Simon Birnbach

Dr Simon Birnbach
Department of Computer Science,
Robert Hooke Building
Directions Postal Address
Themes:
Selected Publications
-
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
Joshua Smailes‚ Sebastian Köhler‚ Simon Birnbach‚ Martin Strohmeier and Ivan Martinovic
In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 23). November, 2023.
Details about Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | BibTeX data for Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | Download (pdf) of Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | DOI (10.1145/3576915.3623135) | Link to Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
-
RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection
Yashovardhan Sharma‚ Simon Birnbach and Ivan Martinovic
In Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference (EICC'23). Pages 159–166. Association for Computing Machinery (ACM). June, 2023.
Details about RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection | BibTeX data for RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection | DOI (https://doi.org/10.1145/3590777.3590804) | Link to RADAR: A TTP−based Extensible‚ Explainable‚ and Effective System for Network Traffic Analysis and Malware Detection
-
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
Edd Salkield‚ Marcell Szakály‚ Joshua Smailes‚ Simon Birnbach‚ Sebastian Köhler‚ Martin Strohmeier and Ivan Martinovic
In Proceedings of the 16th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). May, 2023.
Best Paper Award: Runner Up!
Details about Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | BibTeX data for Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | Download (pdf) of Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | Link to Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks