default search action
Jiska Classen
Person information
- affiliation: TU Darmstadt, Department of Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Swantje Lange, Francesco Gringoli, Matthias Hollick, Jiska Classen:
Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements. ESORICS (4) 2024: 208-228 - [c32]Lukas Arnold, Matthias Hollick, Jiska Classen:
Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database. RAID 2024: 613-629 - [c31]Sönke Huster, Matthias Hollick, Jiska Classen:
To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices. SP 2024: 4629-4645 - [c30]Lucas Becker, Matthias Hollick, Jiska Classen:
SoK: On the Effectiveness of Control-Flow Integrity in Practice. WOOT @ USENIX Security Symposium 2024: 189-209 - 2022
- [c29]Thomas Roth, Fabian Freyer, Matthias Hollick, Jiska Classen:
AirTag of the Clones: Shenanigans with Liberated Item Finders. SP (Workshops) 2022: 301-311 - [c28]Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick:
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. SP 2022: 1229-1245 - [c27]Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. USENIX Security Symposium 2022: 1343-1359 - [c26]Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick:
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones. WISEC 2022: 146-156 - [i16]Gerbert Roitburd, Matthias Ortmann, Matthias Hollick, Jiska Classen:
Very Pwnable Network: Cisco AnyConnect Security Analysis. CoRR abs/2202.05573 (2022) - [i15]Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick:
Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones. CoRR abs/2205.06114 (2022) - 2021
- [c25]Gerbert Roitburd, Matthias Ortmann, Matthias Hollick, Jiska Classen:
Very Pwnable Network: Cisco AnyConnect Security Analysis. CNS 2021: 56-64 - [c24]Tobias Kröll, Stephan Kleber, Frank Kargl, Matthias Hollick, Jiska Classen:
ARIstoteles - Dissecting Apple's Baseband Interface. ESORICS (1) 2021: 133-151 - [c23]Jiska Classen, Matthias Hollick:
Happy MitM: fun and toys in every bluetooth device. WISEC 2021: 72-77 - [i14]Jiska Classen, Matthias Hollick:
Happy MitM: Fun and Toys in Every Bluetooth Device. CoRR abs/2108.07190 (2021) - [i13]Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. CoRR abs/2111.05313 (2021) - [i12]Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick:
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. CoRR abs/2112.05719 (2021) - 2020
- [b1]Jiska Classen:
Security and Privacy for IoT Ecosystems. Darmstadt University of Technology, Germany, 2020 - [c22]Michael Spörk, Jiska Classen, Carlo Alberto Boano, Matthias Hollick, Kay Römer:
Improving the Reliability of Bluetooth Low Energy Connections. EWSN 2020: 144-155 - [c21]Jiska Classen, Michael Spörk, Carlo Alberto Boano, Kay Römer, Matthias Hollick:
Demo: Analyzing Bluetooth Low Energy Connections on Off-the-Shelf Devices. EWSN 2020: 184-185 - [c20]Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick:
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. USENIX Security Symposium 2020: 19-36 - [c19]Florentin Putz, Flor Álvarez, Jiska Classen:
Acoustic integrity codes: secure device pairing using short-range acoustic communication. WISEC 2020: 31-41 - [c18]Dennis Heinze, Jiska Classen, Felix Rohrbach:
MagicPairing: Apple's take on securing bluetooth peripherals. WISEC 2020: 111-121 - [c17]Mira Weller, Jiska Classen, Fabian Ullrich, Denis Waßmann, Erik Tews:
Lost and found: stopping bluetooth finders from leaking private information. WISEC 2020: 184-194 - [c16]Dennis Heinze, Jiska Classen, Matthias Hollick:
ToothPicker: Apple Picking in the iOS Bluetooth Stack. WOOT @ USENIX Security Symposium 2020 - [c15]Jörn Tillmanns, Jiska Classen, Felix Rohrbach, Matthias Hollick:
Firmware Insider: Bluetooth Randomness is Mostly Random. WOOT @ USENIX Security Symposium 2020 - [i11]Dennis Heinze, Jiska Classen, Felix Rohrbach:
MagicPairing: Apple's Take on Securing Bluetooth Peripherals. CoRR abs/2005.07255 (2020) - [i10]Mira Weller, Jiska Classen, Fabian Ullrich, Denis Waßmann, Erik Tews:
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information. CoRR abs/2005.08208 (2020) - [i9]Florentin Putz, Flor Álvarez, Jiska Classen:
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication. CoRR abs/2005.08572 (2020) - [i8]Jiska Classen, Matthias Hollick:
DEMO: Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips. CoRR abs/2005.14585 (2020) - [i7]Davide Toldo, Jiska Classen, Matthias Hollick:
DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework. CoRR abs/2005.14606 (2020) - [i6]Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick:
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets. CoRR abs/2006.09809 (2020) - [i5]Jörn Tillmanns, Jiska Classen, Felix Rohrbach, Matthias Hollick:
Firmware Insider: Bluetooth Randomness is Mostly Random. CoRR abs/2006.16921 (2020)
2010 – 2019
- 2019
- [c14]Richard Meister, Jiska Classen, Muhammad Saad Saud, Marcos Katz, Matthias Hollick:
Practical VLC to WiFi Handover Mechanisms. EWSN 2019: 324-329 - [c13]Dennis Mantz, Jiska Classen, Matthias Schulz, Matthias Hollick:
InternalBlue - Bluetooth Binary Patching and Experimentation Framework. MobiSys 2019: 79-90 - [c12]Jiska Classen, Matthias Hollick:
Inside job: diagnosing bluetooth lower layers using off-the-shelf devices. WiSec 2019: 186-191 - [c11]Fabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick:
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem. WOOT @ USENIX Security Symposium 2019 - [i4]Dennis Mantz, Jiska Classen, Matthias Schulz, Matthias Hollick:
InternalBlue - Bluetooth Binary Patching and Experimentation Framework. CoRR abs/1905.00631 (2019) - [i3]Jiska Classen, Matthias Hollick:
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices. CoRR abs/1905.00634 (2019) - 2018
- [j2]Jiska Classen, Daniel Wegemer, Paul Patras, Tom Spink, Matthias Hollick:
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(1): 5:1-5:24 (2018) - 2017
- [c10]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit. RAID 2017: 48-69 - [c9]Joe Chen, Daniel Steinmetzer, Jiska Classen, Edward W. Knightly, Matthias Hollick:
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain. WCNC 2017: 1-6 - [i2]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit. CoRR abs/1706.09165 (2017) - 2016
- [c8]Martin Pfeiffer, Jan-Pascal Kwiotek, Jiska Classen, Robin Klose, Matthias Hollick:
Analyzing TETRA Location Privacy and Network Availability. SPSM@CCS 2016: 117-122 - [c7]Daniel Steinmetzer, Jiska Classen, Matthias Hollick:
mmTrace: Modeling millimeter-wave indoor propagation with image-based ray-tracing. INFOCOM Workshops 2016: 429-434 - [c6]Daniel Steinmetzer, Jiska Classen, Matthias Hollick:
Exploring millimeter-wave network scenarios with ray-tracing based simulations in mmTrace. INFOCOM Workshops 2016: 1093-1094 - [c5]Jiska Classen, Daniel Steinmetzer, Matthias Hollick:
Opportunities and pitfalls in securing visible light communication on the physical layer. VLCS@MobiCom 2016: 19-24 - 2015
- [c4]Jiska Classen, Matthias Schulz, Matthias Hollick:
Practical covert channels for WiFi systems. CNS 2015: 209-217 - [c3]Daniel Steinmetzer, Joe Chen, Jiska Classen, Edward W. Knightly, Matthias Hollick:
Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves. CNS 2015: 335-343 - [c2]Jiska Classen, Joe Chen, Daniel Steinmetzer, Matthias Hollick, Edward W. Knightly:
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications. VLCS@MobiCom 2015: 9-14 - [c1]Jiska Classen, Johannes Braun, Florian Volk, Matthias Hollick, Johannes Buchmann, Max Mühlhäuser:
A Distributed Reputation System for Certification Authority Trust Management. TrustCom/BigDataSE/ISPA (1) 2015: 1349-1356 - [i1]Jiska Classen, Matthias Schulz, Matthias Hollick:
Practical Covert Channels for WiFi Systems. CoRR abs/1505.01081 (2015) - 2014
- [j1]Johannes Braun, Florian Volk, Jiska Classen, Johannes Buchmann, Max Mühlhäuser:
CA trust management for the Web PKI. J. Comput. Secur. 22(6): 913-959 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint