Skip to main content

Ivan Martinovic : Publications

Click here to download all publications in a single bibtex file

@inproceedings{smailes2024sticky,
  title = "Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks",
  author = "Smailes, Joshua and Salkield, Edd and Köhler, Sebastian and Birnbach, Simon and Strohmeier, Martin and Martinovic, Ivan",
  year = "2024",
  booktitle = "2nd Workshop on Security of Space and Satellite Systems (SpaceSec)",
  location = "San Diego, CA, USA",
  month = "Mar",
  doi = "10.14722/spacesec.2024.23054",
}
@conference{radar-sharma-eicc23,
  title = "RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection",
  author = "Yashovardhan Sharma and Simon Birnbach and Ivan Martinovic",
  year = "2023",
  affiliation = "University of Oxford",
  booktitle = "Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference (EICC'23)",
  journal = "EICC",
  location = "Stavanger, Norway",
  month = "June",
  pages = "159–166",
  publisher = "Association for Computing Machinery (ACM)",
  url = "https://dl.acm.org/doi/10.1145/3590777.3590804",
  doi = "https://doi.org/10.1145/3590777.3590804",
}
@inproceedings{Salkield23,
  title = "Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks",
  author = "Salkield, Edd and Szakály, Marcell and Smailes, Joshua and Birnbach, Simon and Köhler, Sebastian and Strohmeier, Martin and Martinovic, Ivan",
  year = "2023",
  booktitle = "Proceedings of the 16th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)",
  month = "May",
  note = "\textbf{Best Paper Award: Runner Up!}",
  url = "https://ora.ox.ac.uk/objects/uuid:e9d5d85f-b77f-4f11-8006-17dd88660467/download_file?file_format=application%2Fpdf&safe_filename=Salkield_et_al_2023_satellite_spoofing_from.pdf&type_of_work=Conference+item",
}
@article{smailes2023dishing,
  title = "Dishing Out DoS: How to Disable and Secure the Starlink User Terminal",
  author = "Smailes, Joshua and Salkield, Edd and Köhler, Sebastian and Birnbach, Simon and Martinovic, Ivan",
  year = "2023",
  journal = "arXiv preprint arXiv:2303.00582",
  month = "March",
  url = "https://arxiv.org/abs/2303.00582",
}
@inproceedings{brokenwire,
  title = "BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging",
  author = "Koehler, Sebastian and Baker, Richard and Strohmeier, Martin and Martinovic, Ivan",
  year = "2023",
  booktitle = "The Network and Distributed System Security Symposium (NDSS)",
  month = "Feb",
  url = "https://brokenwire.fail",
}
@inproceedings{smailes2023watch,
  title = "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting",
  author = "Smailes, Joshua and Köhler, Sebastian and Birnbach, Simon and Strohmeier, Martin and Martinovic, Ivan",
  year = "2023",
  booktitle = "Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 23)",
  month = "Nov",
  url = "https://arxiv.org/abs/2305.06947",
  doi = "10.1145/3576915.3623135",
}
@inproceedings{10225000,
  title = "{To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware Detection}",
  author = "Sharma, Yashovardhan and Giunchiglia, Eleonora and Birnbach, Simon and Martinovic, Ivan",
  year = "2023",
  booktitle = "2023 IEEE International Conference on Cyber Security and Resilience (CSR)",
  pages = "8-15",
  doi = "10.1109/CSR57506.2023.10225000",
}
@inproceedings{10.1145/3590777.3590804,
  title = "RADAR: A TTP-Based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection",
  author = "Sharma, Yashovardhan and Birnbach, Simon and Martinovic, Ivan",
  year = "2023",
  address = "New York, NY, USA",
  booktitle = "Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference",
  isbn = "9781450398299",
  keywords = "Network Analysis, Explainable AI, Malware, Cyber Security",
  location = "Stavanger, Norway",
  pages = "159–166",
  publisher = "Association for Computing Machinery",
  series = "EICC '23",
  url = "https://doi.org/10.1145/3590777.3590804",
  doi = "10.1145/3590777.3590804",
}
@inproceedings{15776,
  title = "CableAuth: a biometric second factor authentication scheme for electric vehicle charging",
  author = "Jack Sturgess and Sebastian Köhler and Simon Birnbach and Ivan Martinovic",
  year = "2023",
  booktitle = "Proc. Inaugural Symposium on Vehicle Security and Privacy (VehicleSec 2023)",
  publisher = "Internet Society",
}
@inproceedings{15674,
  title = "BROKENWIRE: wireless disruption of CCS electric vehicle charging",
  author = "Sebastian Köhler and Richard Baker and Martin Strohmeier and Ivan Martinovic",
  year = "2023",
  booktitle = "In Proc. Network and Distributed System Security (NDSS) Symposium 2023",
  publisher = "Internet Society",
}
@inproceedings{baselt22cycon,
  title = "Security and Privacy Issues of Satellite Communication in the Aviation Domain",
  author = "Baselt, Georg and Strohmeier, Martin and Pavur, James and Lenders, Vincent and Martinovic, Ivan",
  year = "2022",
  booktitle = "Cyber Conflict (CYCON), 2022 14th International Conference on",
  month = "May",
}
@inproceedings{15677,
  title = "Fingerprinting and personal information leakage from touchscreen interactions",
  author = "Martin Georgiev and Simon Eberz and Ivan Martinovic",
  year = "2022",
  booktitle = "In Proc. 21st Workshop on Privacy in the Electronic Society (WPES 2022)",
  publisher = "ACM",
}
@inproceedings{15676,
  title = "Exorcist: automated differential analysis to detect compromises in closed-source software supply chains",
  author = "Frederick Barr-Smith and Richard Baker and Tim Blazytko and Ivan Martinovic",
  year = "2022",
  booktitle = "In Proc. ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED '22)",
  publisher = "ACM",
}
@inproceedings{15675,
  title = "Techniques for continuous touch-based authentication",
  author = "Martin Georgiev and Simon Eberz and Ivan Martinovic",
  year = "2022",
  booktitle = "In Proc. 17th International Conference on Information Security Practice and Experience (ISPEC 2022)",
  publisher = "Springer",
}
@inproceedings{15673,
  title = "On the security of the wireless electric vehicle charging communication",
  author = "Sebastian Köhler and Simon Birnbach and Richard Baker and Ivan Martinovic",
  year = "2022",
  booktitle = "Proc. Workshop Cybersecurity of Electric Vehicle Charging and Smart Grid Resources (SECEVC)",
  publisher = "IEEE",
}
@inproceedings{14947,
  title = "WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch",
  author = "Jack Sturgess and Simon Eberz and Ivo Sluganovic and Ivan Martinovic",
  year = "2022",
  booktitle = "Proc. 7th IEEE European Symposium on Security and Privacy (EuroS&P)",
  publisher = "IEEE",
}
@inproceedings{14899,
  title = "WatchAuth: user authentication and intent recognition in mobile payments using a smartwatch",
  author = "Jack Sturgess and Simon Eberz and Ivo Sluganovic and Ivan Martinovic",
  year = "2022",
  booktitle = "Proc. 7th IEEE European Symposium on Security and Privacy (IEEE 2022)",
  publisher = "IEEE",
}
@inproceedings{14898,
  title = "Biometric identification system based on object interactions in Internet of Things environments",
  author = "Klaudia Krawiecka and Simon Birnbach and Simon Eberz and Ivan Martinovic",
  year = "2022",
  booktitle = "Proc. IEEE Workshop on the Internet of Safe Things: SafeThings 2022",
  publisher = "IEEE",
}
@inproceedings{14818,
  title = "Common Evaluation Pitfalls in Touch-Based Authentication Systems",
  author = "Martin Georgiev and Simon Eberz and Henry Turner and Giulio Lovisotto and Ivan Martinovic",
  year = "2022",
  booktitle = "Proc. 2022 ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022)",
  publisher = "ACM",
}
@inproceedings{14808,
  title = "99% false positives: A qualitative study of SOC analysts' perspectives on security alarms",
  author = "Bushra AlAhmadi and Louise Axon and Ivan Martinovic",
  year = "2022",
  booktitle = "Proc. 31st USENIX Security Symposium",
}
@inproceedings{14803,
  title = "Signal injection attacks against CCD image sensors",
  author = "Sebastian Kohler and Richard Baker and Ivan Martinovic",
  year = "2022",
  booktitle = "Proc. 2022 ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022)",
  publisher = "ACM",
}
@inproceedings{14801,
  title = "Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch",
  author = "Jack Sturgess and Simon Eberz and Ivo Sluganovic and Ivan Martinovic",
  year = "2022",
  booktitle = "Proc. WristSense 2022: Workshop on Sensing Systems and Applications Using Wrist Worn Smart Devices",
  publisher = "IEEE",
}
@inproceedings{strohmeier21critis,
  title = "Studying Neutrality in Cyber-Space: A Comparative Geographical Analysis of Honeypot Responses",
  author = "Strohmeier, Martin and Pavur, James and Martinovic, Ivan and Lenders, Vincent",
  year = "2021",
  booktitle = "International Conference on Critical Information Infrastructures Security",
  month = "September",
  organization = "Springer",
  url = "https://link.springer.com/chapter/10.1007/978-3-030-93200-8_11",
  doi = "10.1007/978-3-030-93200-8_11",
}
@inproceedings{lovisotto2021slap,
  title = "SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations",
  author = "Lovisotto, Giulio and Turner, Henry and Sluganovic, Ivo and Strohmeier, Martin and Martinovic, Ivan",
  year = "2021",
  booktitle = "30th USENIX Security Symposium (USENIX Security 21)",
  month = "August",
  url = "https://www.usenix.org/conference/usenixsecurity21/presentation/lovisotto",
}
@inproceedings{smailesCPSS2021,
  title = "You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications",
  author = "Smailes, Joshua and Moser, Daniel and Smith, Matthew and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
  year = "2021",
  booktitle = "Proceedings of the 7th ACM Cyber-Physical System Security Workshop (CPSS 2021)",
  month = "June",
  note = "\textbf{Best Paper Award!}",
  url = "https://dl.acm.org/doi/abs/10.1145/3457339.3457985",
  doi = "10.1145/3457339.3457985",
}
@inproceedings{pavurCycon2021,
  title = "{In the Same Boat: On Small Satellites, Big Rockets, and Cyber-Trust}",
  author = "Pavur, James and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
  year = "2021",
  booktitle = "13th International Conference on Cyber Conflict (CyCon)",
  month = "May",
  organization = "IEEE",
  url = "https://ccdcoe.org/uploads/2021/05/CyCon_2021_Pavur_Strohmeier_Lenders_Martinovic.pdf",
}
@inproceedings{pavurndss2021,
  title = "QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit",
  author = "James Pavur and Martin Strohmeier and Vincent Lenders and Ivan Martinovic",
  year = "2021",
  booktitle = "The Network and Distributed System Security Symposium (NDSS)",
  month = "Feb",
  url = "https://www.ndss-symposium.org/ndss-paper/qpep-an-actionable-approach-to-secure-and-performant-broadband-from-geostationary-orbit/",
}
@article{StrohmeierTIST2021,
  title = "Classi-Fly: Inferring Aircraft Categories from Open Data",
  author = "Strohmeier, Martin and Smith, Matthew and Lenders, Vincent and Martinovic, Ivan",
  year = "2021",
  journal = "ACM Transactions on Intelligent Systems and Technology (TIST)",
  month = "December",
  number = "6",
  url = "https://dl.acm.org/doi/10.1145/3480969",
  volume = "12",
  doi = "10.1145/3480969",
}
@inproceedings{sun2021opensky,
  title = "OpenSky Report 2021: Insights on ADS-B Mandate and Fleet Deployment in Times of Crisis",
  author = "Sun, Junzi and Olive, Xavier and Strohmeier, Martin and Schäfer, Matthias and Martinovic, Ivan and Lenders, Vincent",
  year = "2021",
  booktitle = "2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC)",
  month = "October",
  organization = "IEEE",
  url = "https://ieeexplore.ieee.org/document/9594361/",
  doi = "10.1109/DASC52595.2021.9594361",
}
@article{14809,
  title = "#PrettyFlyForAWiFi: real-world detection of privacy invasion attacks by drones",
  author = "Simon Birnbach and Richard Baker and Simon Eberz and Ivan Martinovic",
  year = "2021",
  journal = "ACM Transactions on Privacy and Security",
  publisher = "ACM",
  doi = "10.1145/3473672",
}
@article{14804,
  title = "Haunted house: physical smart home event verification in the presence of compromised sensors",
  author = "Simon Birnbach and Simon Eberz and Ivan Martinovic",
  year = "2021",
  journal = "ACM Transactions on Internet of Things",
  publisher = "ACM",
}
@article{14800,
  title = "Generating identities with mixture models for speaker anonymization",
  author = "Henry Turner and Giulio Lovisotto and Ivan Martinovic",
  year = "2021",
  journal = "Computer Speech and Language 72",
  doi = "10.1016/j.csl.2021.101318",
}
@inproceedings{14810,
  title = "On detecting deception in space situational awareness",
  author = "James Pavur and Ivan Martinovic",
  year = "2021",
  booktitle = "Proc. 16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2021)",
  publisher = "ACM",
  doi = "10.1145/3433210.3453081",
}
@inproceedings{14806,
  title = "Plug-and-play: Framework for remote experimentation in cyber security",
  author = "Klaudia Krawiecka and Jack Sturgess and Alina Petrova and Ivan Martinovic",
  year = "2021",
  booktitle = "Proc. 2021 European Symposium on Usable Security (EuroUSEC 2021)",
  publisher = "ACM",
  doi = "10.1145/3481357.3481518",
}
@inproceedings{14805,
  title = "They see me rollin': inherent vulnerability of the rolling shutter in CMOS image sensors",
  author = "Sebastian Köhler and Giulio Lovisotto and Simon Birnbach and Richard Baker and Ivan Martinovic",
  year = "2021",
  booktitle = "Proc. Annual Computer Security Applications Conference (ACSAC 2021)",
  publisher = "ACM",
  doi = "10.1145/3485832.3488016",
}
@conference{14601,
  title = "MalPhase: Fine-Grained Malware Detection Using Network Flow Data",
  author = "Michal Piskozub and Fabio De Gaspari and Freddie Barr-Smith and Luigi Mancini and Ivan Martinovic",
  year = "2021",
  journal = "Proceedings of the 16th ACM Asia Conference on Computer and Communications Security",
}
@conference{survivalism,
  title = "Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land",
  author = "Frederick Barr-Smith and Xabier Ugarte-Pedrero and Mariano Graziano and Riccardo Spolaor and Ivan Martinovic",
  year = "2021",
  booktitle = "2021 IEEE Symposium on Security and Privacy (SP)",
  journal = "IEEE Symposium on Security and Privacy (S&P)",
  organization = "IEEE",
}
@inproceedings{lovisotto2020biometric,
  title = "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating",
  author = "Lovisotto, Giulio and Eberz, Simon and Martinovic, Ivan",
  year = "2020",
  booktitle = "2020 IEEE European Symposium on Security and Privacy (EuroS&P)",
  month = "September",
  organization = "IEEE",
  url = "https://github.com/ssloxford/biometric-backdoors",
  doi = "10.1109/EuroSP48549.2020.00020",
}
@inproceedings{lovisotto2020seeingred,
  title = "Seeing Red: PPG Biometrics Using Smartphone Cameras",
  author = "Lovisotto, Giulio and Turner, Henry and Eberz, Simon and Martinovic, Ivan",
  year = "2020",
  affiliation = "University of Oxford",
  booktitle = "IEEE 15th Computer Society Workshop on Biometrics",
  journal = "IEEE 15th Computer Society Workshop on Biometrics",
  location = "Seattle, Washington",
  month = "June",
  organization = "IEEE",
}
@inproceedings{Pavur2019oakland,
  title = "A Tale of Sea and Sky: On the Security of Maritime VSAT Communications",
  author = "Pavur, James and Moser, Daniel and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
  year = "2020",
  booktitle = "2020 IEEE Symposium on Security and Privacy (S&P)",
  month = "May",
  organization = "IEEE",
  url = "https://www.computer.org/csdl/proceedings-article/sp/2020/349700b025/1j2Lg3MvKpi",
  doi = "10.1109/SP40000.2020.00056",
}
@inproceedings{SmithNDSS2020,
  title = "A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems",
  author = "Smith, Matthew and Strohmeier, Martin and Harman, Jon and Lenders, Vincent and Martinovic, Ivan",
  year = "2020",
  booktitle = "The Network and Distributed System Security Symposium (NDSS)",
  month = "Feb",
  url = "https://www.ndss-symposium.org/ndss-paper/a-view-from-the-cockpit-exploring-pilot-reactions-to-attacks-on-avionic-systems/",
}
@article{smith2020understanding,
  title = "Understanding Realistic Attacks on Airborne Collision Avoidance Systems",
  author = "Smith, Matthew and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
  year = "2020",
  journal = "arXiv preprint arXiv:2010.01034",
}
@article{strohmeier2019applicability,
  title = "On the Applicability of Satellite-based Air Traffic Control Communication for Security",
  author = "Strohmeier, Martin and Moser, Daniel and Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan",
  year = "2019",
  journal = "IEEE Communications Magazine",
  month = "September",
  number = "9",
  pages = "79 - 85",
  publisher = "IEEE",
  url = "https://ieeexplore.ieee.org/document/8847232",
  volume = "57",
  doi = "10.1109/MCOM.001.1900037",
}
@inproceedings{schafer2019opensky,
  title = "OpenSky Report 2019: Analysing TCAS in the Real World using Big Data",
  author = "Schäfer, Matthias and Olive, Xavier and Strohmeier, Martin and Smith, Matthew and Martinovic, Ivan and Lenders, Vincent",
  year = "2019",
  booktitle = "2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC)",
  month = "September",
  organization = "IEEE",
  pages = "1--9",
  url = "https://ieeexplore.ieee.org/document/9081686",
  doi = "10.1109/DASC43569.2019.9081686",
}
@article{strohmeier2019classi,
  title = "Classi-Fly: Inferring Aircraft Categories from Open Data",
  author = "Strohmeier, Martin and Smith, Matthew and Lenders, Vincent and Martinovic, Ivan",
  year = "2019",
  journal = "arXiv preprint arXiv:1908.01061",
  month = "August",
  url = "https://arxiv.org/abs/1908.01061",
}
@article{smith2019safety,
  title = "Safety vs. Security: Attacking Avionic Systems with Humans in the Loop",
  author = "Smith, Matthew and Strohmeier, Martin and Harman, Jon and Lenders, Vincent and Martinovic, Ivan",
  year = "2019",
  journal = "arXiv preprint arXiv:1905.08039",
  month = "May",
  url = "https://arxiv.org/abs/1905.08039",
}
@inproceedings{peeves,
  title = "Peeves: Physical Event Verification in Smart Homes",
  author = "Birnbach, Simon and Eberz, Simon and Martinovic, Ivan",
  year = "2019",
  booktitle = "Proceedings of the 2019 ACM Conference on Computer and Communications Security (CCS)",
}
@inproceedings{baker2019losing,
  title = "Losing the Car Keys: Wireless PHY-Layer Insecurity in {EV} Charging",
  author = "Baker, Richard and Martinovic, Ivan",
  year = "2019",
  booktitle = "28th {USENIX} Security Symposium ({USENIX} Security 19)",
  pages = "407--424",
}
@inproceedings{turner2019attacking,
  title = "Attacking Speaker Recognition Systems with Phoneme Morphing",
  author = "Turner, Henry and Lovisotto, Giulio and Martinovic, Ivan",
  year = "2019",
  booktitle = "European Symposium on Research in Computer Security (ESORICS)",
  organization = "Springer",
  pages = "471--492",
  doi = "10.1007/978-3-030-29959-0_23",
}
@inproceedings{eberz201928,
  title = "28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics",
  author = "Eberz, Simon and Lovisotto, Giulio and Rasmussen, Kasper B and Lenders, Vincent and Martinovic, Ivan",
  year = "2019",
  booktitle = "Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security",
  organization = "ACM",
  pages = "1187--1199",
  doi = "10.1145/3319535.3354233",
}
@inproceedings{schaeferDASC2018,
  title = "OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS-B Data",
  author = "Matthias Schäfer and Martin Strohmeier and Matthew Smith and Markus Fuchs and Vincent Lenders and Ivan Martinovic",
  year = "2018",
  booktitle = "Digital Avionics Systems Conference (DASC), 2018 IEEE/AIAA 37th",
  month = "Sep",
  url = "https://ieeexplore.ieee.org/abstract/document/8569833",
  doi = "10.1109/DASC.2018.8569833",
}
@inproceedings{Smith2018,
  title = "{Undermining Privacy in the Aircraft Communications Addressing and Reporting System (ACARS)}",
  author = "Smith, Matthew and Moser, Daniel and Strohmeier, Martin and Martinovic, Ivan and Lenders, Vincent",
  year = "2018",
  address = "Barcelona",
  booktitle = "18th Privacy Enhancing Technologies Symposium (PETS 2018)",
  month = "July",
  url = "https://content.sciendo.com/view/journals/popets/2018/3/article-p105.xml",
  doi = "10.1515/popets-2018-0023",
}
@article{strohmeier2018TAES,
  title = "A k-NN-based Localization Approach for Crowdsourced Air Traffic Communication Networks",
  author = "Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
  year = "2018",
  journal = "IEEE Transactions on Aerospace and Electronic Systems",
  month = "June",
  number = "3",
  pages = "1519 - 1529",
  url = "http://ieeexplore.ieee.org/document/8268121/",
  volume = "54",
  doi = "10.1109/TAES.2018.2797760",
}
@inproceedings{strohmeier2018cycon,
  title = "{Utilizing Air Traffic Communications for OSINT on State and Government Aircraft}",
  author = "Strohmeier, Martin and Smith, Matthew and Moser, Daniel and Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan",
  year = "2018",
  booktitle = "{Cyber Conflict (CYCON), 2018 10th International Conference on}",
  month = "may",
  organization = "IEEE",
  url = "https://ieeexplore.ieee.org/document/8405023/",
  doi = "10.23919/CYCON.2018.8405023",
}
@inproceedings{strohmeierEuroSNP18,
  title = "The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication",
  author = "Strohmeier, Martin and Smith, Matthew and Lenders, Vincent and Martinovic, Ivan",
  year = "2018",
  booktitle = "IEEE European Symposium on Security and Privacy (EuroS&P) 2018",
  month = "apr",
  organization = "IEEE",
  url = "https://ieeexplore.ieee.org/document/8406594/",
  doi = "10.1109/EuroSP.2018.00016",
}
@inproceedings{baker2018empower,
  title = "EMPower: Detecting Malicious Power Line Networks from EM Emissions",
  author = "Baker, Richard and Martinovic, Ivan",
  year = "2018",
  booktitle = "IFIP International Conference on ICT Systems Security and Privacy Protection",
  organization = "Springer",
  pages = "108--121",
}
@inproceedings{eberz2018your,
  title = "When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts",
  author = "Eberz, Simon and Lovisotto, Giulio and Patane, Andrea and Kwiatkowska, Marta and Lenders, Vincent and Martinovic, Ivan",
  year = "2018",
  booktitle = "2018 IEEE Symposium on Security and Privacy (SP)",
  organization = "IEEE",
  pages = "889--905",
  doi = "10.1109/SP.2018.00053",
}
@conference{11247,
  title = "Snoopy: Sniffing Your Smartwatches Passwords via Deep Sequence Learning",
  author = "Chris Xiaoxuan Lu and Bowen Du and Hongkai Wen and Sen Wang and Andrew Markham and Ivan Martinovic and Yiran Shen and Niki Trigoni",
  year = "2018",
  booktitle = "ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp)",
  journal = "Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies",
}
@article{strohmeierITS,
  title = "On Perception and Reality in Wireless Air Traffic Communication Security",
  author = "Strohmeier, Martin and Sch{\"a}fer, Matthias and Pinheiro, Rui and Lenders, Vincent and Martinovic, Ivan",
  year = "2017",
  issn = "1524-9050",
  journal = "IEEE Transactions on Intelligent Transportation Systems",
  month = "June",
  number = "6",
  pages = "1338-1357",
  publisher = "IEEE",
  url = "http://ieeexplore.ieee.org/document/7589091/",
  volume = "18",
  doi = "10.1109/TITS.2016.2612584",
}
@article{2017arXiv170507065S,
  title = "{Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS)}",
  author = "{Smith}, Matthew and {Moser}, Daniel and {Strohmeier}, Martin and {Lenders}, Vincent and {Martinovic}, Ivan",
  year = "2017",
  journal = "ArXiv e-prints",
  keywords = "Computer Science - Cryptography and Security, Computer Science - Computers and Society",
  month = "may",
  url = "https://arxiv.org/pdf/1705.07065.pdf",
}
@inproceedings{strohmeier2017cycon,
  title = "Crowdsourcing Security for Wireless Air Traffic Communications",
  author = "Strohmeier, Martin and Smith, Matthew and Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan",
  year = "2017",
  booktitle = "{Cyber Conflict (CYCON), 2017 9th International Conference on}",
  month = "May",
  organization = "IEEE",
  url = "http://ieeexplore.ieee.org/document/8240336/",
  doi = "10.23919/CYCON.2017.8240336",
}
@inproceedings{smithFC,
  title = "{Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS}",
  author = "Smith, Matthew and Moser, Daniel and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
  year = "2017",
  booktitle = "International Conference on Financial Cryptography and Data Security 2017",
  month = "apr",
  publisher = "Springer",
  url = "https://link.springer.com/chapter/10.1007/978-3-319-70972-7_15",
  doi = "10.1007/978-3-319-70972-7_15",
}
@inproceedings{Sluganovic2017ACSAC,
  title = "{HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens}",
  author = "Sluganovic, Ivo and Serbec, Matej and Derek, Ante and Martinovic, Ivan",
  year = "2017",
  booktitle = "Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)",
  month = "December",
  pages = "13",
}
@inproceedings{wifly,
  title = "Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones",
  author = "Birnbach, Simon and Baker, Richard and Martinovic, Ivan",
  year = "2017",
  booktitle = "Proceedings of the 24th Annual Network and Distributed System Security Symposium ({NDSS})",
}
@techreport{RR-17-03,
  title = "Mobile Biometrics in Financial Services: A Five Factor Framework",
  author = "Giulio Lovisotto and Raghav Malik and Ivo Sluganovic and Marc Roeschlin and Paul Trueman and Ivan Martinovic",
  year = "2017",
  affiliation = "University of Oxford",
}
@inproceedings{schaeferDASC2016,
  title = "OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS-B Usage",
  author = "Matthias Schäfer and Martin Strohmeier and Matthew Smith and Markus Fuchs and Rui Pinheiro and Vincent Lenders and Ivan Martinovic",
  year = "2016",
  booktitle = "Digital Avionics Systems Conference (DASC), 2016 IEEE/AIAA 35th",
  location = "Sacramento, CA, USA",
  month = "Sep",
  url = "http://ieeexplore.ieee.org/document/7778030/",
  doi = "10.1109/DASC.2016.7778030",
}
@article{Eberz:2016:LLE:2957761.2904018,
  title = "Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics",
  author = "Eberz, Simon and Rasmussen, Kasper B. and Lenders, Vincent and Martinovic, Ivan",
  year = "2016",
  address = "New York, NY, USA",
  issn = "2471-2566",
  journal = "ACM Transactions on Privacy and Security",
  keywords = "Biometrics, continuous authentication, metrics",
  month = "June",
  number = "1",
  publisher = "ACM",
  volume = "19",
}
@inproceedings{strohmeier2016cycon,
  title = "Assessing the Impact of Aviation Security on Cyber Power",
  author = "Strohmeier, Martin and Smith, Matthew and Sch{\"{a}}fer, Matthias and Lenders, Vincent and Martinovic, Ivan",
  year = "2016",
  booktitle = "{Cyber Conflict (CYCON), 2016 8th International Conference on}",
  location = "Tallinn, Estonia",
  month = "May",
  organization = "IEEE",
  url = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7529437",
  doi = "10.1109/CYCON.2016.7529437",
}
@inproceedings{goe,
  title = "Exposing Transmitters in Mobile Multi-Agent Games",
  author = "Ben-Adar Bessos and Mai and Birnbach, Simon and Herzberg, Amir and Martinovic, Ivan",
  year = "2016",
  booktitle = "Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC)",
  organization = "ACM",
  pages = "125--136",
}
@inproceedings{baker2016secure,
  title = "Secure location verification with a mobile receiver",
  author = "Baker, Richard and Martinovic, Ivan",
  year = "2016",
  booktitle = "Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy",
  pages = "35--46",
}
@inproceedings{rasmussen15NDSS,
  title = "Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics",
  author = "Simon Eberz and Kasper B. Rasmussen and Vincent Lenders and Ivan Martinovic",
  year = "2015",
  booktitle = "The Network and Distributed System Security Symposium (NDSS)",
  month = "February",
}
@article{strohmeier2014surveys,
  title = "On the Security of the Automatic Dependent Surveillance-Broadcast Protocol",
  author = "Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan",
  year = "2015",
  issn = "1553-877X",
  journal = "IEEE Communications Surveys & Tutorials",
  number = "2",
  pages = "1066 - 1087",
  publisher = "IEEE",
  url = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6940209",
  volume = "17",
  doi = "10.1109/COMST.2014.2365951",
}
@inproceedings{Schaefer14,
  title = "{Bringing Up OpenSky: A Large-scale ADS-B Sensor Network for Research}",
  author = "Sch{\"a}fer, Matthias and Strohmeier, Martin and Lenders, Vincent and Martinovic, Ivan and Wilhelm, Matthias",
  year = "2014",
  booktitle = "ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)",
  month = "apr",
}
@inproceedings{contauth,
  title = "Authentication Using Pulse-Response Biometrics",
  author = "Rasmussen, Kasper Bonne and Roeschlin, Marc and Martinovic, Ivan and Tsudik, Gene",
  year = "2014",
  booktitle = "The Network and Distributed System Security Symposium ({NDSS})",
  month = "2",
}
@article{Strohmeier14,
  title = "{Realities and Challenges of NextGen Air Traffic Management: The Case of ADS-B}",
  author = "Strohmeier, Martin and Sch{\"a}fer, Matthias and Lenders, Vincent and Martinovic, Ivan",
  year = "2014",
  journal = "Communications Magazine, IEEE",
  number = "5",
  publisher = "IEEE",
  volume = "52",
}
@inproceedings{BGFMS14,
  title = "Gaining Insight on Friendly Jamming in a Real-world IEEE 802.11 Network",
  author = "Berger, Daniel S. and Gringoli, Francesco and Facchi, Nicol`{o} and Martinovic, Ivan and Schmitt, Jens",
  year = "2014",
  address = "New York, NY, USA",
  booktitle = "Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks",
  isbn = "978-1-4503-2972-9",
  keywords = "defensive jamming, friendly jamming, ieee 802.11, jamming for good, reactive jamming, wi-fi, wlan",
  location = "Oxford, United Kingdom",
  pages = "105--116",
  publisher = "ACM",
  series = "WiSec '14",
  url = "http://www.ing.unibs.it/~openfwwf/friendlyjammer/wisec-2014-gaininginsight.pdf",
  doi = "10.1145/2627393.2627403",
}
@article{WMS13,
  title = "Secure Key Generation in Sensor Networks Based on Frequency-selective Channels",
  author = "Matthias Wilhelm and Ivan Martinovic and Jens Schmitt",
  year = "2013",
  journal = "IEEE Journal on Selected Areas in Communications (JSAC) - Signal Processing Techniques for Wireless Physical Layer Security",
  month = "sep",
  number = "9",
  pages = "1779-1790",
  url = "http://dx.doi.org/10.1109/JSAC.2013.130911",
  volume = "31",
}
@article{ITFS12,
  title = "Touchalytics: On the Applicability of Touchscreen Input as a Behavioural Biometric for Continuous Authentication",
  author = "Mario Frank and Ralf Biedert and Eugene Ma and Ivan Martinovic and Dawn Song",
  year = "2013",
  journal = "IEEE Transactions on Information Forensics and Security",
  month = "january",
  number = "1",
  volume = "8",
  doi = "10.1109/TIFS.2012.2225048",
}
@inproceedings{Prisms13,
  title = "SAFE: Secure Authentication with Face and Eyes",
  author = "Boehm, Arman and Chen, Dongqu and Frank, Mario and Huang, Ling and Kuo, Cynthia and Lolic, Tihomir and Martinovic, Ivan and Song,Dawn",
  year = "2013",
  booktitle = "Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems (successor of MobiSec). Proceedings in preparation.",
  note = "\textbf{Best Paper Award}",
  url = "http://www2.berkeley.intel-research.net/~hling/research/safeI3e.pdf",
}
@inproceedings{ACNS13,
  title = "Experimental Analysis of Attacks on Next Generation Air Traffic Communication",
  author = "Schäfer, Matthias and Lenders, Vincent and Martinovic, Ivan",
  year = "2013",
  booktitle = "Applied Cryptography and Network Security (ACNS’13)",
  isbn = "978-3-642-38979-5",
  keywords = "NextGen; ADS-B; Attacks; Security; Threats; Air Safety",
  pages = "253-271",
  publisher = "Springer Berlin Heidelberg",
  series = "Lecture Notes in Computer Science",
  url = "http://dx.doi.org/10.1007/978-3-642-38980-1_16",
  volume = "7954",
  doi = "10.1007/978-3-642-38980-1_16",
}
@inproceedings{SFSM13,
  title = "Who do you sync you are: smartphone fingerprinting via application behaviour",
  author = "St\"{o}ber, Tim and Frank, Mario and Schmitt, Jens and Martinovic, Ivan",
  year = "2013",
  booktitle = "Proceedings of the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks",
  isbn = "978-1-4503-1998-0",
  location = "Budapest, Hungary",
  pages = "7--12",
  publisher = "ACM",
  series = "WiSec '13",
}
@techreport{RR-13-10,
  title = "Security of ADS-B: State of the Art and Beyond",
  author = "Martin Strohmeier and Vincent Lenders and Ivan Martinovic",
  year = "2013",
  institution = "DCS",
  number = "RR-13-10",
  pages = "20",
}
@inproceedings{Esorics12,
  title = "A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols",
  author = "Eberz, Simon and Strohmeier, Martin and Wilhelm, Matthias and Martinovic, Ivan",
  year = "2012",
  booktitle = "17th European Symposium on Research in Computer Security (ESORICS)",
  isbn = "978-3-642-33166-4",
  location = "Pisa, Italy",
  month = "sep",
  pages = "235-252",
  publisher = "Springer",
  series = "Lecture Notes in Computer Science",
  url = "http://link.springer.com/chapter/10.1007/978-3-642-33167-1_14",
  volume = "7459",
  doi = "10.1007/978-3-642-33167-1_14",
}
@inproceedings{Usenix12,
  title = "On the Feasibility of Side-channel Attacks with Brain-computer Interfaces",
  author = "Martinovic, Ivan and Davies, Doug and Frank, Mario and Perito, Daniele and Ros, Tomas and Song, Dawn",
  year = "2012",
  address = "Berkeley, CA, USA",
  booktitle = "Proceedings of the 21st USENIX Conference on Security Symposium",
  location = "Bellevue, WA",
  month = "aug",
  pages = "34–46",
  publisher = "USENIX Association",
  series = "Security'12",
  url = "https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final56.pdf",
}
@inproceedings{GazeBasedIntrusionDetection,
  title = "Stimuli for Gaze Based Intrusion Detection",
  author = "Biedert, Ralf and Frank, Mario and Martinovic, Ivan and Song, Dawn",
  year = "2012",
  booktitle = "Future Information Technology, Application, and Service",
  isbn = "978-94-007-4516-2",
  month = "jul",
  note = "10.1007/978-94-007-4516-2_80",
  pages = "757-763",
  publisher = "Springer Netherlands",
  series = "Lecture Notes in Electrical Engineering",
  url = "http://dx.doi.org/10.1007/978-94-007-4516-2_80",
  volume = "164",
}
@inproceedings{WMSL11-2,
  title = "{WiFire}: A Firewall for Wireless Networks",
  author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt and Vincent Lenders",
  year = "2011",
  address = "New York, NY, USA",
  booktitle = "Proceedings of the ACM SIGCOMM 2011 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '11)",
  location = "Toronto, Canada",
  month = "aug",
  pages = "456--457",
  publisher = "ACM",
}
@inproceedings{WMSL11-1,
  title = "Reactive Jamming in Wireless Networks: How Realistic is the Threat?",
  author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt and Vincent Lenders",
  year = "2011",
  address = "New York, NY, USA",
  booktitle = "Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec '11)",
  location = "Hamburg, Germany",
  month = "jun",
  pages = "47--52",
  publisher = "ACM",
  url = "http://dl.acm.org/authorize?431905",
}
@inproceedings{SGBM11-1,
  title = "Pay Bursts Only Once Holds for (Some) Non-FIFO Systems",
  author = "Jens B. Schmitt and Nicos Gollan and Steffen Bondorf and Ivan Martinovic",
  year = "2011",
  address = "Shanghai, China",
  booktitle = "The 30th IEEE International Conference on Computer Communications (INFOCOM 2011)",
  month = "apr",
  note = "Accepted for publication.",
}
@article{WMSL11-3,
  title = "{WiSec} 2011 Demo: {RFReact}---A Real-time Capable and Channel-aware Jamming Platform",
  author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt and Vincent Lenders",
  year = "2011",
  address = "New York, NY, USA",
  issn = "1559-1662",
  journal = "{SIGMOBILE} Mobile Computing and Communications Review",
  month = "nov",
  pages = "41--42",
  publisher = "ACM",
  url = "http://doi.acm.org/10.1145/2073290.2073300",
  volume = "15",
  doi = "http://doi.acm.org/10.1145/2073290.2073300",
}
@techreport{SGBM10-1,
  title = "Pay Bursts Only Once Holds for (Some) Non-FIFO Systems",
  author = "Jens Schmitt and Nicos Gollan and Steffen Bondorf and Ivan Martinovic",
  year = "2010",
  institution = "University of Kaiserslautern, Germany",
  month = "jul",
  number = "378/10",
}
@inproceedings{CM10-1,
  title = "{Experiental Design and Analysis of Transmission Properties in an Indoor Wireless Sensor Network}",
  author = "Dennis Christmann and Ivan Martinovic",
  year = "2010",
  address = "Avignon, France",
  booktitle = "Proceedings of the 6th International Workshop on Wireless Network Measurements ({WiNMee}), in conjunction with WiOpt 2010",
  month = "may",
  publisher = "IEEE Computer Society",
}
@techreport{WMS10-2,
  title = "{Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels: Design, Implementation, and Analysis}",
  author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt",
  year = "2010",
  institution = "ArXiv.org",
  month = "may",
  number = "arXiv:1005.0712v1 [cs.CR]",
  url = "http://arxiv.org/pdf/1005.0712v1",
}
@inproceedings{WMS10-1,
  title = "Secret Keys from Entangled Sensor Motes: Implementation and Analysis",
  author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt",
  year = "2010",
  booktitle = "Proceedings of the Third ACM Conference on Wireless Network Security (WiSec '10)",
  location = "Hoboken, NJ, USA",
  month = "mar",
  pages = "139--144",
  publisher = "ACM",
}
@article{CMS10-1,
  title = "Analysis of Transmission Properties in an Indoor Wireless Sensor Network Based on a Full-Factorial Design",
  author = "Dennis Christmann and Ivan Martinovic and Jens B. Schmitt",
  year = "2010",
  issn = "doi: 10.1088/0957-0233/21/12/124003",
  journal = "Special Issue on Wireless Sensor Networks - Designing for Real-world Deployment and Deployment Experiences, Measurement Science and Technology, Institute of Physics",
  month = "Dec",
  note = "In Print.",
  number = "12",
  volume = "21",
}
@article{SWM10-1,
  title = "Dynamic Demultiplexing in Network Calculus -- Theory and Application",
  author = "Jens B. Schmitt and Hao Wang and Ivan Martinovic",
  year = "2010",
  issn = "doi: doi:10.1016/j.peva.2010.12.002",
  journal = "Performance Evaluation, Elsevier",
  month = "Dec",
  note = "In Press (available online). DOI: 10.1016/j.peva.2010.12.002",
}
@inproceedings{WWMKG10-1,
  title = "{AmICA -- A flexible, compact, easy-to-program, and low-power WSN platform}",
  author = "Sebastian Wille and Norbert Wehn and Ivan Martinovic and Simon Kunz and Peter Göhner",
  year = "2010",
  booktitle = "{Proceedings of 7th International Conference on Mobile and Ubiquitous Systems (Mobiqutious)}",
  month = "dec",
  publisher = "Springer Verlag",
}
@inproceedings{BCMO-1,
  title = "{AmbiSec: Securing Smart Spaces Using Entropy Harvesting}",
  author = "Paolo Barsocchi and Stefano Chessa and Ivan Martinovic and Gabriele Oligeri",
  year = "2010",
  booktitle = "{Proceedings of the First International Joint Conference on Ambient Intelligence (AmI-10)}",
  month = "nov",
  publisher = "Springer Verlag",
}
@inproceedings{WMUS10-1,
  title = "{SUDOKU}: Secure and Usable Deployment of Keys on Wireless Sensors",
  author = "Matthias Wilhelm and Ivan Martinovic and Ersin Uzun and Jens B. Schmitt",
  year = "2010",
  booktitle = "Proceedings of the 6th Annual Workshop on Secure Network Protocols (NPSec '10)",
  location = "Kyoto, Japan",
  month = "oct",
  pages = "1--6",
  publisher = "IEEE",
  url = "publications/WMUS10-1.pdf",
  doi = "10.1109/NPSEC.2010.5634458",
}
@inproceedings{SGM10-1,
  title = "{A Self-Adversarial Approach to Delay Analysis under Arbitrary Scheduling}",
  author = "Jens Schmitt and Hao Wang and Ivan Martinovic",
  year = "2010",
  booktitle = "{Proceedings of 4th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2010)}",
  month = "oct",
  publisher = "Springer Verlag",
}
@inproceedings{SM09-1,
  title = "{Demultiplexing in Network Calculus - A Stochastic Scaling Approach}",
  author = "Jens B. Schmitt and Ivan Martinovic",
  year = "2009",
  address = "Budapest, Hungary",
  booktitle = "Proceedings of the 6th International Conference on Quantitative Evaluation of SysTems (QEST) 2009",
  month = "sep",
  pages = "82--93",
  publisher = "IEEE Computer Society",
}
@article{MCGS09-1,
  title = "{Chaotic Communication Improves Authentication: Protecting WSNs Against Injection Attacks}",
  author = "Ivan Martinovic and Luc Cappellaro and Nicos Gollan and Jens B. Schmitt",
  year = "2009",
  journal = "Security and Communication Networks, Special Issue on Security in Wireless Sensor Networks, Wiley",
  month = "mar",
  number = "2",
  pages = "117--132",
  publisher = "Wiley",
  volume = "2",
}
@inproceedings{SGM09-1,
  title = "{A New Service Curve Model to Deal with Non-FIFO Systems}",
  author = "Jens B. Schmitt and Nicos Gollan and Ivan Martinovic",
  year = "2009",
  booktitle = "16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany",
  month = "mar",
  note = "143--154",
  publisher = "Springer Informatik Aktuell",
}
@inproceedings{MS09-1,
  title = "{Turning The Tables: Using Wireless Communication Against An Attacker}",
  author = "Ivan Martinovic and Jens B. Schmitt",
  year = "2009",
  booktitle = "16. ITG/GI - Fachtagung Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany",
  month = "mar",
  pages = "205--216",
  publisher = "Springer Informatik Aktuell",
}
@inproceedings{MPS09-1,
  title = "{Jamming for Good: A Fresh Approach to Authentic Communication in WSNs}",
  author = "Ivan Martinovic and Paul Pichota and Jens B. Schmitt",
  year = "2009",
  address = "Zurich, Switzerland",
  booktitle = "Proceedings of the ACM Conference on Wireless Network Security (WiSec 2009)",
  month = "mar",
  pages = "161--168",
  publisher = "ACM Press",
}
@inproceedings{WMS09-2,
  title = "{Light-weight Key Generation based on Physical Properties of Wireless Channels}",
  author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt",
  year = "2009",
  address = "University of Trier, Germany",
  booktitle = "{Proceedings of the 11. Kryptotag der Gesellschaft f\"ur Informatik e.V.}",
  location = "Trier, Germany",
  month = "nov",
  pages = "4",
}
@inproceedings{AINTEC09-3,
  title = "{Security by Wireless or Why Play Fairer than the Attacker?}",
  author = "Ivan Martinovic",
  year = "2009",
  address = "Bangkok, Thailand",
  booktitle = "Proceedings of the 5th ACM SIGCOMM Asian Internet Engineering Conference (AINTEC) 2009",
  month = "nov",
  publisher = "ACM, invited paper",
}
@inproceedings{WMS09-1,
  title = "On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties",
  author = "Matthias Wilhelm and Ivan Martinovic and Jens B. Schmitt",
  year = "2009",
  booktitle = "{Proceedings of the 5th Annual Workshop on Secure Network Protocols (NPSec '09)}",
  location = "Princeton, NJ, USA",
  month = "oct",
  pages = "37--42",
  publisher = "IEEE Computer Society",
}
@article{MPWZS09-1,
  title = "Bringing law and order to IEEE 802.11 networks -- A case for DiscoSec",
  author = "Ivan Martinovic and Paul Pichota and Matthias Wilhelm and Frank A. Zdarsky and Jens B. Schmitt",
  year = "2009",
  issn = "1574--1192",
  journal = "Pervasive and Mobile Computing (PMC)",
  number = "5",
  pages = "510--525",
  publisher = "Elsevier",
  volume = "5",
}
@inproceedings{MS08-1,
  title = "{A Novel Approach for a Lightweight, Crypto-free Message Authentication in Wireless Sensor Networks}",
  author = "Ivan Martinovic and Jens B. Schmitt",
  year = "2008",
  booktitle = "Proceedings of the 7. GI/ITG KuVS Fachgespr\"ach "Drahtlose Sensornetze", Berlin, Germany",
  month = "sep",
}
@techreport{SGM08,
  title = "{End-to-End Worst-Case Analysis of Non-FIFO Systems}",
  author = "Jens B. Schmitt and Nicos Gollan and Ivan Martinovic",
  year = "2008",
  institution = "University of Kaiserslautern, Germany",
  month = "aug",
  number = "370/08",
}
@inproceedings{MPWZS08-1,
  title = "Design, Implementation, and Performance Analysis of DiscoSec -- Service Pack for Securing WLANs",
  author = "Ivan Martinovic and Paul Pichota and Matthias Wilhelm and Frank A. Zdarsky and Jens B. Schmitt",
  year = "2008",
  address = "Newport Beach, CA, USA",
  booktitle = "9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2008)",
  month = "jun",
  note = "Accepted as noteworthy contribution.",
  pages = "1--10",
}
@inproceedings{MZMWS-1,
  title = "Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless",
  author = "Ivan Martinovic and Frank A. Zdarsky and Matthias Wilhelm and Christian Wegmann and Jens B. Schmitt",
  year = "2008",
  booktitle = "Proceedings of the ACM Conference on Wireless Network Security (WiSec '08)",
  location = "Alexandria, VA, USA",
  month = "mar",
  pages = "36--45",
  publisher = "ACM Press",
}
@inproceedings{GZMS08-1,
  title = "The DISCO Network Calculator",
  author = "Nicos Gollan and Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
  year = "2008",
  address = "Dortmund, Germany",
  booktitle = "14th GI/ITG Conference on Measurement, Modeling, and Evaluation of Computer and Communication Systems (MMB 2008)",
  month = "mar",
  organization = "GI/ITG",
}
@inproceedings{SZM08-1,
  title = "Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once",
  author = "Jens B. Schmitt and Frank A. Zdarsky and Ivan Martinovic",
  year = "2008",
  address = "Dortmund, Germany",
  booktitle = "14th GI/ITG Conference on Measurement, Modeling, and Evaluation of Computer and Communication Systems (MMB 2008)",
  month = "mar",
  organization = "GI/ITG",
}
@inproceedings{MGS08,
  title = "Firewalling Wireless Sensor Networks: Security by Wireless",
  author = "Ivan Martinovic and Nicos Gollan and Jens B. Schmitt",
  year = "2008",
  address = "Montreal, Canada",
  booktitle = "{Proceedings of the 33rd IEEE Conference on Local Computer Networks (LCN): Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2008)}",
  month = "oct",
  pages = "770 -- 777",
}
@inproceedings{BMS08-1,
  title = "{Enabling Authentic Transmissions in WSNs -- Turning Jamming against the Attacker}",
  author = "Adam Bachorek and Ivan Martinovic and Jens B. Schmitt",
  year = "2008",
  address = "Orlando, FL, USA",
  booktitle = "{Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008)}",
  month = "oct",
  pages = "21--26",
}
@article{SG08-1,
  title = "{Worst Case Modelling of Wireless Sensor Networks}",
  author = "Jens B. Schmitt and Nicos Gollan",
  year = "2008",
  journal = "Praxis der Informationsverarbeitung und Kommunikation",
  month = "jan",
  pages = "12--16",
  publisher = "Fachgruppe Kommunikation und Verteilte Systeme, Universit\"at zu L\"ubeck",
  volume = "1",
}
@incollection{MZBS-1,
  title = "{Security in IEEE 802.11-based UMA Networks}",
  author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Jens B. Schmitt",
  year = "2008",
  booktitle = "{Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications}",
  editor = "Y. Zhang and L. T. Yang and J. Ma",
  note = "ISBN:1420055372. Accepted for publication",
  publisher = "Auerbach Publications, Taylor&Francis Group",
}
@incollection{ZM-1,
  title = "{Radio Resource Management in IEEE 802.11-based UMA Networks}",
  author = "Frank A. Zdarsky and Ivan Martinovic",
  year = "2008",
  booktitle = "{Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications}",
  editor = "Y. Zhang and L. T. Yang and J. Ma",
  note = "ISBN:1420055372. Accepted for publication",
  publisher = "Auerbach Publications, Taylor&Francis Group",
}
@article{ZMS08-1,
  title = "{Minimizing Contention through Cooperation between Densely-Deployed Wireless LANs}",
  author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
  year = "2007",
  journal = "Wireless Networks, Springer",
  month = "sep",
  publisher = "Springer",
  volume = "ISSN 1022-0038 (Print) 1572-8196 (Online)",
}
@inproceedings{MZBJS06-1,
  title = "{Phishing in the Wireless: Implementation and Analysis}",
  author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Christian Jung and Jens B. Schmitt",
  year = "2007",
  booktitle = "Proceedings of the 22nd IFIP International Information Security Conference (SEC 2007), Johannesburg, South Africa",
  month = "may",
  pages = "145--156",
  publisher = "Springer",
  volume = "Volume 232/2007",
}
@inproceedings{MZBS07-1,
  title = "{Measurement and Analysis of Handover Latencies in IEEE 802.11i Secured Networks}",
  author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Jens B. Schmitt",
  year = "2007",
  booktitle = "Proceedings of the 13th European Wireless Conference (EW2007), Paris, France",
  month = "apr",
}
@inproceedings{MZS07-1,
  title = "{Regional-based Authentication Against DoS Attacks in Wireless Networks}",
  author = "Ivan Martinovic and Frank A. Zdarsky and Jens B. Schmitt",
  year = "2007",
  address = "Greece",
  booktitle = "Proceedings of the 3rd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks (in conjunction with ACM/IEEE MSWiM'07)",
  month = "oct",
}
@inproceedings{ZMS06-1,
  title = "{The Case for Virtualized Wireless Access Networks}",
  author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
  year = "2006",
  booktitle = "Proceedings of the International Workshop on Self-Organizing Systems (IWSOS 2006), Passau, Germany",
  month = "sep",
  publisher = "Springer LNCS",
}
@inproceedings{MLZMSS06-1,
  title = "{Self-Protection in P2P Networks: Choosing the Right Neighbourhood}",
  author = "Ivan Martinovic and Christof Leng and Frank A. Zdarsky and Andreas Mauthe and Ralf Steinmetz and Jens B. Schmitt",
  year = "2006",
  booktitle = "Proceedings of the International Workshop on Self-Organizing Systems (IWSOS 2006), Passau, Germany",
  month = "sep",
  publisher = "Springer LNCS",
}
@inproceedings{ZMS06-2,
  title = "{On Self-coordination in Wireless Community Networks}",
  author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
  year = "2006",
  booktitle = "Proceedings of the 11th IFIP International Conference on Personal Wireless Communications (PWC'06), Albacete, Spain",
  month = "sep",
  publisher = "Springer LNCS",
}
@inproceedings{MZS06-1,
  title = "{On the Way to IEEE 802.11 DoS Resilience}",
  author = "Ivan Martinovic and Frank A. Zdarsky and Jens B. Schmitt",
  year = "2006",
  booktitle = "Proceedings of IFIP NETWORKING 2006, Workshop on Security and Privacy in Mobile and Wireless Networking, Coimbra, Portugal",
  month = "may",
  publisher = "Springer LNCS",
}
@techreport{SZM06-1,
  title = "{Performance Bounds in Feed-Forward Networks under Blind Multiplexing}",
  author = "Jens B. Schmitt and Frank A. Zdarsky and Ivan Martinovic",
  year = "2006",
  institution = "University of Kaiserslautern, Germany",
  month = "apr",
  number = "349/06",
}
@inproceedings{MS06-1,
  title = "{Zu den Grenzen der Technik bei der Entwicklung von Konzepten zur Online-Betrugs-Pr\"avention (Invited Paper)}",
  author = "Ivan Martinovic and Jens B. Schmitt",
  year = "2006",
  booktitle = "Deutsches Forum f\"ur Kriminalpr\"avention (DFK) Workshop "Internet-Devianz", Bonn, Germany",
  month = "oct",
  publisher = "Deutsches Forum f\"ur Kriminalpr\"avention",
}
@techreport{MZBS06-1,
  title = "{Introduction of IEEE 802.11i and Measuring its Security vs. Performance Tradeoff}",
  author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Jens B. Schmitt",
  year = "2006",
  institution = "University of Kaiserslautern, Germany",
  month = "oct",
  number = "351/06",
}
@techreport{MZBJS06,
  title = "{Phishing in the Wireless: Implementation and Analysis}",
  author = "Ivan Martinovic and Frank A. Zdarsky and Adam Bachorek and Christan Jung and Jens B. Schmitt",
  year = "2006",
  institution = "University of Kaiserslautern, Germany",
  month = "oct",
  number = "367/07",
}
@inproceedings{ZMS05-3,
  title = "{On Lower Bounds for MAC Layer Contention in CSMA/CA-Based Wireless Networks}",
  author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
  year = "2005",
  address = "Cologne, Germany",
  booktitle = "3rd ACM/SIGMOBILE International Workshop on Foundations of Mobile Computing (DIALM-POMC'05)",
  month = "sep",
  pages = "8--16",
}
@techreport{ZMS05-2,
  title = "{Self-Coordination Mechanisms for Wireless Community Networks}",
  author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
  year = "2005",
  institution = "University of Kaiserslautern, Germany",
  month = "jul",
  number = "339/05",
}
@techreport{ZMS05-1,
  title = "{Lower Bounds for Contention in CSMA/CA-based Wireless LANs}",
  author = "Frank A. Zdarsky and Ivan Martinovic and Jens B. Schmitt",
  year = "2005",
  institution = "University of Kaiserslautern, Germany",
  month = "jul",
  number = "338/05",
}
@inproceedings{HMKR04-1,
  title = "{A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks}",
  author = "Matthias Hollick and Ivan Martinovic and Tronje Krop and Ivica Rimac",
  year = "2004",
  booktitle = "Proceedings of the 30th IEEE EUROMICRO Conference, Rennes, France",
  month = "sep",
  note = "ISBN 0-7695-2199-1",
  pages = "495--502",
  publisher = "IEEE",
}
@inproceedings{SEM+04-1,
  title = "{Digital Heritage Application as an Edutainment Tool}",
  author = "Meehae Song and Thomas Elias and Ivan Martinovic and Wolfgang M{\"u}ller-Wittig and Tony K.Y. Chan",
  year = "2004",
  booktitle = "Proceedings of the ACM SIGGRAPH International Conference on Virtual Reality Continuum and its Applications in Industry",
  month = "jun",
  note = "ISBN 1-58113-884-9",
  pages = "163--167",
  publisher = "ACM Press",
}
@incollection{SBM04-1,
  title = "{Web Services zur Unterst{\"u}tzung flexibler Gesch{\"a}ftsprozesse in der Finanzwirtschaft}",
  author = "Ralf Steinmetz and Rainer Berbner and Ivan Martinovic",
  year = "2004",
  booktitle = "Handbuch Industrialisierung der Finanzwirtschaft",
  editor = "Z. Sokolovsky and S. L{\"o}schenkohl",
  month = "dec",
  note = "ISBN 3-409-12675-9",
  publisher = "Gabler Verlag",
}
@inproceedings{MGA+04-1,
  title = "{Trust and Context: Complementary Concepts for Creating Spontaneous Networks and Intelligent Applications}",
  author = "Ivan Martinovic and Manuel Goertz and Ralf Ackermann and Andreas Mauthe and Ralf Steinmetz",
  year = "2004",
  booktitle = "Proceedings of SoftCOM'04, International Conference on Software, Telecommunications and Computer Networks, Croatia",
  month = "oct",
  note = "~",
}
@inproceedings{SEM+03-1,
  title = "{User-Centred Virtual Avatars in Real-time}",
  author = "Meehae Song and Thomas Elias and Ivan Martinovic and Wolfgang M{\"u}ller-Wittig and Tony K.Y. Chan",
  year = "2003",
  booktitle = "Proceedings of the 9th International Conference on Virtual Systems and Multimedia (VSMM 2003), Montreal, Canada",
  month = "oct",
  note = "~",
}