Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices., and . CoRR, (2019)Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (1): 5:1-5:24 (2018)Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation., , , and . CoRR, (2021)Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging., , , , , , , and . CoRR, (2021)Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation., , , and . SP, page 1229-1245. IEEE, (2022)Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets., , , and . USENIX Security Symposium, page 19-36. USENIX Association, (2020)Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem., , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2019)Practical VLC to WiFi Handover Mechanisms., , , , and . EWSN, page 324-329. ACM, (2019)Improving the Reliability of Bluetooth Low Energy Connections., , , , and . EWSN, page 144-155. ACM, (2020)AirTag of the Clones: Shenanigans with Liberated Item Finders., , , and . SP (Workshops), page 301-311. IEEE, (2022)