Author of the publication

Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves.

, , , , and . CNS, page 335-343. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation., , , and . SP, page 1229-1245. IEEE, (2022)Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices., and . CoRR, (2019)Analyzing TETRA Location Privacy and Network Availability., , , , and . SPSM@CCS, page 117-122. ACM, (2016)Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace., , and . INFOCOM Workshops, page 1093-1094. IEEE, (2016)Very Pwnable Network: Cisco AnyConnect Security Analysis., , , and . CNS, page 56-64. IEEE, (2021)Security and Privacy for IoT Ecosystems.. Darmstadt University of Technology, Germany, (2020)Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves., , , , and . CNS, page 335-343. IEEE, (2015)SoK: On the Effectiveness of Control-Flow Integrity in Practice., , and . WOOT @ USENIX Security Symposium, page 189-209. USENIX Association, (2024)AirTag of the Clones: Shenanigans with Liberated Item Finders., , , and . SP (Workshops), page 301-311. IEEE, (2022)Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem., , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2019)