Publications

This list of publications is automatically created from my BibTeX database and will be updated semi-regularly as I update that master file. If you need a PDF version of one of these publications that is not online (for various reasons), please send me an email.

For a list of citations, see e.g. my ResearchGate, Google Scholar, ACM Authorizer, Semantic Scholar, or ORCID profiles. For most of the conference papers, I have also given the presentations, and you can find my associated slides here.

Filter by type:
. Adversary Models for Mobile Device Authentication. 2019.

. Investigating the impact of network security on the line current differential protection system. The Journal of Engineering, 2018.

PDF DOI

. Design, Implementation, and Evaluation of Secure Communication for Line Current Differential Protection Systems over Packet Switched Networks. International Journal of Critical Infrastructure Protection, 2018.

PDF DOI

. Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics. IEEE Transactions on Mobile Computing, 2018.

DOI

. Wie sicher ist die schöne, neue und vernetzte Welt?. Automatisierung: Wechselwirkung mit Kunst, Wissenschaft und Gesellschaft, 2018.

. Sulong, and Thanks For All the Bugs: Finding Errors in C Programs by Abstracting from the Native Execution Model. Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018.

DOI

. Smartphone-based Gait Recognition: From Authentication to Imitation. IEEE Transactions on Mobile Computing (IEEE TMC), 2017.

DOI

. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices. IEEE Transactions on Mobile Computing (IEEE TMC), 2017.

DOI

. Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), 2016.

DOI

. Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), 2016.

DOI

. DAMN - A Debugging and Manipulation Tool for Android Applications. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), 2016.

DOI

. Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2016), 2016.

DOI

. Location-based Risk Assessment for Mobile Authentication. 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp Adjunct 2016, Heidelberg, Germany, September 12-16, 2016, 2016.

DOI

. Eyewear Computing – Augmenting the Human with Head-mounted Wearable Assistants (Dagstuhl Seminar 16042). Dagstuhl Reports, 2016.

PDF DOI

. Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns. Proc. MUM 2015: 14th International Conference on Mobile and Ubiquitous Multimedia, 2015.

. Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT. 13th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2015), 2015.

DOI

. Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Personal and Ubiquitous Computing, 2015.

DOI

. Cross Pocket Gait Authentication using Mobile Phone Based Accelerometer Sensor. Proc. EUROCAST 2015: 15th International Conference on Computer Aided Systems Theory, 2015.

DOI

. Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. International Journal of Pervasive Computing and Communications (IJPCC), 2015.

DOI

. CORMORANT: Towards Continuous Risk-aware Multi-modal Cross-device Authentication. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers: Adjunct Publication (UbiComp 2015), 2015.

PDF DOI

. ShakeUnlock: Securely Unlock Mobile Devices by Shaking them Together. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, 2014.

DOI

. Orientation Independent Cell Phone Based Gait Authentication. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, 2014.

DOI

. Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial Alignment. Proc. iiWAS 2014: 16th International Conference on Information Integration and Web-based Applications & Services, 2014.

. Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, 2014.

DOI

. Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel. Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia, 2014.

DOI

. A Survey of User Interaction for Spontaneous Device Association. ACM Computing Surveys, 2014.

DOI

. Special Issue on Security and Trust in Context-Aware Applications. 2014.

. Managing the life cycle of Java Card applets in other Java virtual machines. International Journal of Pervasive Computing and Communications (IJPCC), 2014.

DOI

. Diversity in Locked and Unlocked Mobile Device Usage. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2014), 2014.

DOI

. An Architecture for Secure Mobile Devices. Security and Communication Networks, 2014.

PDF DOI

. A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices. Information Security Conference (ISC 2014), 2014.

. Visualizations and Switching Mechanisms for Security Zones. Proc. MoMM 2013: 11th International Conference on Advances in MobileComputing and Multimedia, 2013.

. Requirements for an Open Ecosystem for Embedded Tamper ResistantHardware on Mobile Devices. Proc. MoMM 2013: 11th International Conference on Advances in MobileComputing and Multimedia, 2013.

. Range Face Segmentation: Face Detection and Segmentation for Authenticationin Mobile Device Range Images. Proc. MoMM 2013: 11th International Conference on Advances in MobileComputing and Multimedia, 2013.

. An Analysis Of Different Approaches To Gait Recognition Using CellPhone Based Accelerometer. Proc. MoMM 2013: 11th International Conference on Advances in MobileComputing and Multimedia, 2013.

. (Ab)using foreign VMs: Running Java Card Applets in non-Java CardVirtual Machines. Proc. MoMM 2013: 11th International Conference on Advances in MobileComputing and Multimedia, 2013.

. When Users Cannot Verify Digital Signatures: On the Difficultiesof Securing Mobile Devices. Proc. HPCC 2013: 15th IEEE International Conference on High PerformanceComputing and Communications, 2013.

. UACAP: A Unified Auxiliary Channel Authentication Protocol. IEEE Transactions on Mobile Computing, 2013.

DOI

. Towards Secure Personal Device Unlock using Stereo Camera Pan Shots. Proc. EUROCAST 2013: 14th International Conference on ComputerAidedSystems Theory, 2013.

. Towards pan shot face unlock: Using biometric face information fromdifferent perspectives to unlock mobile devices. International Journal of Pervasive Computing and Communications (IJPCC), 2013.

DOI

. 'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous ExperienceSharing (Dagstuhl Seminar 13312). Dagstuhl Reports, 2013.

PDF DOI

. Towards Face Unlock: On the Difficulty of Reliably Detecting Faceson Mobile Phones. Proc. MoMM 2012: 10th International Conference on Advances in MobileComputing and Multimedia, 2012.

. SAPHE - Simple Accelerometer based wireless Pairing with HEuristictrees. Proc. MoMM 2012: 10th International Conference on Advances in MobileComputing and Multimedia, 2012.

. Unify localization using user interface description languages anda navigation context-aware translation tool. Proc. EICS 2012: 4th ACM SIGCHI symposium on Engineering interactivecomputing systems, 2012.

DOI

. Towards usable authentication on mobile phones: An evaluation ofspeaker and face recognition on off-the-shelf handsets. Proc. IWSSI/SPMU 2012: 4th International Workshop on Security andPrivacy in Spontaneous Interaction and Mobile Phone Use, colocatedwith Pervasive 2012, 2012.

. Towards a Practical, Scalable Self-Localization System for Android Phones based on WLAN Fingerprinting. Proc. ICDCSW 2012: 32nd International Conference on DistributedComputing Systems Workshops, 2012.

DOI

. Air-Writing: A Platform for Scalable, Privacy-Preserving, SpatialGroup Messaging. International Journal of Pervasive Computing and Communications (IJPCC), 2012.

DOI

. Private Notes: Encrypted XML Notes Synchronization and Sharingwith Untrusted Web Services. Proc. iiWAS2011: 13th International Conference on Information Integrationand Web-based Applications & Services, 2011.

. Feature interaction analysis in mobile phones: on the borderlinebetween application functionalities and platform components. Proc. MoMM 2011: 9th International Conference on Advances in MobileComputing and Multimedia, 2011.

. A Critical Review of Applied MDA for Embedded Devices: Identificationof Problem Classes and Discussing Porting Efforts in Practice. Proc. MODELS 2011: ACM/IEEE 14th International Conference on ModelDriven Engineering Languages and Systems, 2011.

. A framework for on-device privilege escalation exploit executionon Android. Proc. IWSSI/SPMU 2011: 3rd International Workshop on Security andPrivacy in Spontaneous Interaction and Mobile Phone Use, colocatedwith Pervasive 2011, 2011.

. emphFriends Radar: Towards a Private P2P Location Sharing Platform. Proc. EUROCAST 2011: 13th International Conference on ComputerAided Systems Theory, Part II, 2011.

. Mobile Platform Architecture Review: Android, iPhone, Qt. Proc. EUROCAST 2011: 13th International Conference on ComputerAided Systems Theory, Part II, 2011.

. Evaluation of Descriptive User Interface Methodologies for MobileDevices. Proc. EUROCAST 2011: 13th International Conference on ComputerAided Systems Theory, Part II, 2011.

. Global indexing of indoor localization data. 2011.

. Air-Writing: A Platform for Scalable, Privacy-Preserving, SpatialGroup Messaging. Proc. iiWAS2010: 12th International Conference on Information Integrationand Web-based Applications & Services, 2010.

. User Created Machine-readable Policies for Energy Efficiency in SmartHomes. Proc. UCSE 2010, co-located with Ubicomp 2010, 2010.

. OpenUAT: The Open Source Ubiquitous Authentication Toolkit. 2010.

. Shake well before use: Intuitive and Secure Pairing of Mobile Devices. IEEE Transactions on Mobile Computing, 2009.

. On Structural Identification of 2D Regression Functions for In-doorBluetooth Localization. Proc. EUROCAST 2009, 2009.

. Special Issue: Secure Spontaneous Interaction. 2009.

. Towards Alternative User Interfaces for Capturing and Managing Taskswith Mobile Devices. Proc. MoMM 2008: 6th International Conference on Advances in MobileComputing and Multimedia, 2008.

. Spontaneous Mobile Device Authentication based on Sensor Data. Information Security Technical Report, 2008.

DOI

. Peer-it: Stick-on solutions for networks of things. Pervasive and Mobile Computing, 2008.

. Building Flexible Manufacturing Systems Based on Peer-Its. EURASIP Journal on Embedded Systems, 2008.

PDF DOI

. Shake well before use: two implementations for implicit context authentication. Adjunct Proc. Ubicomp 2007, 2007.

. Security by Spatial Reference: Using Relative Positioning to AuthenticateDevices for Spontaneous Interaction. Proc. Ubicomp 2007: 9th International Conference on UbiquitousComputing, 2007.

. The Candidate Key Protocol for Generating Secret Shared Keys FromSimilar Sensor Data Streams. Proc. ESAS 2007: 4th European Workshop on Security and Privacyin Ad hoc and Sensor Networks, 2007.

. Shake well before use: Authentication based on Accelerometer Data. Proc. Pervasive 2007: 5th International Conference on PervasiveComputing, 2007.

. A Human-Verifiable Authentication Protocol Using Visible Laser Light. Proc. ARES 2007: 2nd International Conference on Availability,Reliability and Security, 2007.

. Using a Spatial Context Authentication Proxy for Establishing SecureWireless Connections. Journal of Mobile Multimedia, 2007.

. Towards an Open Source Toolkit for Ubiquitous Device Authentication. Workshops Proc. PerCom 2007: 5th IEEE International Conferenceon Pervasive Computing and Communications, 2007.

. On the Security of Ultrasound as Out-of-band Channel. Proc. IPDPS 2007: 21st IEEE International Parallel and DistributedProcessing Symposium, 2007.

. Extending the Growing Neural Gas Classifier for Context Recognition. Proc. EUROCAST 2007: 11th International Conference on ComputerAided Systems Theory, 2007.

. A Context Authentication Proxy for IPSec using Spatial Reference. Proc. TwUC 2006: 1st International Workshop on Trustworthy UbiquitousComputing, 2006.

. An Authentication Protocol using Ultrasonic Ranging. 2006.

PDF

. Technische Hintergründe f̈̊ das rechtliche Handeln im Internet. Aktuelles zum Internet-Recht, 2005.

. Bridging the Gap with P2P Patterns. Proceedings of the Workshop on Smart Object Systems, 2005.

. Eine Architektur zur Kontextvorhersage. Ausgezeichnete Informatikdissertationen 2004, 2005.

. Context Prediction based on Context Histories: Expected Benefits,Issues and Current State-of-the-Art. Proc. ECHISE 2005: 1st International Workshop on Exploiting ContextHistories in Smart Environments, 2005.

. Advances in Pervasive Computing: Adjunct Proceedings of the 3rd InternationalConference on Pervasive Computing. 2005.

. An Architecture for Context Prediction. 2005.

. An Architecture for Context Prediction. 2004.

. Recognizing and Predicting Context by Learning from User Behavior. Radiomatics: Journal of Communication Engineering, special issueon Advances in Mobile Multimedia, 2004.

. Digital Aura. Advances in Pervasive Computing, 2004.

. An Architecture for Context Prediction. Advances in Pervasive Computing, 2004.

. A Notebook Sensory Data Set for Context Recognition. Proceedings of the Benchmarks and a Database for Context RecognitionWorkshop, 2004.

. A Context Prediction Code and Data Base. Proceedings of the Benchmarks and a Database for Context RecognitionWorkshop, 2004.

. A Light-Weight Component Model for Peer-to-Peer Applications. Proceedings MDC04: 2nd International Workshop on Mobile DistributedComputing, 2004.

. The Peer-to-Peer Coordination Framework --- Architecture Reference. 2004.

. A Peer-to-Peer Light-Weight Component Model for Context-Aware SmartSpace Applications. International Journal of Wireless and Mobile Computing (IJWMC),special issue on Mobile Distributed Computing, 2004.

. Feature Extraction in Wireless Personal and Local Area Networks. Proc. MWCN 2003: 5th International Conference on Mobile and WirelessCommunications Networks, 2003.

. Recognizing and Predicting Context by Learning from User Behavior. Proc. MoMM 2003: 1st International Conference On Advances in MobileMultimedia, 2003.

PDF

. Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks. Electronic Notes in Theoretical Computer Science, 2003.

. DEVS Simulation of Spiking Neural Networks. Cybernetics and Systems: Proc. EMCSR 2002: 16th European Meetingon Cybernetics and Systems Research, 2002.

. Generic Heuristics for Combinatorial Optimization Problems. Proceedings of the 9th International Conference on Operational Research(KOI2002), 2002.