PHYSICAL LAYER & TELECOMMUNICATIONS SECURITY KNOWLEDGE AREA ( DRAFT FOR COMMENT )

[1]  Srdjan Capkun,et al.  Security of Distance-Bounding , 2018, ACM Comput. Surv..

[2]  Wenyuan Xu,et al.  DolphinAttack: Inaudible Voice Commands , 2017, CCS.

[3]  Srdjan Capkun,et al.  Are We Really Close? Verifying Proximity in Wireless Systems , 2017, IEEE Security & Privacy.

[4]  Wenyuan Xu,et al.  WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[5]  Aanjhan Ranganathan,et al.  Physical-layer Techniques for Secure Proximity Verification and Localization , 2016 .

[6]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[7]  Adi Shamir,et al.  RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis , 2014, CRYPTO.

[8]  Wenyuan Xu,et al.  Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors , 2013, 2013 IEEE Symposium on Security and Privacy.

[9]  Srdjan Capkun,et al.  Physical-Layer Identification of Wireless Devices , 2011 .

[10]  Ivan Martinovic,et al.  A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.

[11]  Sung-Ju Lee,et al.  STROBE: Actively securing wireless communications using Zero-Forcing Beamforming , 2012, 2012 Proceedings IEEE INFOCOM.

[12]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[13]  Christina Pöpper On Secure Wireless Communication under Adversarial Interference , 2011 .

[14]  Martin Welk,et al.  Tempest in a Teapot: Compromising Reflections Revisited , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[15]  Markus G. Kuhn,et al.  So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.

[16]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[17]  Markus G. Kuhn,et al.  Compromising Emanations , 2002, Encyclopedia of Cryptography and Security.

[18]  David L Adamy,et al.  Ew 101: A First Course in Electronic Warfare , 2001 .