booktitle = {27th USENIX Security Symposium (USENIX Security 18)}, year = {2018}, isbn = {978-1-939133-04-5}, address = {Baltimore, MD}, pages = {1387--1403}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/matetic}, publisher = {USENIX Association}, month = aug } @inproceedings {203712, author = {Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun}, title = {{ROTE}: Rollback Protection for Trusted Execution}, booktitle = {26th USENIX Security Symposium (USENIX Security 17)}, year = {2017}, isbn = {978-1-931971-40-9}, address = {Vancouver, BC}, pages = {1289-1306}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/matetic}, publisher = {USENIX Association}, month = aug } @inproceedings {206170, author = {Ferdinand Brasser and Urs M{\"u}ller and Alexandra Dmitrienko and Kari Kostiainen and Srdjan Capkun and Ahmad-Reza Sadeghi}, title = {Software Grand Exposure: {SGX} Cache Attacks Are Practical}, booktitle = {11th USENIX Workshop on Offensive Technologies (WOOT 17)}, year = {2017}, address = {Vancouver, BC}, url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/brasser}, publisher = {USENIX Association}, month = aug } @inproceedings {190980, author = {Nikolaos Karapanos and Claudio Marforio and Claudio Soriente and Srdjan Capkun}, title = {{Sound-Proof}: Usable {Two-Factor} Authentication Based on Ambient Sound}, booktitle = {24th USENIX Security Symposium (USENIX Security 15)}, year = {2015}, isbn = {978-1-939133-11-3}, address = {Washington, D.C.}, pages = {483--498}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/karapanos}, publisher = {USENIX Association}, month = aug } @inproceedings {190938, author = {Ramya Jayaram Masti and Devendra Rai and Aanjhan Ranganathan and Christian M{\"u}ller and Lothar Thiele and Srdjan Capkun}, title = {Thermal Covert Channels on Multi-core Platforms}, booktitle = {24th USENIX Security Symposium (USENIX Security 15)}, year = {2015}, isbn = {978-1-939133-11-3}, address = {Washington, D.C.}, pages = {865--880}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/masti}, publisher = {USENIX Association}, month = aug } @inproceedings {184471, author = {Nikolaos Karapanos and Srdjan Capkun}, title = {On the Effective Prevention of {TLS} {Man-in-the-Middle} Attacks in Web Applications}, booktitle = {23rd USENIX Security Symposium (USENIX Security 14)}, year = {2014}, isbn = {978-1-931971-15-7}, address = {San Diego, CA}, pages = {671--686}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/karapanos}, publisher = {USENIX Association}, month = aug } @inproceedings {180222, author = {Joel Reardon and Srdjan Capkun and David Basin}, title = {Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory}, booktitle = {21st USENIX Security Symposium (USENIX Security 12)}, year = {2012}, isbn = {978-931971-95-9}, address = {Bellevue, WA}, pages = {333--348}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/reardon}, publisher = {USENIX Association}, month = aug } @inproceedings {267204, author = {Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Realization of {RF} Distance Bounding}, booktitle = {19th USENIX Security Symposium (USENIX Security 10)}, year = {2010}, address = {Washington, DC}, url = {https://www.usenix.org/conference/usenixsecurity10/realization-rf-distance-bounding}, publisher = {USENIX Association}, month = aug }