Publications

Most of my publications and citations can also be found on Google scholar. My ORCID is 0000-0001-8424-2602. My (public) contributions on Github. This listing uses my BibRest backend.

2019

  • Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martin Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, and Yuval Elovici, “Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots,” in Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2019.
    [Bibtex]
    @inproceedings{tambe19vpn,
    author={ Tambe, Amit and  Aung, Yan Lin and  Sridharan, Ragav and Ochoa, Martin and  Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval},
    title={Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots},
    booktitle={ACM Conference on Data and Application Security and Privacy (CODASPY)},
    month={March},
    year={2019}}
  • [DOI] D. Antonioli, N. O. Tippenhauer, K. Rasmussen, “Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android,” in Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019.
    [Bibtex]
    @inproceedings{antonioli19nearby,
    author={Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper},
    title={Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android},
    booktitle={Proceedings of the Network and Distributed System Security Symposium (NDSS)},
        month={February},
        doi={10.14722/ndss.2019.23367},
    year={2019}}
  • [DOI]R. Taormina and S. Galelli and H.C. Douglas and N.O. Tippenhauer and E. Salomons and A. Ostfeld, “A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems,” in Environmental Modelling & Software, 2019.
    [Bibtex]
    
    @article{taormina19toolbox,
    title = "A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems",
    journal = "Environmental Modelling & Software",
    volume = "112",
    pages = "46 - 51",
    year = "2019",
    month = Feb,
    issn = "1364-8152",
    doi = "https://doi.org/10.1016/j.envsoft.2018.11.008",
    author = "R. Taormina and S. Galelli and H.C. Douglas and N.O. Tippenhauer and E. Salomons and A. Ostfeld"}

2018

  • [DOI] H. R. Ghaeini, D. Antonioli, F. Brasser, A. Sadeghi, and N. O. Tippenhauer, “State-aware anomaly detection for industrial control systems,” in Proceedings of security track at the ACM symposium on applied computing (SAC), 2018.
    [Bibtex]
    @inproceedings{ghaeini18stateaware,
    author={Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole},
    title={State-Aware Anomaly Detection for Industrial Control Systems},
    booktitle={Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC)},
    month={April},
    year={2018},
    doi={10.1145/3167132.3167305}}
  • A. Fakhreddine, N. O. Tippenhauer, and D. Giustiniano, “Design and large-scale evaluation of wifi proximity metrics,” in Proceedings of european wireless, 2018.
    [Bibtex]
    @inproceedings{fakhreddine18proximity,
    author={Fakhreddine, Aymen and Tippenhauer, Nils Ole and Giustiniano, Domenico},
    title={Design and Large-Scale Evaluation of WiFi Proximity Metrics},
    booktitle={Proceedings of European Wireless},
    month={May},
    year={2018}}
  • [DOI] A. Siddiqi, N. O. Tippenhauer, D. Mashima, and B. Chen, “On practical threat scenario testing in an electric power ics testbed,” in Proceedings of the cyber-physical system security workshop (cpss), co-located with asiaccs, 2018.
    [Bibtex]
    @inproceedings{siddiqi18epic,
    author={Siddiqi, Ahnaf and Tippenhauer, Nils Ole and Mashima, Daisuke and Chen, Binbin},
    title={On Practical Threat Scenario Testing in an Electric Power ICS Testbed},
    booktitle={Proceedings of the Cyber-Physical System Security Workshop (CPSS), co-located with ASIACCS},
    month={June},
    year={2018},
    doi={10.1145/3198458.3198461}}
  • [DOI] R. Sridharan, R. R. Maiti, and N. O. Tippenhauer, “WADAC: privacy-preserving anomaly detection and attack classification on wireless traffic,” in Proceedings of the acm conference on security and privacy in wireless and mobile networks (wisec), 2018.
    [Bibtex]
    @inproceedings{sridharan18detection,
    author={Sridharan, Ragav and Maiti, Rajib Ranjan and Tippenhauer, Nils Ole},
    title={{WADAC}: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic},
    booktitle={Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)},
    month={June},
    doi={10.1145/3212480.3212495},
    year={2018}}
  • [DOI]J. Giraldo, D. Urbina, A. Cardenas, J. Valente, M. Faisal, J. Ruths, N. O. Tippenhauer, H. Sandberg, and R. Candell, “A survey of physics-based attack detection in cyber-physical systems,” ACM computing surveys (CSUR), vol. 54, iss. 4, 2018.
    [Bibtex]
    @article{giraldo18survey,
    author={Giraldo, Jairo and Urbina, David and Cardenas, Alvaro and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Tippenhauer, Nils Ole and Sandberg, Henrik and Candell, Richard},
    year={2018},
    title={A Survey of Physics-Based Attack Detection in Cyber-Physical Systems},
    journal={ACM Computing Surveys (CSUR)},
     volume = {51},
     number = {4},
     month = jul,
     pages = {76:1--76:36},
     articleno = {76},
     numpages = {36},
     doi = {10.1145/3203245}
    }
  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, A. Ostfeld, D. G. Eliades, M. Aghashahi, R. Sundararajan, M. Pourahmadi, K. M. Banks, B. M. Brentan, E. Campbell, G. Lima, D. Manzi, D. Ayala-Cabrera, M. Herrera, I. Montalvo, J. Izquierdo, E. Luvizotto Jr, S. E. Chandy, A. Rasekh, Z. A. Barker, B. Campbell, E. M. Shafiee, M. Giacomoni, N. Gatsis, A. Taha, A. A. Abokifa, K. Haddad, C. S. Lo, P. Biswas, B. Pasha M. Fayzul K.and Kc, S. L. Somasundaram, M. Housh, and Z. Ohar, “The battle of the attack detection algorithms: disclosing cyber attacks on water distribution networks,” Journal of water resources planning and management, vol. 144, iss. 8, 2018.
    [Bibtex]
    @article{taormina18battle,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi and Eliades, Demetrios G. and Aghashahi, Mohsen and Sundararajan, Raanju and Pourahmadi, Mohsen and Banks, M. Katherine and Brentan, B. M. and Campbell, Enrique and Lima, G. and Manzi, D. and Ayala-Cabrera, D. and Herrera, M. and Montalvo, I. and Izquierdo, J. and Luvizotto, Jr, E. and Chandy, Sarin E. and Rasekh, Amin and Barker, Zachary A. and Campbell, Bruce and Shafiee, M. Ehsan and Giacomoni, Marcio and Gatsis, Nikolaos and Taha, Ahmad and Abokifa, Ahmed A. and Haddad, Kelsey and Lo, Cynthia S. and Biswas, Pratim and Pasha, M. Fayzul K.and Kc, Bijay and Somasundaram, Saravanakumar Lakshmanan and Housh, Mashor and Ohar, Ziv},
    title={The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks},
    journal={Journal of Water Resources Planning and Management},
    year={2018},
    month={August},
    volume={144},
    number={8},
    publisher={ASCE},
    doi={10.1061/(ASCE)WR.1943-5452.0000969}}
  • [DOI] X. Wang, X. Hou, R. Rios, P. Hallgren, N. O. Tippenhauer, and M. Ochoa, “Location proximity attacks against mobile targets: analytical bounds and attacker strategies,” in Proceedings of the european symposium on research in computer security (esorics), 2018.
    [Bibtex]
    @inproceedings{wang18location,
    author={Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Hallgren, Per and Tippenhauer, Nils Ole and Ochoa, Mart{\'in}},
    title={Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies},
    booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    month={September},
    year={2018}}

2017

  • E. Wilhelm, D. MacKenzie, Y. Zhou, L. Cheah, and N. O. Tippenhauer, “Evaluation of transport mode using wearable sensor data from 43,000 students,” in Proceedings of transportation research board annual meeting (trb), 2017.
    [Bibtex]
    @inproceedings{wilhelm17evaluation,
    author={Wilhelm, Erik and MacKenzie, Don and Zhou, Yuren and Cheah, Lynette and Tippenhauer, Nils Ole},
    title={Evaluation of transport mode using wearable sensor data from 43,000 students},
    booktitle={Proceedings of Transportation Research Board Annual Meeting (TRB)},
    month={January},
    year={2017}}
  • [DOI] Y. Meidan, M. Bohadana, A. Shabtai, J. Guarnizo, M. Ochoa, N. O. Tippenhauer, and Y. Elovici, “ProfilIoT: a machine learning approach for iot device identification based on network traffic analysis (poster),” in Proceedings of the security track at acm symposium on applied computing (sac), 2017.
    [Bibtex]
    @inproceedings{meidan17profiliot,
    author={Meidan, Yair and Bohadana, Michael and Shabtai, Asaf and Guarnizo, Juan-David and Ochoa, Mart{\'i}n and Tippenhauer, Nils Ole and Elovici, Yuval},
    title={{ProfilIoT}: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis (Poster)},
    booktitle={Proceedings of the Security Track at ACM Symposium on Applied Computing (SAC)},
    month={April},
    year={2017},
    notes={Short-listed for best Poster award},
    doi={10.1145/3019612.3019878}}
  • [DOI] M. Rocchetto and N. O. Tippenhauer, “Towards formal security analysis of industrial control systems,” in Proceedings of the acm asia conference on computer and communications security (asiaccs), 2017.
    [Bibtex]
    @inproceedings{towards17rocchetto,
    author={Rocchetto, Marco and Tippenhauer, Nils Ole},
    title={Towards Formal Security Analysis of Industrial Control Systems},
    booktitle={Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS)},
    month={April},
    year={2017},
    doi={10.1145/3052973.3053024}}
  • [DOI] J. Guarnizo, A. Tambe, S. S. Bunia, M. Ochoa, N. O. Tippenhauer, A. Shabtai, and Y. Elovici, “SIPHON: towards scalable high-interaction physical honeypots,” in Proceedings of the cyber-physical system security workshop (cpss), co-located with asiaccs, 2017.
    [Bibtex]
    @inproceedings{guarnizo17siphon,
    author={Guarnizo, Juan and Tambe, Amit and Bunia, Suman Sankar and Ochoa, Mart{\'i}n and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval},
    title={{SIPHON}: Towards Scalable High-Interaction Physical Honeypots},
    booktitle={Proceedings of the Cyber-Physical System Security Workshop (CPSS), co-located with ASIACCS},
    month={April},
    year={2017},
    doi={10.1145/3055186.3055192},
    notes={Best paper award}}
  • [DOI] S. Siby, R. R. Maiti, and N. O. Tippenhauer, “IoTScanner: detecting privacy threats in IoT neighborhoods,” in Proceedings of the workshop on iot privacy, trust, and security (iotpts), co-located with asiaccs, 2017.
    [Bibtex]
    @inproceedings{siby17iotscannershort,
    author={Siby, Sandra and Maiti, Rajib Ranjan and Tippenhauer, Nils Ole},
    title={{IoTScanner}: Detecting Privacy Threats in {IoT} Neighborhoods},
    booktitle={Proceedings of the Workshop on IoT Privacy, Trust, and Security (IoTPTS), co-located with ASIACCS},
    month={April},
    doi={10.1145/3055245.3055253},
    year={2017}}
  • [DOI] J. H. Castellanos, D. Antonioli, N. O. Tippenhauer, and M. Ochoa, “Legacy-compliant data authentication for industrial control system traffic,” in Proceedings of the conference on applied cryptography and network security (acns), 2017.
    [Bibtex]
    @inproceedings{castellanos17legacy,
    author={Castellanos, John Henry and Antonioli, Daniele and Tippenhauer, Nils Ole and Ochoa, Mart{\'i}n},
    title={Legacy-Compliant Data Authentication for Industrial Control System Traffic},
    booktitle={Proceedings of the Conference on Applied Cryptography and Network Security (ACNS)},
    month={July},
    year={2017},
    doi={10.1007/978-3-319-61204-1_33}}
  • N. O. Tippenhauer, “Messmanipulationen in steuerungssystemen,” Zeitschrift für datenrecht und informationssicherheit (digma), iss. 2, p. 116–121, 2017.
    [Bibtex]
    @article{tippenhauer17digma,
    author={Tippenhauer, Nils Ole},
    title={Messmanipulationen in Steuerungssystemen},
    journal={Zeitschrift für Datenrecht und Informationssicherheit (DIGMA)},
    year={2017},
    number={2},
    month={July},
    pages={116--121}}
  • [DOI] R. Ranjan Maiti, S. Siby, R. Sridharan, and N. O. Tippenhauer, “Link-layer device type classification on encrypted wireless traffic with COTS radios,” in Proceedings of the european symposium on research in computer security (esorics), 2017.
    [Bibtex]
    @inproceedings{maiti17linklayer,
    author={Ranjan Maiti, Rajib and Siby, Sandra and Sridharan, Ragav and Tippenhauer, Nils Ole},
    title={Link-Layer Device Type Classification on Encrypted Wireless Traffic with {COTS} Radios},
    Booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    month={September},
    year={2017},
    doi={10.1007/978-3-319-66399-9_14}}
  • [DOI] N. Govil, A. Agrawal, and N. O. Tippenhauer, “On ladder logic bombs in industrial control systems,” in Proceedings of the workshop on the security of industrial control systems and of cyber-physical systems (cybericps), co-located with esorics, 2017.
    [Bibtex]
    @inproceedings{govil17ladder,
    author={Govil, Naman and Agrawal, Anand and Tippenhauer, Nils Ole},
    title={On Ladder Logic Bombs in Industrial Control Systems},
    Booktitle={Proceedings of the Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS), co-located with ESORICS},
    month={September},
    year={2017},
    doi={10.1007/978-3-319-72817-9_8}}
  • [DOI] D. Antonioli, H. R. Ghaeini, S. Adepu, M. Ochoa, and N. O. Tippenhauer, “Gamifying ICS security training and research: design, implementation, and results of S3,” in Proceedings of workshop on cyber-physical systems security & privacy (spc-cps), co-located with ccs, 2017.
    [Bibtex]
    @inproceedings{antonioli17s3,
    author={Antonioli, Daniele and Ghaeini, Hamid Reza and Adepu, Sridhar and Ochoa, Mart{\'i}n and Tippenhauer, Nils Ole},
    title={Gamifying {ICS} Security Training and Research: Design, Implementation, and Results of {S3}},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={November},
    year={2017},
    doi={10.1145/3140241.3140253}}
  • [DOI]D. Antonioli, S. Siby, and N. O. Tippenhauer, “Practical evaluation of passive COTS eavesdropping in 802.11b/n/ac WLAN,” in Proceedings of conference on cryptology and network security (CANS), 2017.
    [Bibtex]
    @inproceedings{antonioli17eavesdropping,
    author={Antonioli, Daniele and Siby, Sandra and Tippenhauer, Nils Ole},
    title={Practical Evaluation of Passive {COTS} Eavesdropping in 802.11b/n/ac {WLAN}},
    booktitle={Proceedings of Conference on Cryptology And Network Security (CANS)},
        month={November},
        doi={10.1007/978-3-030-02641-7_19},
    year={2017}}

2016

  • [DOI] D. Urbina, J. Giraldo, N. O. Tippenhauer, and A. Cárdenas, “Attacking fieldbus communications in ICS: applications to the SWaT testbed,” in Proceedings of singapore cyber security conference (sg-crc), 2016.
    [Bibtex]
    @inproceedings{urbina16fieldbus,
    author={Urbina, David and Giraldo, Jairo and Tippenhauer, Nils Ole and C\'ardenas, Alvaro},
    title={Attacking Fieldbus Communications in {ICS}: Applications to the {SWaT} Testbed},
    booktitle={Proceedings of Singapore Cyber Security Conference (SG-CRC)},
    month={January},
    year={2016},
    doi={10.3233/978-1-61499-617-0-75}}
  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld, “Simulation of cyber-physical attacks on water distribution systems with EPANET,” in Proceedings of singapore cyber security conference (sg-crc), 2016.
    [Bibtex]
    @inproceedings{taormina16simulation,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi},
    title={Simulation of Cyber-Physical Attacks on Water Distribution Systems with {EPANET}},
    booktitle={Proceedings of Singapore Cyber Security Conference (SG-CRC)},
    month={January},
    year={2016},
    doi={10.3233/978-1-61499-617-0-123}}
  • E. Wilhelm, N. O. Tippenhauer, Y. Zhou, and N. Zhang, “SENSg: large-scale deployment of wearable sensors for trip and transport mode logging,” in Proceedings of transportation research board annual meeting (trb), 2016.
    [Bibtex]
    @inproceedings{wilhelm16sensg,
    author={Wilhelm, Erik and Tippenhauer, Nils Ole and Zhou, Yuren and Zhang, Nan},
    title={{SENSg}: Large-Scale Deployment of Wearable Sensors for Trip and Transport Mode Logging},
    booktitle={Proceedings of Transportation Research Board Annual Meeting (TRB)},
    month={January},
    year={2016}}
  • N. O. Tippenhauer, M. Ochoa, and A. Mathur, “Water treatment, distribution, and electric power testbeds for research in the design of secure interdependent critical infrastructures,” in Proceedings of workshop on security and resilience of cyber-physical infrastructures (serecin), 2016.
    [Bibtex]
    @inproceedings{tippenhauer16testbeds,
    author={Tippenhauer, Nils Ole and Ochoa, Mart{\'i}n and Mathur, Aditya},
    title={Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures},
    booktitle={Proceedings of Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN)},
    month={April},
    url={https://sites.google.com/site/serecin2016/programme/proceedings/serecin_2016.pdf},
    year={2016}}
  • [DOI] A. Mathur and N. O. Tippenhauer, “SWaT: a water treatment testbed for research and training on ICS security,” in Proceedings of workshop on cyber-physical systems for smart water networks (cyswater), 2016.
    [Bibtex]
    @inproceedings{mathur16swat,
    author={Mathur, Aditya and Tippenhauer, Nils Ole},
    title={{SWaT}: A Water Treatment Testbed for Research and Training on {ICS} Security},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater)},
    month={April},
    doi={10.1109/CySWater.2016.7469060},
    year={2016}}
  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld, “Assessing the effect of cyber-physical attacks on water distribution systems,” in Proceedings of world congress on environmental & water resources (ewri), 2016.
    [Bibtex]
    @inproceedings{taormina16assessing,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi},
    title={Assessing the effect of cyber-physical attacks on water distribution systems},
    booktitle={Proceedings of World Congress on Environmental \& Water Resources (EWRI)},
    month={May},
    doi={10.1061/9780784479865.046},
    year={2016}}
  • [DOI] X. Dong, S. Jauhar, W. G. Temple, B. Chen, Z. Kalbarczyk, W. H. Sanders, N. O. Tippenhauer, and D. M. Nicol, “The right tool for the job: a case for common input scenarios for security assessment,” in Proceedings of workshop on graphical models for security (gramsec), 2016.
    [Bibtex]
    @inproceedings{dong16cissa,
    author={Dong, Xinshu and Jauhar, Sumeet and Temple, William G. and Chen, Binbin and Kalbarczyk, Zbigniew and Sanders, William H. and Tippenhauer, Nils Ole and Nicol, David M.},
    title={The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment},
    booktitle={Proceedings of Workshop on Graphical Models for Security (GraMSec)},
    month={June},
    doi={10.1007/978-3-319-46263-9_3},
    year={2016}}
  • [DOI] M. Rocchetto and N. O. Tippenhauer, “On attacker models and profiles for cyber-physical systems,” in Proceedings of the european symposium on research in computer security (esorics), 2016.
    [Bibtex]
    @inproceedings{rocchetto16models,
    author={Rocchetto, Marco and Tippenhauer, Nils Ole},
    Title={On Attacker Models and Profiles for Cyber-Physical Systems},
    Booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    month={September},
    year={2016},
    doi={10.1007/978-3-319-45741-3_22}}
  • [DOI] D. Urbina, J. Giraldo, A. A. Cardenas, N. O. Tippenhauer, J. Valente, M. Faisal, J. Ruths, R. Candell, and H. Sandberg, “Limiting the impact of stealthy attacks on industrial control systems,” in Proceedings of the acm conference on computer and communications security (ccs), 2016.
    [Bibtex]
    @inproceedings{urbina16limiting,
    author={Urbina, David and Giraldo, Jairo and Cardenas, Alvaro A. and Tippenhauer, Nils Ole and Valente, Junia and Faisal, Mustafa and Ruths, Justin and Candell, Richard and Sandberg, Henrik},
    title={Limiting The Impact of Stealthy Attacks on Industrial Control Systems},
    booktitle={Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
    month={October},
    year={2016},
    doi={10.1145/2976749.2978388}}
  • [DOI] M. Rocchetto and N. O. Tippenhauer, “CPDY: extending the Dolev-Yao attacker with physical-layer interactions,” in Proceedings of the international conference on formal engineering methods (icfem), 2016.
    [Bibtex]
    @inproceedings{rocchetto16cpdy,
    author={Rocchetto, Marco and Tippenhauer, Nils Ole},
    year={2016},
    booktitle={Proceedings of the International Conference on Formal Engineering Methods (ICFEM)},
    title={{CPDY}: Extending the {Dolev-Yao} Attacker with Physical-Layer Interactions},
    month={October},
    doi={10.1007/978-3-319-47846-3_12}}
  • [DOI] D. Antonioli, A. Agrawal, and N. O. Tippenhauer, “Towards high-interaction virtual ICS honeypots-in-a-box,” in Proceedings of workshop on cyber-physical systems security & privacy (spc-cps), co-located with ccs, 2016.
    [Bibtex]
    @inproceedings{antonioli16towards,
    author={Antonioli, Daniele and Agrawal, Anand and Tippenhauer, Nils Ole},
    title={Towards High-Interaction Virtual {ICS} Honeypots-in-a-Box},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={October},
    doi={10.1145/2994487.2994493},
    year={2016}}
  • [DOI] H. Ghaeini and N. O. Tippenhauer, “HAMIDS: hierarchical monitoring intrusion detection system for industrial control systems,” in Proceedings of workshop on cyber-physical systems security & privacy (spc-cps), co-located with ccs, 2016.
    [Bibtex]
    @inproceedings{ghaeini16hamids,
    author={Ghaeini, Hamid and Tippenhauer, Nils Ole},
    title={{HAMIDS}: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={October},
    doi={10.1145/2994487.2994492},
    year={2016}}
  • [DOI] N. O. Tippenhauer, K. B. Rasmussen, and S. Capkun, “Physical-layer integrity for wireless messages,” Computer networks, vol. 109, iss. 1, p. 31–38, 2016.
    [Bibtex]
    @article{tippenhauer16integrity,
    author={Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Capkun, Srdjan},
    title={Physical-Layer Integrity for Wireless Messages},
    journal={Computer Networks},
    volume={109},
    number={1},
    pages={31--38},
    year={2016},
    month={November},
    issn={1389-1286},
    publisher={Elsevier},
    doi={10.1016/j.comnet.2016.06.021}}
  • [DOI] E. Wilhelm, S. Siby, Y. Zhou, X. J. S. Ashok, M. Jayasuriya, S. Foong, J. Kee, K. Wood, and N. O. Tippenhauer, “Wearable environmental sensors and infrastructure for mobile large-scale urban deployment,” Sensors, vol. 16, iss. 22, p. 8111–8123, 2016.
    [Bibtex]
    @article{wilhelm16Wearable,
    author={Wilhelm, Erik and Siby, Sandra and Zhou, Yuren and Ashok, Xavier J. S. and Jayasuriya, Melani and Foong, Shaohui and Kee, Jacksheeng and Wood, Kristin and Tippenhauer, Nils Ole},
    title={Wearable Environmental Sensors and Infrastructure for Mobile Large-scale Urban Deployment},
    journal={Sensors},
    volume={16},
    number={22},
    pages={8111--8123},
    publisher={IEEE},
    doi={10.1109/JSEN.2016.2603158},
    year={2016},
    month={November}}
  • [DOI] K. Jansen, N. O. Tippenhauer, and C. Pöpper, “Multi-receiver GPS spoofing detection: error models and realization,” in Proceedings of the annual computer security applications conference (acsac), 2016.
    [Bibtex]
    @inproceedings{jansen16gps,
    author={Jansen, Kai and Tippenhauer, Nils Ole and P\"opper, Christina},
    title={Multi-Receiver {GPS} Spoofing Detection: Error Models and Realization},
    booktitle={Proceedings of the Annual Computer Security Applications Conference (ACSAC)},
    month={December},
    doi={10.1145/2991079.2991092},
    year={2016}}
  • [DOI] S. Siboni, A. Shabtai, N. O. Tippenhauer, J. Lee, and Y. Elovici, “Advanced security testbed framework for wearable IoT devices,” Transactions on internet technology (toit), vol. 16, iss. 4, p. 1–25, 2016.
    [Bibtex]
    @article{siboni16testbed,
    author={Siboni, Shachar and Shabtai, Asaf and Tippenhauer, Nils Ole and Lee, Jemin and Elovici, Yuval},
    title={Advanced Security Testbed Framework for Wearable {IoT} Devices},
    journal={Transactions on Internet Technology (TOIT)},
    year={2016},
    volume={16},
    number={4},
    pages={1--25},
    month={December},
    doi={10.1145/2981546},
    publisher={ACM}}
  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld, “Characterizing cyber-physical attacks on water distribution systems,” Journal of water resources planning and management, vol. 143, 2016.
    [Bibtex]
    @article{taormina16characterizing,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi},
    title={Characterizing Cyber-Physical Attacks on Water Distribution Systems},
    publisher={ASCE},
    year={2016},
    volume={143},
    issue={5},
    doi={10.1061/(ASCE)WR.1943-5452.0000749},
    journal={Journal of Water Resources Planning and Management},
    month={December}}

2015

  • [DOI] N. O. Tippenhauer, H. Luecken, M. Kuhn, and S. Capkun, “UWB rapid-bit-exchange system for distance bounding,” in Proceedings of the acm conference on security and privacy in wireless and mobile networks (wisec), 2015.
    [Bibtex]
    @inproceedings{tippenhauer15uwb,
    author={Tippenhauer, Nils Ole and Luecken, Heinrich and Kuhn, Marc and Capkun, Srdjan},
    title={{UWB} Rapid-Bit-Exchange System for Distance Bounding},
    booktitle={Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)},
    month={June},
    year={2015},
    doi={10.1145/2766498.2766504}}
  • [DOI] D. Antonioli and N. O. Tippenhauer, “MiniCPS: a toolkit for security research on CPS networks,” in Proceedings of workshop on cyber-physical systems security & privacy (spc-cps), co-located with ccs, 2015.
    [Bibtex]
    @inproceedings{antonioli15minicps,
    author={Antonioli, Daniele and Tippenhauer, Nils Ole},
    title={{MiniCPS}: A toolkit for security research on {CPS} Networks},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={October},
    year={2015},
    doi={10.1145/2808705.2808715}}

2014

  • [DOI] A. H. Vu, N. O. Tippenhauer, B. Chen, D. M. Nicol, and Z. Kalbarczyk, “CyberSAGE: a tool for automatic security assessment of cyber-physical systems,” in Proceedings of the conference on quantitative evaluation of systems (qest), 2014.
    [Bibtex]
    @inproceedings{vu14cybersage,
    author={Vu, An Hoa and Tippenhauer, Nils Ole and Chen, Binbin and Nicol, David M. and Kalbarczyk, Zbigniew},
    title={{CyberSAGE}: A Tool for Automatic Security Assessment of Cyber-Physical Systems},
    booktitle={Proceedings of the Conference on Quantitative Evaluation of SysTems (QEST)},
    year={2014},
    month={September},
    doi={10.1007/978-3-319-10696-0_29}}
  • [DOI] N. O. Tippenhauer, W. G. Temple, A. H. Vu, B. Chen, D. M. Nicol, Z. Kalbarczyk, and W. Sanders, “Automatic generation of security argument graphs,” in Proceedings of the ieee pacific rim international symposium on dependable computing (prdc), 2014.
    [Bibtex]
    @inproceedings{tippenhauer14automatic,
    author={Tippenhauer, Nils Ole and Temple, William G. and Vu, An Hoa and Chen, Binbin and Nicol, David M. and Kalbarczyk, Zbigniew and Sanders, William},
    title={Automatic Generation of Security Argument Graphs},
    booktitle={Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC)},
    year={2014},
    month={November},
    doi={10.1109/PRDC.2014.13}}

2013

  • [DOI] W. G. Temple, B. Chen, and N. O. Tippenhauer, “Delay makes a difference: smart grid resilience under remote meter disconnect attack,” in Proceedings of the ieee conference on smart grid communications (smartgridcomm), 2013.
    [Bibtex]
    @inproceedings{temple13delay,
    author={Temple, William G. and Chen, Binbin and Tippenhauer, Nils Ole},
    title={Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack},
    booktitle={Proceedings of the IEEE Conference on Smart Grid Communications (SmartGridComm)},
    year={2013},
    month={October},
    doi={10.1109/SmartGridComm.2013.6688001}}
  • [DOI] B. Chen, Z. Kalbarczyk, D. M. Nicol, W. H. Sanders, R. Tan, W. G. Temple, N. O. Tippenhauer, A. H. Vu, and D. K. Y. Yau, “Go with the flow: toward workflow-oriented security assessment,” in Proceedings of new security paradigm workshop (nspw), 2013.
    [Bibtex]
    @inproceedings{chen13flow,
    author={Chen, Binbin and Kalbarczyk, Zbigniew and Nicol, David M. and Sanders, William H. and Tan, Rui and Temple, William G. and Tippenhauer, Nils Ole and Vu, An Hoa and Yau, David K.Y.},
    Title={Go with the Flow: Toward Workflow-Oriented Security Assessment},
    Booktitle={Proceedings of New Security Paradigm Workshop (NSPW)},
    Year={2013},
    doi={10.1145/2535813.2535821},
    month={December}}
  • [DOI] N. O. Tippenhauer, L. Malisa, A. Ranganathan, and S. Capkun, “On limitations of friendly jamming for confidentiality,” in Proceedings of the ieee symposium on security and privacy, 2013.
    [Bibtex]
    @inproceedings{tippenhauer2013limitations,
    author={Tippenhauer, Nils Ole and Malisa, Luka and Ranganathan, Aanjhan and Capkun, Srdjan},
    title={On Limitations of Friendly Jamming for Confidentiality},
    booktitle={Proceedings of the IEEE Symposium on Security and Privacy},
    year={2013},
    doi={10.1109/SP.2013.21},
    month={December}}

2012

  • [DOI] N. O. Tippenhauer, “Physical-layer security aspects of wireless localization,” PhD Thesis, 2012.
    [Bibtex]
    @phdthesis{tippenhauer12phd,
    author={Tippenhauer, Nils Ole},
    title={Physical-Layer Security Aspects of Wireless Localization},
    school={ETH Zurich, Switzerland},
    year={2012},
    month={March},
    doi={10.3929/ethz-a-7352063}}
  • [DOI] D. Giustiniano, N. O. Tippenhauer, and S. Mangold, “Low-complexity visible light networking with led-to-led communication,” in Proceedings of ifip wireless days, 2012.
    [Bibtex]
    @inproceedings{giustiniano12low,
    author={Giustiniano, Domenico and Tippenhauer, Nils Ole and Mangold, Stefan},
    booktitle={Proceedings of IFIP Wireless Days},
    title={Low-complexity Visible Light Networking with LED-to-LED communication},
    year={2012},
    month={November},
    doi={10.1109/WD.2012.6402861}}
  • [DOI] A. Ranganathan, N. O. Tippenhauer, B. Skoric, D. Singelé, and S. Čapkun, “Design and implementation of a terrorist fraud resilient distance bounding system,” in Proceedings of the european symposium on research in computer security (esorics), 2012.
    [Bibtex]
    @inproceedings{ranganathan12terrorist,
    author={Ranganathan, Aanjhan and Tippenhauer, Nils Ole and Skoric, Boris and Singel\'e, Dave and \v{C}apkun, Srdjan},
    title={Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System},
    booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    publisher={Springer},
    year={2012},
    series={Lecture Notes in Computer Science},
    doi={10.1007/978-3-642-33167-1_24},
    month={December}}
  • [DOI] N. O. Tippenhauer, D. Giustiniano, and S. Mangold, “Toys communicating with LEDs: enabling toy cars interaction,” in Proceedings of consumer communications and networking conference (ccnc), 2012, p. 48–49.
    [Bibtex]
    @inproceedings{tippenhauer2012toys,
    author={Tippenhauer, Nils Ole and Giustiniano, Domenico and Mangold, Stefan},
    title={Toys communicating with {LEDs}: Enabling toy cars interaction},
    booktitle={Proceedings of Consumer Communications and Networking Conference (CCNC)},
    pages={48--49},
    year={2012},
    organization={IEEE},
    doi={10.1109/CCNC.2012.6181045},
    month={December}}

2011

  • [DOI] N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Čapkun, “On the requirements for successful GPS spoofing attacks,” in Proceedings of the acm conference on computer and communications security (ccs), 2011.
    [Bibtex]
    @inproceedings{tippenhauer11gps,
    author={Tippenhauer, Nils Ole and P\"opper, Christina and Rasmussen, Kasper Bonne and \v{C}apkun, Srdjan},
    title={On the Requirements for Successful {GPS} Spoofing Attacks},
    booktitle={Proceedings of the ACM Conference on Computer and Communications Security (CCS)},
    year={2011},
    doi={10.1145/2046707.2046719},
    month={December}}
  • [DOI] C. Pöpper, N. O. Tippenhauer, B. Danev, and S. Čapkun, “Investigation of signal and message manipulations on the wireless channel,” in Proceedings of the european symposium on research in computer security (esorics), 2011.
    [Bibtex]
    @inproceedings{poepper11manipulations,
    author={P\"opper, Christina and Tippenhauer, Nils Ole and Danev, Boris and \v{C}apkun, Srdjan},
    Title={Investigation of Signal and Message Manipulations on the Wireless Channel},
    Booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    Year={2011},
    doi={10.1007/978-3-642-23822-2_3},
    month={December}}

2010

  • [DOI] M. Kuhn, H. Luecken, and N. O. Tippenhauer, “UWB impulse radio based distance bounding,” in Proceedings of the workshop on positioning, navigation and communication (wpnc), 2010.
    [Bibtex]
    @inproceedings{Kuhn10uwbdb,
    author={Kuhn, Marc and Luecken, Heinrich and Tippenhauer, Nils Ole},
    title={{UWB} Impulse Radio Based Distance Bounding},
    booktitle={Proceedings of the Workshop on Positioning, Navigation and Communication (WPNC)},
    year={2010},
    doi={10.1109/WPNC.2010.5653801},
    month={December}}
  • [DOI] S. Čapkun, M. Čagalj, G. Karame, and N. O. Tippenhauer, “Integrity regions: authentication through presence in wireless networks,” Ieee transactions on mobile computing, 2010.
    [Bibtex]
    @article{capkunTMC10,
    author={\v{C}apkun, Srdjan and \v{C}agalj, Mario and Karame, Ghassan and Tippenhauer, Nils Ole},
    title={Integrity Regions: Authentication Through Presence in Wireless Networks},
    journal={IEEE Transactions on Mobile Computing},
    year={2010},
    publisher={IEEE},
    doi={10.1109/TMC.2010.127},
    month={December}}

2009

  • N. O. Tippenhauer, K. B. Rasmussen, and S. Čapkun, “Secure ranging with message temporal integrity,” in Cryptology eprint archive: report 2009/602, 2009.
    [Bibtex]
    @inproceedings{tippenhauer09temp,
    author={Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and \v{C}apkun, Srdjan},
    title={Secure Ranging With Message Temporal Integrity},
    booktitle={Cryptology ePrint Archive: Report 2009/602},
    year={2009},
    month={December}}
  • [DOI] N. O. Tippenhauer and S. Čapkun, “ID-based secure distance bounding and localization,” in Proceedings of the european symposium on research in computer security (esorics), 2009.
    [Bibtex]
    @inproceedings{tippenhauer09idbased,
    author={Tippenhauer, Nils Ole and \v{C}apkun, Srdjan},
    title={{ID}-based Secure Distance Bounding and Localization},
    booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    year={2009},
    doi={10.1007/978-3-642-04444-1_38},
    month={December}}
  • [DOI] N. O. Tippenhauer, K. B. Rasmussen, C. Pöpper, and S. Čapkun, “Attacks on public WLAN-based positioning,” in Proceedings of the acm conference on mobile systems, applications and services (mobisys), 2009.
    [Bibtex]
    @inproceedings{tippenhauer09attacks,
    author={Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and P\"opper, Christina and \v{C}apkun, Srdjan},
    title={Attacks on Public {WLAN}-based Positioning},
    booktitle={Proceedings of the ACM Conference on Mobile Systems, Applications and Services (MobiSys)},
    year={2009},
    doi={10.1145/1555816.1555820},
    month={December}}

2007

  • N. O. Tippenhauer, “Design and cryptoanalysis of multi-precision arithmetics on smart cards with SmartMIPS architecture,” Master Thesis, 2007.
    [Bibtex]
    @mastersthesis{tippenhauer07smartmips,
    author={Tippenhauer, Nils Ole},
    title={Design and Cryptoanalysis of Multi-Precision Arithmetics on Smart Cards with {SmartMIPS} Architecture},
    school={Hamburg University of Technology (TUHH)},
    year={2007},
    note={Supervised by Prof. Dieter Gollmann and Prof. Heike Neumann},
    month={December}}

Fun fact: my Erdős number is 4 (via Yuval Elovici)