no code implementations • 19 Sep 2023 • Afifa Ishtiaq, Arash Asadi, Ladan Khaloopour, Waqar Ahmed, Vahid Jamali, Matthias Hollick
The high directionality of millimeter-wave (mmWave) communication systems has proven effective in reducing the attack surface against eavesdropping, thus improving the physical layer security.
1 code implementation • 4 Dec 2021 • Matthias Gazzari, Annemarie Mattmann, Max Maass, Matthias Hollick
Wearables that constantly collect various sensor data of their users increase the chances for inferences of unintentional and sensitive information such as passwords typed on a physical keyboard.
no code implementations • 9 Aug 2021 • Luis F. Abanto-Leon, Matthias Hollick, Gek Hong Sim
The omnipresence of IoT devices in Industry 4. 0 is expected to foster higher reliability, safety, and efficiency.
no code implementations • 17 Aug 2020 • Luis F. Abanto-Leon, Gek Hong Sim, Matthias Hollick, Amnart Boonkajay, Fumiyuki Adachi
Nevertheless, due to the exhaustive search requirement, it demands excessive computational complexity.
1 code implementation • 10 Aug 2020 • Steffen Klee, Alexandros Roussos, Max Maass, Matthias Hollick
With in-flight traffic analysis and modification, relay, and replay features this toolkit turns an off-the-shelf smartphone into a powerful NFC research tool.
Cryptography and Security
1 code implementation • 1 Jul 2020 • Alexander Heinrich, Milan Stute, Matthias Hollick
The market for Bluetooth Low Energy devices is booming and, at the same time, has become an attractive target for adversaries.
Cryptography and Security
no code implementations • 17 Jun 2020 • Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick
Wireless communication standards and implementations have a troubled history regarding security.
Cryptography and Security Networking and Internet Architecture
no code implementations • 3 Feb 2020 • Luis F. Abanto-Leon, Matthias Hollick, Gek Hong Sim
Industry 4. 0 anticipates massive interconnectivity of industrial devices (e. g., sensors, actuators) to support factory automation and production.
1 code implementation • 22 Jan 2019 • Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick
The Internet of Things (IoT) demands authentication systems which can provide both security and usability.
1 code implementation • 28 Jun 2017 • Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti
In this paper, we provide an in-depth security analysis of the operation of fitness trackers commercialized by Fitbit, the wearables market leader.
Cryptography and Security
3 code implementations • 24 Dec 2015 • Matthias Schulz, Daniel Wegemer, Matthias Hollick
Full control over a Wi-Fi chip for research purposes is often limited by its firmware, which makes it hard to evolve communication protocols and test schemes in practical environments.
Other Computer Science