Due to its suitability for wireless ranging, Ultra-Wide Band (UWB) has g...
Trusted Execution Environments (TEEs) have been proposed as a solution t...
The majority of smartphones either run iOS or Android operating systems....
Modern data centers have grown beyond CPU nodes to provide domain-specif...
The growing complexity of modern computing platforms and the need for st...
In this paper, we present findings from a large-scale and long-term phis...
We present the first over-the-air attack on IEEE 802.15.4z High-Rate Pul...
We introduce AdaptOver, a new LTE signal overshadowing attack that allow...
We introduce LTrack, a new tracking attack on LTE that allows an attacke...
The majority of smartphones either run iOS or Android operating systems....
Remote services and applications that users access via their local clien...
Encrypted cloud storage services are steadily increasing in popularity, ...
While modern computing architectures rely on specialized hardware such a...
This document describes and analyzes a system for secure and
privacy-pre...
We introduce a new timing side-channel attack on Intel CPU processors. O...
Permissionless blockchains offer many advantages but also have significa...
Mobile autonomous systems, robots, and cyber-physical systems rely on
ac...
Secure distance measurement and therefore secure Time-of-Arrival (ToA)
m...
Low-power wide area networks (LPWANs), such as LoRa, are fast emerging a...
Considering a large number of vulnerabilities reported in the news and t...
We investigate identity lease, a new type of service in which users leas...