Search Results for author: Matthias Hollick

Found 11 papers, 6 papers with code

BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries

no code implementations19 Sep 2023 Afifa Ishtiaq, Arash Asadi, Ladan Khaloopour, Waqar Ahmed, Vahid Jamali, Matthias Hollick

The high directionality of millimeter-wave (mmWave) communication systems has proven effective in reducing the attack surface against eavesdropping, thus improving the physical layer security.

My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack

1 code implementation4 Dec 2021 Matthias Gazzari, Annemarie Mattmann, Max Maass, Matthias Hollick

Wearables that constantly collect various sensor data of their users increase the chances for inferences of unintentional and sensitive information such as passwords typed on a physical keyboard.

SWAN: Swarm-Based Low-Complexity Scheme for PAPR Reduction

no code implementations17 Aug 2020 Luis F. Abanto-Leon, Gek Hong Sim, Matthias Hollick, Amnart Boonkajay, Fumiyuki Adachi

Nevertheless, due to the exhaustive search requirement, it demands excessive computational complexity.

NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit

1 code implementation10 Aug 2020 Steffen Klee, Alexandros Roussos, Max Maass, Matthias Hollick

With in-flight traffic analysis and modification, relay, and replay features this toolkit turns an off-the-shelf smartphone into a powerful NFC research tool.

Cryptography and Security

DEMO: BTLEmap: Nmap for Bluetooth Low Energy

1 code implementation1 Jul 2020 Alexander Heinrich, Milan Stute, Matthias Hollick

The market for Bluetooth Low Energy devices is booming and, at the same time, has become an attractive target for adversaries.

Cryptography and Security

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets

no code implementations17 Jun 2020 Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick

Wireless communication standards and implementations have a troubled history regarding security.

Cryptography and Security Networking and Internet Architecture

HydraWave: Multi-Group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communication

no code implementations3 Feb 2020 Luis F. Abanto-Leon, Matthias Hollick, Gek Hong Sim

Industry 4. 0 anticipates massive interconnectivity of industrial devices (e. g., sensors, actuators) to support factory automation and production.

Robust Design Scheduling

Perils of Zero-Interaction Security in the Internet of Things

1 code implementation22 Jan 2019 Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick

The Internet of Things (IoT) demands authentication systems which can provide both security and usability.

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

1 code implementation28 Jun 2017 Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti

In this paper, we provide an in-depth security analysis of the operation of fitness trackers commercialized by Fitbit, the wearables market leader.

Cryptography and Security

NexMon: A Cookbook for Firmware Modifications on Smartphones to Enable Monitor Mode

3 code implementations24 Dec 2015 Matthias Schulz, Daniel Wegemer, Matthias Hollick

Full control over a Wi-Fi chip for research purposes is often limited by its firmware, which makes it hard to evolve communication protocols and test schemes in practical environments.

Other Computer Science

Cannot find the paper you are looking for? You can Submit a new open access paper.