Publications

Most of my publications and citations can also be found on Google scholar. My ORCID is 0000-0001-8424-2602. My (public) contributions on Github. This listing uses my BibRest backend.

2018

  • H. R. Ghaeini, D. Antonioli, F. Brasser, A. Sadeghi, and N. O. Tippenhauer, “State-Aware Anomaly Detection for Industrial Control Systems,” in Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC), 2018.
    [Bibtex]
    @inproceedings{ghaeini18stateaware,
    author={Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole},
    title={State-Aware Anomaly Detection for Industrial Control Systems},
    booktitle={Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC)},
    month={April},
    year={2018}}

2017

  • D. Antonioli, H. R. Ghaeini, S. Adepu, M. Ochoa, and N. O. Tippenhauer, “Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3,” in Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS, 2017.
    [Bibtex]
    @inproceedings{antonioli17s3,
    author={Antonioli, Daniele and Ghaeini, Hamid Reza and Adepu, Sridhar and Ochoa, Mart{\'i}n and Tippenhauer, Nils Ole},
    title={Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={November},
    year={2017}}
  • D. Antonioli, S. Siby, and N. O. Tippenhauer, “Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN,” in Proceedings of Conference on Cryptology And Network Security (CANS), 2017.
    [Bibtex]
    @inproceedings{antonioli17eavesdropping,
    author={Antonioli, Daniele and Siby, Sandra and Tippenhauer, Nils Ole},
    title={Practical Evaluation of Passive {COTS} Eavesdropping in 802.11b/n/ac {WLAN}},
    booktitle={Proceedings of Conference on Cryptology And Network Security (CANS)},
    month={November},
    year={2017}}
  • [DOI] R. Ranjan Maiti, S. Siby, R. Sridharan, and N. O. Tippenhauer, “Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios,” in Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2017.
    [Bibtex]
    @inproceedings{maiti17linklayer,
    author={Ranjan Maiti, Rajib and Siby, Sandra and Sridharan, Ragav and Tippenhauer, Nils Ole},
    title={Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios},
    Booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    month={September},
    year={2017},
    doi={10.1007/978-3-319-66399-9_14}}
  • N. Govil, A. Agrawal, and N. O. Tippenhauer, “On Ladder Logic Bombs in Industrial Control Systems,” in Proceedings of the Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS), co-located with ESORICS, 2017.
    [Bibtex]
    @inproceedings{govil17ladder,
    author={Govil, Naman and Agrawal, Anand and Tippenhauer, Nils Ole},
    title={On Ladder Logic Bombs in Industrial Control Systems},
    Booktitle={Proceedings of the Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS), co-located with ESORICS},
    month={September},
    year={2017}}
  • [DOI] J. H. Castellanos, D. Antonioli, N. O. Tippenhauer, and M. Ochoa, “Legacy-Compliant Data Authentication for Industrial Control System Traffic,” in Proceedings of the Conference on Applied Cryptography and Network Security (ACNS), 2017.
    [Bibtex]
    @inproceedings{castellanos17legacy,
    author={Castellanos, John Henry and Antonioli, Daniele and Tippenhauer, Nils Ole and Ochoa, Mart{\'i}n},
    title={Legacy-Compliant Data Authentication for Industrial Control System Traffic},
    booktitle={Proceedings of the Conference on Applied Cryptography and Network Security (ACNS)},
    month={July},
    year={2017},
    doi={10.1007/978-3-319-61204-1_33}}
  • N. O. Tippenhauer, “Messmanipulationen in Steuerungssystemen,” Zeitschrift für Datenrecht und Informationssicherheit (DIGMA), iss. 2, pp. 116-121, 2017.
    [Bibtex]
    @article{tippenhauer17digma,
    author={Tippenhauer, Nils Ole},
    title={Messmanipulationen in Steuerungssystemen},
    journal={Zeitschrift für Datenrecht und Informationssicherheit (DIGMA)},
    year={2017},
    number={2},
    month={July},
    pages={116--121}}
  • [DOI] Y. Meidan, M. Bohadana, A. Shabtai, J. Guarnizo, M. Ochoa, N. O. Tippenhauer, and Y. Elovici, “ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis (Poster),” in Proceedings of the Security Track at ACM Symposium on Applied Computing (SAC), 2017.
    [Bibtex]
    @inproceedings{meidan17profiliot,
    author={Meidan, Yair and Bohadana, Michael and Shabtai, Asaf and Guarnizo, Juan-David and Ochoa, Martin and Tippenhauer, Nils Ole and Elovici, Yuval},
    title={{ProfilIoT}: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis (Poster)},
    booktitle={Proceedings of the Security Track at ACM Symposium on Applied Computing (SAC)},
    month={April},
    year={2017},
    notes={Short-listed for best Poster award},
    doi={10.1145/3019612.3019878}}
  • [DOI] M. Rocchetto and N. O. Tippenhauer, “Towards Formal Security Analysis of Industrial Control Systems,” in Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS), 2017.
    [Bibtex]
    @inproceedings{towards17rocchetto,
    author={Rocchetto, Marco and Tippenhauer, Nils Ole},
    title={Towards Formal Security Analysis of Industrial Control Systems},
    booktitle={Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS)},
    month={April},
    year={2017},
    doi={10.1145/3052973.3053024}}
  • [DOI] J. Guarnizo, A. Tambe, S. S. Bunia, M. Ochoa, N. O. Tippenhauer, A. Shabtai, and Y. Elovici, “SIPHON: Towards Scalable High-Interaction Physical Honeypots,” in Proceedings of the Cyber-Physical System Security Workshop (CPSS), co-located with ASIACCS, 2017.
    [Bibtex]
    @inproceedings{guarnizo17siphon,
    author={Guarnizo, Juan and Tambe, Amit and Bunia, Suman Sankar and Ochoa, Mart{\'i}n and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval},
    title={{SIPHON}: Towards Scalable High-Interaction Physical Honeypots},
    booktitle={Proceedings of the Cyber-Physical System Security Workshop (CPSS), co-located with ASIACCS},
    month={April},
    year={2017},
    doi={10.1145/3055186.3055192},
    notes={Best paper award}}
  • [DOI] S. Siby, R. R. Maiti, and N. O. Tippenhauer, “IoTScanner: Detecting Privacy Threats in IoT Neighborhoods,” in Proceedings of the Workshop on IoT Privacy, Trust, and Security (IoTPTS), co-located with ASIACCS, 2017.
    [Bibtex]
    @inproceedings{siby17iotscannershort,
    author={Siby, Sandra and Maiti, Rajib Ranjan and Tippenhauer, Nils Ole},
    title={{IoTScanner}: Detecting Privacy Threats in {IoT} Neighborhoods},
    booktitle={Proceedings of the Workshop on IoT Privacy, Trust, and Security (IoTPTS), co-located with ASIACCS},
    month={April},
    doi={10.1145/3055245.3055253},
    year={2017}}
  • E. Wilhelm, D. MacKenzie, Y. Zhou, L. Cheah, and N. O. Tippenhauer, “Evaluation of transport mode using wearable sensor data from 43,000 students,” in Proceedings of Transportation Research Board Annual Meeting (TRB), 2017.
    [Bibtex]
    @inproceedings{wilhelm17evaluation,
    author={Wilhelm, Erik and MacKenzie, Don and Zhou, Yuren and Cheah, Lynette and Tippenhauer, Nils Ole},
    title={Evaluation of transport mode using wearable sensor data from 43,000 students},
    booktitle={Proceedings of Transportation Research Board Annual Meeting (TRB)},
    month={January},
    year={2017}}

2016

  • [DOI] K. Jansen, N. O. Tippenhauer, and C. Pöpper, “Multi-Receiver GPS Spoofing Detection: Error Models and Realization,” in Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016.
    [Bibtex]
    @inproceedings{jansen16gps,
    author={Jansen, Kai and Tippenhauer, Nils Ole and P\"opper, Christina},
    title={Multi-Receiver {GPS} Spoofing Detection: Error Models and Realization},
    booktitle={Proceedings of the Annual Computer Security Applications Conference (ACSAC)},
    month={December},
    doi={10.1145/2991079.2991092},
    year={2016}}
  • [DOI] S. Siboni, A. Shabtai, N. O. Tippenhauer, J. Lee, and Y. Elovici, “Advanced Security Testbed Framework for Wearable IoT Devices,” Transactions on Internet Technology (TOIT), vol. 16, iss. 4, pp. 1-25, 2016.
    [Bibtex]
    @article{siboni16testbed,
    author={Siboni, Shachar and Shabtai, Asaf and Tippenhauer, Nils Ole and Lee, Jemin and Elovici, Yuval},
    title={Advanced Security Testbed Framework for Wearable {IoT} Devices},
    journal={Transactions on Internet Technology (TOIT)},
    year={2016},
    volume={16},
    number={4},
    pages={1--25},
    month={December},
    doi={10.1145/2981546},
    publisher={ACM}}
  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld, “Characterizing Cyber-Physical Attacks on Water Distribution Systems,” Journal of Water Resources Planning and Management, vol. 143, 2016.
    [Bibtex]
    @article{taormina16characterizing,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi},
    title={Characterizing Cyber-Physical Attacks on Water Distribution Systems},
    publisher={ASCE},
    year={2016},
    volume={143},
    issue={5},
    doi={10.1061/(ASCE)WR.1943-5452.0000749},
    journal={Journal of Water Resources Planning and Management},
    month={December}}
  • [DOI] N. O. Tippenhauer, K. B. Rasmussen, and S. Capkun, “Physical-Layer Integrity for Wireless Messages,” Computer Networks, vol. 109, iss. 1, pp. 31-38, 2016.
    [Bibtex]
    @article{tippenhauer16integrity,
    author={Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Capkun, Srdjan},
    title={Physical-Layer Integrity for Wireless Messages},
    journal={Computer Networks},
    volume={109},
    number={1},
    pages={31--38},
    year={2016},
    month={November},
    issn={1389-1286},
    publisher={Elsevier},
    doi={10.1016/j.comnet.2016.06.021}}
  • [DOI] E. Wilhelm, S. Siby, Y. Zhou, X. J. S. Ashok, M. Jayasuriya, S. Foong, J. Kee, K. Wood, and N. O. Tippenhauer, “Wearable Environmental Sensors and Infrastructure for Mobile Large-scale Urban Deployment,” Sensors, vol. 16, iss. 22, pp. 8111-8123, 2016.
    [Bibtex]
    @article{wilhelm16Wearable,
    author={Wilhelm, Erik and Siby, Sandra and Zhou, Yuren and Ashok, Xavier J. S. and Jayasuriya, Melani and Foong, Shaohui and Kee, Jacksheeng and Wood, Kristin and Tippenhauer, Nils Ole},
    title={Wearable Environmental Sensors and Infrastructure for Mobile Large-scale Urban Deployment},
    journal={Sensors},
    volume={16},
    number={22},
    pages={8111--8123},
    publisher={IEEE},
    doi={10.1109/JSEN.2016.2603158},
    year={2016},
    month={November}}
  • [DOI] D. Urbina, J. Giraldo, A. A. Cardenas, N. O. Tippenhauer, J. Valente, M. Faisal, J. Ruths, R. Candell, and H. Sandberg, “Limiting The Impact of Stealthy Attacks on Industrial Control Systems,” in Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2016.
    [Bibtex]
    @inproceedings{urbina16limiting,
    author={Urbina, David and Giraldo, Jairo and Cardenas, Alvaro A. and Tippenhauer, Nils Ole and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Candell, Richard and Sandberg, Henrik},
    title={Limiting The Impact of Stealthy Attacks on Industrial Control Systems},
    booktitle={Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
    month={October},
    year={2016},
    doi={10.1145/2976749.2978388}}
  • [DOI] M. Rocchetto and N. O. Tippenhauer, “CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions,” in Proceedings of the International Conference on Formal Engineering Methods (ICFEM), 2016.
    [Bibtex]
    @inproceedings{rocchetto16cpdy,
    author={Rocchetto, Marco and Tippenhauer, Nils Ole},
    year={2016},
    booktitle={Proceedings of the International Conference on Formal Engineering Methods (ICFEM)},
    title={{CPDY}: Extending the {Dolev-Yao} Attacker with Physical-Layer Interactions},
    month={October},
    doi={10.1007/978-3-319-47846-3_12}}
  • [DOI] D. Antonioli, A. Agrawal, and N. O. Tippenhauer, “Towards High-Interaction Virtual ICS Honeypots-in-a-Box,” in Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS, 2016.
    [Bibtex]
    @inproceedings{antonioli16towards,
    author={Antonioli, Daniele and Agrawal, Anand and Tippenhauer, Nils Ole},
    title={Towards High-Interaction Virtual {ICS} Honeypots-in-a-Box},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={October},
    doi={10.1145/2994487.2994493},
    year={2016}}
  • [DOI] H. Ghaeini and N. O. Tippenhauer, “HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems,” in Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS, 2016.
    [Bibtex]
    @inproceedings{ghaeini16hamids,
    author={Ghaeini, Hamid and Tippenhauer, Nils Ole},
    title={{HAMIDS}: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={October},
    doi={10.1145/2994487.2994492},
    year={2016}}
  • [DOI] M. Rocchetto and N. O. Tippenhauer, “On Attacker Models and Profiles for Cyber-Physical Systems,” in Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2016.
    [Bibtex]
    @inproceedings{rocchetto16models,
    author={Rocchetto, Marco and Tippenhauer, Nils Ole},
    Title={On Attacker Models and Profiles for Cyber-Physical Systems},
    Booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    month={September},
    year={2016},
    doi={10.1007/978-3-319-45741-3_22}}
  • [DOI] X. Dong, S. Jauhar, W. G. Temple, B. Chen, Z. Kalbarczyk, W. H. Sanders, N. O. Tippenhauer, and D. M. Nicol, “The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment,” in Proceedings of Workshop on Graphical Models for Security (GraMSec), 2016.
    [Bibtex]
    @inproceedings{dong16cissa,
    author={Dong, Xinshu and Jauhar, Sumeet and Temple, William G. and Chen, Binbin and Kalbarczyk, Zbigniew and Sanders, William H. and Tippenhauer, Nils Ole and Nicol, David M.},
    title={The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment},
    booktitle={Proceedings of Workshop on Graphical Models for Security (GraMSec)},
    month={June},
    doi={10.1007/978-3-319-46263-9_3},
    year={2016}}
  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld, “Assessing the effect of cyber-physical attacks on water distribution systems,” in Proceedings of World Congress on Environmental & Water Resources (EWRI), 2016.
    [Bibtex]
    @inproceedings{taormina16assessing,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi},
    title={Assessing the effect of cyber-physical attacks on water distribution systems},
    booktitle={Proceedings of World Congress on Environmental \& Water Resources (EWRI)},
    month={May},
    doi={10.1061/9780784479865.046},
    year={2016}}
  • N. O. Tippenhauer, M. Ochoa, and A. Mathur, “Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures,” in Proceedings of Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN), 2016.
    [Bibtex]
    @inproceedings{tippenhauer16testbeds,
    author={Tippenhauer, Nils Ole and Ochoa, Martin and Mathur, Aditya},
    title={Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures},
    booktitle={Proceedings of Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN)},
    month={April},
    url={https://sites.google.com/site/serecin2016/programme/proceedings/serecin_2016.pdf},
    year={2016}}
  • [DOI] A. Mathur and N. O. Tippenhauer, “SWaT: A Water Treatment Testbed for Research and Training on ICS Security,” in Proceedings of Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater), 2016.
    [Bibtex]
    @inproceedings{mathur16swat,
    author={Mathur, Aditya and Tippenhauer, Nils Ole},
    title={{SWaT}: A Water Treatment Testbed for Research and Training on {ICS} Security},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater)},
    month={April},
    doi={10.1109/CySWater.2016.7469060},
    year={2016}}
  • [DOI] D. Urbina, J. Giraldo, N. O. Tippenhauer, and A. Cárdenas, “Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed,” in Proceedings of Singapore Cyber Security Conference (SG-CRC), 2016.
    [Bibtex]
    @inproceedings{urbina16fieldbus,
    author={Urbina, David and Giraldo, Jairo and Tippenhauer, Nils Ole and C\'ardenas, Alvaro},
    title={Attacking Fieldbus Communications in {ICS}: Applications to the {SWaT} Testbed},
    booktitle={Proceedings of Singapore Cyber Security Conference (SG-CRC)},
    month={January},
    year={2016},
    doi={10.3233/978-1-61499-617-0-75}}
  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld, “Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET,” in Proceedings of Singapore Cyber Security Conference (SG-CRC), 2016.
    [Bibtex]
    @inproceedings{taormina16simulation,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi},
    title={Simulation of Cyber-Physical Attacks on Water Distribution Systems with {EPANET}},
    booktitle={Proceedings of Singapore Cyber Security Conference (SG-CRC)},
    month={January},
    year={2016},
    doi={10.3233/978-1-61499-617-0-123}}
  • E. Wilhelm, N. O. Tippenhauer, Y. Zhou, and N. Zhang, “SENSg: Large-Scale Deployment of Wearable Sensors for Trip and Transport Mode Logging,” in Proceedings of Transportation Research Board Annual Meeting (TRB), 2016.
    [Bibtex]
    @inproceedings{wilhelm16sensg,
    author={Wilhelm, Erik and Tippenhauer, Nils Ole and Zhou, Yuren and Zhang, Nan},
    title={{SENSg}: Large-Scale Deployment of Wearable Sensors for Trip and Transport Mode Logging},
    booktitle={Proceedings of Transportation Research Board Annual Meeting (TRB)},
    month={January},
    year={2016}}

2015

  • [DOI] D. Antonioli and N. O. Tippenhauer, “MiniCPS: A toolkit for security research on CPS Networks,” in Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS, 2015.
    [Bibtex]
    @inproceedings{antonioli15minicps,
    author={Antonioli, Daniele and Tippenhauer, Nils Ole},
    title={{MiniCPS}: A toolkit for security research on {CPS} Networks},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={October},
    year={2015},
    doi={10.1145/2808705.2808715}}
  • [DOI] N. O. Tippenhauer, H. Luecken, M. Kuhn, and S. Capkun, “UWB Rapid-Bit-Exchange System for Distance Bounding,” in Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015.
    [Bibtex]
    @inproceedings{tippenhauer15uwb,
    author={Tippenhauer, Nils Ole and Luecken, Heinrich and Kuhn, Marc and Capkun, Srdjan},
    title={{UWB} Rapid-Bit-Exchange System for Distance Bounding},
    booktitle={Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)},
    month={June},
    year={2015},
    doi={10.1145/2766498.2766504}}

2014

  • [DOI] N. O. Tippenhauer, W. G. Temple, A. H. Vu, B. Chen, D. M. Nicol, Z. Kalbarczyk, and W. Sanders, “Automatic Generation of Security Argument Graphs,” in Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), 2014.
    [Bibtex]
    @inproceedings{tippenhauer14automatic,
    author={Tippenhauer, Nils Ole and Temple, William G. and Vu, An Hoa and Chen, Binbin and Nicol, David M. and Kalbarczyk, Zbigniew and Sanders, William},
    title={Automatic Generation of Security Argument Graphs},
    booktitle={Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC)},
    year={2014},
    month={November},
    doi={10.1109/PRDC.2014.13}}
  • [DOI] A. H. Vu, N. O. Tippenhauer, B. Chen, D. M. Nicol, and Z. Kalbarczyk, “CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems,” in Proceedings of the Conference on Quantitative Evaluation of SysTems (QEST), 2014.
    [Bibtex]
    @inproceedings{vu14cybersage,
    author={Vu, An Hoa and Tippenhauer, Nils Ole and Chen, Binbin and Nicol, David M. and Kalbarczyk, Zbigniew},
    title={{CyberSAGE}: A Tool for Automatic Security Assessment of Cyber-Physical Systems},
    booktitle={Proceedings of the Conference on Quantitative Evaluation of SysTems (QEST)},
    year={2014},
    month={September},
    doi={10.1007/978-3-319-10696-0_29}}

2013

  • [DOI] B. Chen, Z. Kalbarczyk, D. M. Nicol, W. H. Sanders, R. Tan, W. G. Temple, N. O. Tippenhauer, A. H. Vu, and D. K. Y. Yau, “Go with the Flow: Toward Workflow-Oriented Security Assessment,” in Proceedings of New Security Paradigm Workshop (NSPW), 2013.
    [Bibtex]
    @inproceedings{chen13flow,
    author={Chen, Binbin and Kalbarczyk, Zbigniew and Nicol, David M. and Sanders, William H. and Tan, Rui and Temple, William G. and Tippenhauer, Nils Ole and Vu, An Hoa and Yau, David K.Y.},
    Title={Go with the Flow: Toward Workflow-Oriented Security Assessment},
    Booktitle={Proceedings of New Security Paradigm Workshop (NSPW)},
    Year={2013},
    doi={10.1145/2535813.2535821},
    month={December}}
  • [DOI] W. G. Temple, B. Chen, and N. O. Tippenhauer, “Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack,” in Proceedings of the IEEE Conference on Smart Grid Communications (SmartGridComm), 2013.
    [Bibtex]
    @inproceedings{temple13delay,
    author={Temple, William G. and Chen, Binbin and Tippenhauer, Nils Ole},
    Title={Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack},
    Booktitle={Proceedings of the IEEE Conference on Smart Grid Communications (SmartGridComm)},
    Year={2013},
    Month={December},
    doi={10.1109/SmartGridComm.2013.6688001}}
  • [DOI] N. O. Tippenhauer, L. Malisa, A. Ranganathan, and S. Capkun, “On Limitations of Friendly Jamming for Confidentiality,” in Proceedings of the IEEE Symposium on Security and Privacy, 2013.
    [Bibtex]
    @inproceedings{tippenhauer2013limitations,
    author={Tippenhauer, Nils Ole and Malisa, Luka and Ranganathan, Aanjhan and Capkun, Srdjan},
    title={On Limitations of Friendly Jamming for Confidentiality},
    booktitle={Proceedings of the IEEE Symposium on Security and Privacy},
    year={2013},
    doi={10.1109/SP.2013.21},
    month={December}}

2012

  • [DOI] A. Ranganathan, N. O. Tippenhauer, B. Skoric, D. Singelé, and S. Čapkun, “Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System,” in Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2012.
    [Bibtex]
    @inproceedings{ranganathan12terrorist,
    author={Ranganathan, Aanjhan and Tippenhauer, Nils Ole and Skoric, Boris and Singel\'e, Dave and \v{C}apkun, Srdjan},
    title={Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System},
    booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    publisher={Springer},
    year={2012},
    series={Lecture Notes in Computer Science},
    doi={10.1007/978-3-642-33167-1_24},
    month={December}}
  • [DOI] N. O. Tippenhauer, D. Giustiniano, and S. Mangold, “Toys communicating with LEDs: Enabling toy cars interaction,” in Proceedings of Consumer Communications and Networking Conference (CCNC), 2012, pp. 48-49.
    [Bibtex]
    @inproceedings{tippenhauer2012toys,
    author={Tippenhauer, Nils Ole and Giustiniano, Domenico and Mangold, Stefan},
    title={Toys communicating with {LEDs}: Enabling toy cars interaction},
    booktitle={Proceedings of Consumer Communications and Networking Conference (CCNC)},
    pages={48--49},
    year={2012},
    organization={IEEE},
    doi={10.1109/CCNC.2012.6181045},
    month={December}}
  • [DOI] D. Giustiniano, N. O. Tippenhauer, and S. Mangold, “Low-complexity Visible Light Networking with LED-to-LED communication,” in Proceedings of IFIP Wireless Days, 2012.
    [Bibtex]
    @inproceedings{giustiniano12low,
    author={Giustiniano, D. and Tippenhauer, N.O. and Mangold, S.},
    booktitle={Proceedings of IFIP Wireless Days},
    title={Low-complexity Visible Light Networking with LED-to-LED communication},
    year={2012},
    month={November},
    doi={10.1109/WD.2012.6402861}}
  • [DOI] N. O. Tippenhauer, “Physical-Layer Security Aspects of Wireless Localization,” PhD Thesis, 2012.
    [Bibtex]
    @phdthesis{tippenhauer12phd,
    author={Tippenhauer, Nils Ole},
    title={Physical-Layer Security Aspects of Wireless Localization},
    school={ETH Zurich, Switzerland},
    year={2012},
    month={March},
    doi={10.3929/ethz-a-7352063}}

2011

  • [DOI] C. Pöpper, N. O. Tippenhauer, B. Danev, and S. Čapkun, “Investigation of Signal and Message Manipulations on the Wireless Channel,” in Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2011.
    [Bibtex]
    @inproceedings{poepper11manipulations,
    author={P\"opper, Christina and Tippenhauer, Nils Ole and Danev, Boris and \v{C}apkun, Srdjan},
    Title={Investigation of Signal and Message Manipulations on the Wireless Channel},
    Booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    Year={2011},
    doi={10.1007/978-3-642-23822-2_3},
    month={December}}
  • [DOI] N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Čapkun, “On the Requirements for Successful GPS Spoofing Attacks,” in Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011.
    [Bibtex]
    @inproceedings{tippenhauer11gps,
    author={Tippenhauer, Nils Ole and P\"{o}pper, Christina and Rasmussen, Kasper Bonne and \v{C}apkun, Srdjan},
    title={On the Requirements for Successful {GPS} Spoofing Attacks},
    booktitle={Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
    year={2011},
    doi={10.1145/2046707.2046719},
    month={December}}

2010

  • [DOI] M. Kuhn, H. Luecken, and N. O. Tippenhauer, “UWB Impulse Radio Based Distance Bounding,” in Proceedings of the Workshop on Positioning, Navigation and Communication (WPNC), 2010.
    [Bibtex]
    @inproceedings{Kuhn10uwbdb,
    author={Kuhn, Marc and Luecken, Heinrich and Tippenhauer, Nils Ole},
    title={{UWB} Impulse Radio Based Distance Bounding},
    booktitle={Proceedings of the Workshop on Positioning, Navigation and Communication (WPNC)},
    year={2010},
    doi={10.1109/WPNC.2010.5653801},
    month={December}}
  • [DOI] S. Čapkun, M. Čagalj, G. Karame, and N. O. Tippenhauer, “Integrity Regions: Authentication Through Presence in Wireless Networks,” IEEE Transactions on Mobile Computing, 2010.
    [Bibtex]
    @article{capkunTMC10,
    author={\v{C}apkun, Srdjan and \v{C}agalj, Mario and Karame, Ghassan and Tippenhauer, Nils Ole},
    title={Integrity Regions: Authentication Through Presence in Wireless Networks},
    journal={IEEE Transactions on Mobile Computing},
    year={2010},
    publisher={IEEE},
    doi={10.1109/TMC.2010.127},
    month={December}}

2009

  • [DOI] N. O. Tippenhauer and S. Čapkun, “ID-based Secure Distance Bounding and Localization,” in Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2009.
    [Bibtex]
    @inproceedings{tippenhauer09idbased,
    author={Tippenhauer, Nils Ole and \v{C}apkun, Srdjan},
    title={{ID}-based Secure Distance Bounding and Localization},
    booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    year={2009},
    doi={10.1007/978-3-642-04444-1_38},
    month={December}}
  • [DOI] N. O. Tippenhauer, K. B. Rasmussen, C. Pöpper, and S. Čapkun, “Attacks on Public WLAN-based Positioning,” in Proceedings of the ACM Conference on Mobile Systems, Applications and Services (MobiSys), 2009.
    [Bibtex]
    @inproceedings{tippenhauer09attacks,
    author={Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and P\"opper, Christina and \v{C}apkun, Srdjan},
    title={Attacks on Public {WLAN}-based Positioning},
    booktitle={Proceedings of the ACM Conference on Mobile Systems, Applications and Services (MobiSys)},
    year={2009},
    doi={10.1145/1555816.1555820},
    month={December}}
  • N. O. Tippenhauer, K. B. Rasmussen, and S. Čapkun, “Secure Ranging With Message Temporal Integrity,” in Cryptology ePrint Archive: Report 2009/602, 2009.
    [Bibtex]
    @inproceedings{tippenhauer09temp,
    author={Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and \v{C}apkun, Srdjan},
    title={Secure Ranging With Message Temporal Integrity},
    booktitle={Cryptology ePrint Archive: Report 2009/602},
    year={2009},
    month={December}}

2007

  • N. O. Tippenhauer, “Design and Cryptoanalysis of Multi-Precision Arithmetics on Smart Cards with SmartMIPS Architecture,” Master Thesis, 2007.
    [Bibtex]
    @mastersthesis{tippenhauer07smartmips,
    author={Tippenhauer, Nils Ole},
    title={Design and Cryptoanalysis of Multi-Precision Arithmetics on Smart Cards with {SmartMIPS} Architecture},
    school={Hamburg University of Technology (TUHH)},
    year={2007},
    note={Supervised by Prof. Dieter Gollmann and Prof. Heike Neumann},
    month={December}}

Fun fact: my Erdős number is 4 (via Yuval Elovici)