Automatic detection of various malicious traffic using side channel features on TCP packets G Stergiopoulos, A Talavari, E Bitsikas, D Gritzalis Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 48 | 2018 |
Don’t hand it over: Vulnerabilities in the handover procedure of cellular telecommunications E Bitsikas, C Pöpper Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 35 | 2021 |
Detecting GPS Jamming Incidents in OpenSky Data A Darabseh, E Bitsikas, B Tedongmo Proceedings of the 7th OpenSky Workshop 67, 97-108, 2019 | 33 | 2019 |
You have been warned: Abusing 5G’s Warning and Emergency Systems E Bitsikas, C Pöpper Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 17 | 2022 |
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework E Bitsikas, S Khandker, A Salous, A Ranganathan, R Piqueras Jover, ... Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023 | 13 | 2023 |
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks. N Tsalis, G Stergiopoulos, E Bitsikas, D Gritzalis, TK Apostolopoulos ICETE (2), 219-229, 2018 | 13 | 2018 |
Using side channel TCP features for real-time detection of malware connections G Stergiopoulos, G Chronopoulou, E Bitsikas, N Tsalis, D Gritzalis Journal of Computer Security 27 (5), 507-520, 2019 | 12 | 2019 |
On ADS-B Sensor Placement for Secure Wide-Area Multilateration A Darabseh, E Bitsikas, B Tedongmo, C Pöpper Proceedings 59 (1), 3, 2020 | 9 | 2020 |
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings E Bitsikas, T Schnitzler, C Pöpper, A Ranganathan 32nd USENIX Security Symposium (USENIX Security 23), 2151-2168, 2023 | 8 | 2023 |
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers T Schnitzler, K Kohls, E Bitsikas, C Pöpper ISOC Network and Distributed Systems Security Symposium (NDSS), 2022 | 7 | 2022 |
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices S Khandker, M Guerra, E Bitsikas, RP Jover, A Ranganathan, C Pöpper Proceedings of the 17th ACM Conference on Security and Privacy in Wireless …, 2024 | 2 | 2024 |
Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks E Bitsikas, T Schnitzler, C Pöpper, A Ranganathan 18th USENIX WOOT Conference on Offensive Technologies (WOOT 24), 59-73, 2024 | 1 | 2024 |
Dyna-5G: A Dynamic, Flexible, and Self-Organizing 5G Network for M2M Ecosystems E Bitsikas, A Belfki, A Ranganathan arXiv preprint arXiv:2406.15681, 2024 | | 2024 |