Mind the gap: Security & privacy risks of contact tracing apps L Baumgärtner, A Dmitrienko, B Freisleben, A Gruler, J Höchst, ... 2020 IEEE 19th international conference on trust, security and privacy in …, 2020 | 96 | 2020 |
Alexa lied to me: Skill-based man-in-the-middle attacks on virtual assistants R Mitev, M Miettinen, AR Sadeghi Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 71 | 2019 |
Leakypick: Iot audio spy detector R Mitev, A Pazii, M Miettinen, W Enck, AR Sadeghi Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 41 | 2020 |
GhostTouch: Targeted attacks on touchscreens without physical touch K Wang, R Mitev, C Yan, X Ji, AR Sadeghi, W Xu 31st USENIX Security Symposium (USENIX Security 22), 1543-1559, 2022 | 29 | 2022 |
Fakewake: Understanding and mitigating fake wake-up words of voice assistants Y Chen, Y Bai, R Mitev, K Wang, AR Sadeghi, W Xu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 21 | 2021 |
Wight: Wired ghost touch attack on capacitive touchscreens Y Jiang, X Ji, K Wang, C Yan, R Mitev, AR Sadeghi, W Xu 2022 IEEE Symposium on Security and Privacy (SP), 984-1001, 2022 | 18 | 2022 |
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M XM Saß, R Mitev, AR Sadeghi 32nd USENIX Security Symposium (USENIX Security 23), 6239-6256, 2023 | 12 | 2023 |
Don’t shoot the messenger: Localization prevention of satellite internet users D Koisser, R Mitev, M Chilese, AR Sadeghi 2024 IEEE Symposium on Security and Privacy (SP), 426-444, 2024 | 5 | 2024 |
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices M Chilese, R Mitev, M Orenbach, R Thorburn, A Atamli, AR Sadeghi arXiv preprint arXiv:2403.07465, 2024 | 4 | 2024 |
Analyzing and Defending GhostTouch Attack against Capacitive Touchscreens K Wang, R Mitev, C Yan, X Ji, AR Sadeghi, W Xu IEEE Transactions on Dependable and Secure Computing, 2024 | 2 | 2024 |
Unleashing iot security: Assessing the effectiveness of best practices in protecting against threats P Pütz, R Mitev, M Miettinen, AR Sadeghi Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | 1 | 2023 |
Marionette: Manipulate your touchscreen via a charging cable Y Jiang, X Ji, K Wang, C Yan, R Mitev, AR Sadeghi, W Xu IEEE Transactions on Dependable and Secure Computing, 2023 | 1 | 2023 |
Orbital Trust and Privacy:{SoK} on {PKI} and Location Privacy Challenges in Space Networks D Koisser, R Mitev, N Yadav, F Vollmer, AR Sadeghi 33rd USENIX Security Symposium (USENIX Security 24), 6093-6111, 2024 | | 2024 |
D3. 2: ASSURED LAYERED ATTESTATION AND RUNTIME VERIFICATION ENABLERS DESIGN & IMPLEMENTATION R Mitev, P Rieger, M Orenbach | | 2020 |
D3. 6: ASSURED SECURE AND SCALABLE AGGREGATE NETWORK ATTESATION R Mitev, P Rieger, D Karras | | 2020 |
D1. 3 OPERATIONAL SOS PROCESS MODELS & SPECIFICATION OF PROPERTIES J Wang, F Brasser, R Mitev, I Avramidis | | 2020 |