default search action
Kasper Bonne Rasmussen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Matthew Rogers, Kasper Rasmussen:
Targeted Detection for Attacks on the MIL-STD-1553 Bus. IEEE Trans. Aerosp. Electron. Syst. 60(1): 548-557 (2024) - [c53]Joe Loughry, Kasper Rasmussen:
Basilisk: Remote Code Execution by Laser Excitation of P-N Junctions Without Insider Assistance. WOOT @ USENIX Security Symposium 2024: 245-261 - [e1]Yongdae Kim, Jong Kim, Farinaz Koushanfar, Kasper Rasmussen:
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024. ACM 2024 [contents] - [i20]Wil Liam Teng, Kasper Rasmussen:
Defending Against Attack on the Cloned: In-Band Active Man-in-the-Middle Detection for the Signal Protocol. CoRR abs/2410.16098 (2024) - 2023
- [j18]Munir Geden, Kasper Rasmussen:
RegGuard: Leveraging CPU registers for mitigation of control- and data-oriented attacks. Comput. Secur. 129: 103213 (2023) - [j17]Munir Geden, Kasper Rasmussen:
Hardware-assisted remote attestation design for critical embedded systems. IET Inf. Secur. 17(3): 518-533 (2023) - [j16]Mirjana Stojilovic, Kasper Rasmussen, Francesco Regazzoni, Mehdi B. Tahoori, Russell Tessier:
A Visionary Look at the Security of Reconfigurable Cloud Computing. Proc. IEEE 111(12): 1548-1571 (2023) - [j15]Matthew Rogers, Phillip Weigand, Jassim Happa, Kasper Rasmussen:
Detecting CAN Attacks on J1939 and NMEA 2000 Networks. IEEE Trans. Dependable Secur. Comput. 20(3): 2406-2420 (2023) - [c52]Hayyu Imanda, Kasper Rasmussen:
Nakula: Coercion Resistant Data Storage against Time-Limited Adversary. ARES 2023: 4:1-4:11 - [c51]Wil Liam Teng, Kasper Rasmussen:
Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine Communication. ARES 2023: 7:1-7:11 - [c50]Youqian Zhang, Kasper Rasmussen:
Electromagnetic Signal Injection Attacks on Differential Signaling. AsiaCCS 2023: 314-325 - [c49]Matthew Rogers, Kasper Rasmussen:
An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks. AsiaCCS 2023: 481-493 - [i19]Hayyu Imanda, Kasper Rasmussen:
Ask for Alice: Online Covert Distress Signal in the Presence of a Strong Adversary. CoRR abs/2310.03237 (2023) - [i18]Angeliki Aktypi, Kasper Rasmussen:
Iris: Dynamic Privacy Preserving Search in Structured Peer-to-Peer Networks. CoRR abs/2310.19634 (2023) - 2022
- [j14]Ilias Giechaskiel, Kasper Rasmussen, Ken Eguro:
Long-Wire Leakage: The Threat of Crosstalk. IEEE Des. Test 39(4): 41-48 (2022) - [c48]Angeliki Aktypi, Dimitris Karnikis, Nikos Vasilakis, Kasper Rasmussen:
Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing. ARES 2022: 10:1-10:11 - [c47]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer:
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy. AsiaCCS 2022: 196-207 - [c46]Youqian Zhang, Kasper Rasmussen:
Detection of Electromagnetic Signal Injection Attacks on Actuator Systems. RAID 2022: 171-184 - [i17]Matthew Rogers, Kasper Rasmussen:
Silently Disabling ECUs and Enabling Blind Attacks on the CAN Bus. CoRR abs/2201.06362 (2022) - [i16]Youqian Zhang, Kasper Rasmussen:
Detection of Electromagnetic Signal Injection Attacks on Actuator Systems. CoRR abs/2203.07102 (2022) - [i15]Thomas Burton, Kasper Rasmussen:
Orientation Estimation using Wireless Device Radiation Patterns. CoRR abs/2203.10052 (2022) - [i14]Youqian Zhang, Kasper Rasmussen:
Electromagnetic Signal Injection Attacks on Differential Signaling. CoRR abs/2208.00343 (2022) - 2021
- [c45]Ilias Giechaskiel, Ken Eguro, Kasper Rasmussen:
Extended Abstract: Covert Channels and Data Exfiltration From FPGAs. DATE 2021: 1638 - [c44]Thomas Burton, Kasper Rasmussen:
Private Data Exfiltration from Cyber-Physical Systems Using Channel State Information. WPES@CCS 2021: 223-235 - [i13]Munir Geden, Kasper Rasmussen:
RegGuard: Leveraging CPU Registers for Mitigation of Control- and Data-Oriented Attacks. CoRR abs/2110.10769 (2021) - 2020
- [j13]Kübra Kalkan, Kasper Bonne Rasmussen:
TruSD: Trust framework for service discovery among IoT devices. Comput. Networks 178: 107318 (2020) - [j12]Ilias Giechaskiel, Kasper Rasmussen:
Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses. IEEE Commun. Surv. Tutorials 22(1): 645-670 (2020) - [j11]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy. ACM Trans. Priv. Secur. 23(3): 14:1-14:28 (2020) - [c43]Angeliki Aktypi, Kübra Kalkan, Kasper Bonne Rasmussen:
SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network. CODASPY 2020: 271-282 - [c42]Shanquan Tian, Wenjie Xiong, Ilias Giechaskiel, Kasper Rasmussen, Jakub Szefer:
Fingerprinting Cloud FPGA Infrastructures. FPGA 2020: 58-64 - [c41]Youqian Zhang, Kasper Rasmussen:
Detection of Electromagnetic Interference Attacks on Sensor Systems. SP 2020: 203-216 - [c40]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
BIAS: Bluetooth Impersonation AttackS. SP 2020: 549-562 - [c39]Ilias Giechaskiel, Kasper Bonne Rasmussen, Jakub Szefer:
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage. SP 2020: 1728-1741 - [c38]Munir Geden, Kasper Rasmussen:
TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity. TrustCom 2020: 174-181 - [i12]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer:
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy. CoRR abs/2009.11776 (2020)
2010 – 2019
- 2019
- [j10]Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - [j9]Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric Authentication. ACM Trans. Priv. Secur. 22(1): 4:1-4:30 (2019) - [j8]Ilias Giechaskiel, Ken Eguro, Kasper Bonne Rasmussen:
Leakier Wires: Exploiting FPGA Long Wires for Covert- and Side-channel Attacks. ACM Trans. Reconfigurable Technol. Syst. 12(3): 11:1-11:29 (2019) - [c37]Simon Eberz, Giulio Lovisotto, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics. CCS 2019: 1187-1199 - [c36]Ilias Giechaskiel, Youqian Zhang, Kasper Bonne Rasmussen:
A Framework for Evaluating Security in the Presence of Signal Injection Attacks. ESORICS (1) 2019: 512-532 - [c35]Ilias Giechaskiel, Kasper Bonne Rasmussen, Jakub Szefer:
Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs. FPL 2019: 45-50 - [c34]Ilias Giechaskiel, Kasper Rasmussen, Jakub Szefer:
Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs. ICCD 2019: 1-10 - [c33]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen:
Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android. NDSS 2019 - [c32]Munir Geden, Kasper Rasmussen:
Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems. PST 2019: 1-10 - [c31]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen:
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR. USENIX Security Symposium 2019: 1047-1061 - [i11]Ilias Giechaskiel, Youqian Zhang, Kasper Bonne Rasmussen:
A Framework for Evaluating Security in the Presence of Signal Injection Attacks. CoRR abs/1901.03675 (2019) - [i10]Ilias Giechaskiel, Kasper Bonne Rasmussen:
SoK: Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses. CoRR abs/1901.06935 (2019) - [i9]Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen:
Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy. IACR Cryptol. ePrint Arch. 2019: 933 (2019) - [i8]Eman Salem Alashwali, Kasper Rasmussen:
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. IACR Cryptol. ePrint Arch. 2019: 1083 (2019) - [i7]Eman Salem Alashwali, Kasper Rasmussen:
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name. IACR Cryptol. ePrint Arch. 2019: 1099 (2019) - 2018
- [j7]Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen:
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives. IEEE Secur. Priv. 16(4): 46-56 (2018) - [c30]Ilias Giechaskiel, Kasper Bonne Rasmussen, Ken Eguro:
Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires. AsiaCCS 2018: 15-27 - [c29]Marc Roeschlin, Ivan Martinovic, Kasper Bonne Rasmussen:
Device Pairing at the Touch of an Electrode. NDSS 2018 - [c28]Kasper Bonne Rasmussen, Paolo Gasti:
Weak and Strong Deniable Authenticated Encryption: On their Relationship and Applications. PST 2018: 1-10 - [c27]Eman Salem Alashwali, Kasper Rasmussen:
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name. SecureComm (2) 2018: 213-228 - [c26]Eman Salem Alashwali, Kasper Rasmussen:
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. SecureComm (2) 2018: 468-487 - [c25]Marc Roeschlin, Christian Vaas, Kasper Bonne Rasmussen, Ivan Martinovic:
Bionyms: Driver-centric Message Authentication using Biometric Measurements. VNC 2018: 1-8 - [i6]Eman Salem Alashwali, Kasper Rasmussen:
What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. CoRR abs/1809.05681 (2018) - [i5]Eman Salem Alashwali, Kasper Rasmussen:
On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name. CoRR abs/1809.05686 (2018) - 2017
- [j6]Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Authentication using pulse-response biometrics. Commun. ACM 60(2): 108-115 (2017) - [j5]Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Pulse-Response: Exploring Human Body Impedance for Biometric Recognition. ACM Trans. Priv. Secur. 20(2): 6:1-6:31 (2017) - [c24]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. AsiaCCS 2017: 386-399 - 2016
- [j4]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun:
Physical-layer integrity for wireless messages. Comput. Networks 109: 31-38 (2016) - [j3]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics. ACM Trans. Priv. Secur. 19(1): 1:1-1:31 (2016) - [c23]Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Using Reflexive Eye Movements for Fast Challenge-Response Authentication. CCS 2016: 1056-1067 - [c22]Ferdinand Brasser, Kasper Bonne Rasmussen, Ahmad-Reza Sadeghi, Gene Tsudik:
Remote attestation for low-end embedded devices: the prover's perspective. DAC 2016: 91:1-91:6 - [c21]Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen:
On Bitcoin Security in the Presence of Broken Cryptographic Primitives. ESORICS (2) 2016: 201-222 - [c20]Chitra Javali, Girish Revadigar, Kasper Bonne Rasmussen, Wen Hu, Sanjay Jha:
I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol. LCN 2016: 477-485 - [c19]Marc Roeschlin, Ivo Sluganovic, Ivan Martinovic, Gene Tsudik, Kasper Bonne Rasmussen:
Generating Secret Keys from Biometric Body Impedance Measurements. WPES@CCS 2016: 59-69 - [i4]Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen:
On Bitcoin Security in the Presence of Broken Crypto Primitives. IACR Cryptol. ePrint Arch. 2016: 167 (2016) - 2015
- [c18]Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper Bonne Rasmussen, Sanjay Jha:
Mobility Independent Secret Key Generation for Wearable Health-care Devices. BODYNETS 2015 - [c17]Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper Bonne Rasmussen, Sanjay Jha:
iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel. AsiaCCS 2015: 669 - [c16]Andrew C. Simpson, Andrew P. Martin, Cas Cremers, Ivan Flechais, Ivan Martinovic, Kasper Bonne Rasmussen:
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security. ICSE (2) 2015: 435-444 - [c15]Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. NDSS 2015 - [c14]Paolo Gasti, Kasper Bonne Rasmussen:
Privacy-preserving User Matching. WPES@CCS 2015: 111-120 - 2014
- [c13]Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik:
A minimalist approach to Remote Attestation. DATE 2014: 1-6 - [c12]Kasper Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, Gene Tsudik:
Authentication Using Pulse-Response Biometrics. NDSS 2014 - [c11]Filipe Beato, Emiliano De Cristofaro, Kasper Bonne Rasmussen:
Undetectable communication: The Online Social Networks case. PST 2014: 19-26 - 2012
- [c10]Paolo Gasti, Kasper Bonne Rasmussen:
On the Security of Password Manager Database Formats. ESORICS 2012: 770-787 - [c9]Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. NDSS 2012 - [c8]Cas Cremers, Kasper Bonne Rasmussen, Benedikt Schmidt, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. IEEE Symposium on Security and Privacy 2012: 113-127 - [i3]Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik:
Systematic Treatment of Remote Attestation. IACR Cryptol. ePrint Arch. 2012: 713 (2012) - 2011
- [c7]Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun:
On the requirements for successful GPS spoofing attacks. CCS 2011: 75-86 - [i2]Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. IACR Cryptol. ePrint Arch. 2011: 129 (2011) - 2010
- [j2]Thomas R. Stidsen, Bjørn Petersen, Simon Spoorendonk, Martin Zachariasen, Kasper Bonne Rasmussen:
Optimal routing with failure-independent path protection. Networks 55(2): 125-137 (2010) - [c6]Kasper Bonne Rasmussen, Srdjan Capkun:
Realization of RF Distance Bounding. USENIX Security Symposium 2010: 389-402
2000 – 2009
- 2009
- [c5]Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun:
Proximity-based access control for implantable medical devices. CCS 2009: 410-419 - [c4]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun:
Attacks on public WLAN-based positioning systems. MobiSys 2009: 29-40 - [i1]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Srdjan Capkun:
Secure Ranging With Message Temporal Integrity. IACR Cryptol. ePrint Arch. 2009: 602 (2009) - 2008
- [j1]Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani B. Srivastava:
Secure Location Verification with Hidden and Mobile Base Stations. IEEE Trans. Mob. Comput. 7(4): 470-483 (2008) - [c3]Kasper Bonne Rasmussen, Srdjan Capkun:
Location privacy of distance bounding protocols. CCS 2008: 149-160 - 2007
- [c2]Kasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj:
SecNav: secure broadcast localization and time synchronization in wireless networks. MobiCom 2007: 310-313 - [c1]Kasper Bonne Rasmussen, Srdjan Capkun:
Implications of radio fingerprinting on the security of sensor networks. SecureComm 2007: 331-340
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint