USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 16 results:
Filters: Author is Srdjan Capkun [Clear All Filters]
Time for Change: How Clocks Break UWB Secure Ranging. 32nd USENIX Security Symposium (USENIX Security 23). :19--36.
.
2023. Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. 31st USENIX Security Symposium (USENIX Security 22). :1343--1359.
.
2022. LTrack: Stealthy Tracking of Mobile Phones in LTE. 31st USENIX Security Symposium (USENIX Security 22). :1291--1306.
.
2022. Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend. 30th USENIX Security Symposium (USENIX Security 21). :663--680.
.
2021. Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols 30th USENIX Security Symposium (USENIX Security 21). :3811--3828.
.
2021. BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. 28th USENIX Security Symposium (USENIX Security 19). :783--800.
.
2019. Deniable Upload and Download via Passive Participation. 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). :649--666.
.
2019. UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband. 28th USENIX Security Symposium (USENIX Security 19). :73--88.
.
2019. DelegaTEE: Brokered Delegation Using Trusted Execution Environments. 27th USENIX Security Symposium (USENIX Security 18). :1387--1403.
.
2018. ROTE: Rollback Protection for Trusted Execution. 26th USENIX Security Symposium (USENIX Security 17). :1289-1306.
.
2017. Software Grand Exposure: SGX Cache Attacks Are Practical. 11th USENIX Workshop on Offensive Technologies (WOOT 17).
.
2017. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. 24th USENIX Security Symposium (USENIX Security 15). :483--498.
.
2015. Thermal Covert Channels on Multi-core Platforms. 24th USENIX Security Symposium (USENIX Security 15). :865--880.
.
2015. On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications. 23rd USENIX Security Symposium (USENIX Security 14). :671--686.
.
2014. Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. 21st USENIX Security Symposium (USENIX Security 12). :333--348.
.
2012. Realization of RF Distance Bounding. 19th USENIX Security Symposium (USENIX Security 10).
.
2010.