Skip to main content

Showing 1–50 of 52 results for author: Martinovic, I

.
  1. arXiv:2506.06119  [pdf, ps, other

    cs.CR eess.SP

    SATversary: Adversarial Attacks on Satellite Fingerprinting

    Authors: Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic

    Abstract: As satellite systems become increasingly vulnerable to physical layer attacks via SDRs, novel countermeasures are being developed to protect critical systems, particularly those lacking cryptographic protection, or those which cannot be upgraded to support modern cryptography. Among these is transmitter fingerprinting, which provides mechanisms by which communication can be authenticated by lookin… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

    Comments: 19 pages, 18 figures, 2 tables

  2. arXiv:2505.22209  [pdf, other

    cs.CV

    A Survey on Training-free Open-Vocabulary Semantic Segmentation

    Authors: Naomi Kombol, Ivan Martinović, Siniša Šegvić

    Abstract: Semantic segmentation is one of the most fundamental tasks in image understanding with a long history of research, and subsequently a myriad of different approaches. Traditional methods strive to train models up from scratch, requiring vast amounts of computational resources and training data. In the advent of moving to open-vocabulary semantic segmentation, which asks models to classify beyond le… ▽ More

    Submitted 28 May, 2025; originally announced May 2025.

  3. arXiv:2409.17181  [pdf, other

    cs.CR

    A Mobile Payment Scheme Using Biometric Identification with Mutual Authentication

    Authors: Jack Sturgess, Ivan Martinovic

    Abstract: Cashless payment systems offer many benefits over cash, but also have some drawbacks. Fake terminals, skimming, wireless connectivity, and relay attacks are persistent problems. Attempts to overcome one problem often lead to another - for example, some systems use QR codes to avoid skimming and connexion issues, but QR codes can be stolen at distance and relayed. In this paper, we propose a novel… ▽ More

    Submitted 24 September, 2024; originally announced September 2024.

  4. arXiv:2408.10963  [pdf, other

    cs.CR cs.NI

    KeySpace: Public Key Infrastructure Considerations in Interplanetary Networks

    Authors: Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic

    Abstract: As satellite networks expand to encompass megaconstellations and interplanetary communication, the need for effective Public Key Infrastructure (PKI) becomes increasingly pressing. This paper addresses the challenge of implementing PKI in these complex networks, identifying the essential goals and requirements. We develop a standardized framework for comparing PKI systems across various network… ▽ More

    Submitted 15 November, 2024; v1 submitted 20 August, 2024; originally announced August 2024.

    Comments: 14 pages, 9 figures, 7 tables

  5. arXiv:2407.14110  [pdf, other

    cs.CV

    MC-PanDA: Mask Confidence for Panoptic Domain Adaptation

    Authors: Ivan Martinović, Josip Šarić, Siniša Šegvić

    Abstract: Domain adaptive panoptic segmentation promises to resolve the long tail of corner cases in natural scene understanding. Previous state of the art addresses this problem with cross-task consistency, careful system-level optimization and heuristic improvement of teacher predictions. In contrast, we propose to build upon remarkable capability of mask transformers to estimate their own prediction unce… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

    Comments: Accepted on ECCV 2024

  6. arXiv:2407.09104  [pdf, other

    cs.CR cs.LG

    UserBoost: Generating User-specific Synthetic Data for Faster Enrolment into Behavioural Biometric Systems

    Authors: George Webber, Jack Sturgess, Ivan Martinovic

    Abstract: Behavioural biometric authentication systems entail an enrolment period that is burdensome for the user. In this work, we explore generating synthetic gestures from a few real user gestures with generative deep learning, with the application of training a simple (i.e. non-deep-learned) authentication model. Specifically, we show that utilising synthetic data alongside real data can reduce the numb… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

  7. arXiv:2404.06635  [pdf, other

    cs.CR

    Current Affairs: A Security Measurement Study of CCS EV Charging Deployments

    Authors: Marcell Szakály, Sebastian Köhler, Ivan Martinovic

    Abstract: Since its introduction in 2012, the Combined Charging System (CCS) has emerged as the leading technology for EV fast charging in Europe, North America and parts of Asia. The charging communication of CCS is defined by the ISO 15118 standards, which have been improved over the years. Most notably, in 2014, important security features such as Transport Layer Security (TLS) and usability enhancements… ▽ More

    Submitted 3 February, 2025; v1 submitted 9 April, 2024; originally announced April 2024.

  8. Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks

    Authors: Joshua Smailes, Edd Salkield, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic

    Abstract: In the wake of increasing numbers of attacks on radio communication systems, a range of techniques are being deployed to increase the security of these systems. One such technique is radio fingerprinting, in which the transmitter can be identified and authenticated by observing small hardware differences expressed in the signal. Fingerprinting has been explored in particular in the defense of sate… ▽ More

    Submitted 4 April, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: 9 pages, 12 figures

  9. arXiv:2305.12948  [pdf, other

    cs.CR

    POSTER: spaceQUIC: Securing Communication in Computationally Constrained Spacecraft

    Authors: Joshua Smailes, Razvan David, Sebastian Kohler, Simon Birnbach, Ivan Martinovic

    Abstract: Recent years have seen a rapid increase in the number of CubeSats and other small satellites in orbit - these have highly constrained computational and communication resources, but still require robust secure communication to operate effectively. The QUIC transport layer protocol is designed to provide efficient communication with cryptography guarantees built-in, with a particular focus on netw… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: 2 pages, 2 figures; the first two authors contributed equally to this paper

  10. Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting

    Authors: Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic

    Abstract: Due to an increase in the availability of cheap off-the-shelf radio hardware, spoofing and replay attacks on satellite ground systems have become more accessible than ever. This is particularly a problem for legacy systems, many of which do not offer cryptographic security and cannot be patched to support novel security measures. In this paper we explore radio transmitter fingerprinting in satel… ▽ More

    Submitted 7 September, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: 14 pages, 16 figures

  11. arXiv:2305.06901  [pdf, other

    cs.CR

    Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks

    Authors: Marcell Szakály, Sebastian Köhler, Martin Strohmeier, Ivan Martinovic

    Abstract: Many modern devices, including critical infrastructures, depend on the reliable operation of electrical power conversion systems. The small size and versatility of switched-mode power converters has resulted in their widespread adoption. Whereas transformer-based systems passively convert voltage, switched-mode converters feature an actively regulated feedback loop, which relies on accurate sensor… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  12. arXiv:2305.00773  [pdf, other

    cs.CV

    Point Cloud Semantic Segmentation

    Authors: Ivan Martinović

    Abstract: Semantic segmentation is an important and well-known task in the field of computer vision, in which we attempt to assign a corresponding semantic class to each input element. When it comes to semantic segmentation of 2D images, the input elements are pixels. On the other hand, the input can also be a point cloud, where one input element represents one point in the input point cloud. By the term po… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: 7 pages, 2 figures, 8 tables Language: Croatian

  13. arXiv:2303.00582  [pdf, other

    cs.CR cs.NI

    Dishing Out DoS: How to Disable and Secure the Starlink User Terminal

    Authors: Joshua Smailes, Edd Salkield, Sebastian Köhler, Simon Birnbach, Ivan Martinovic

    Abstract: Satellite user terminals are a promising target for adversaries seeking to target satellite communication networks. Despite this, many protections commonly found in terrestrial routers are not present in some user terminals. As a case study we audit the attack surface presented by the Starlink router's admin interface, using fuzzing to uncover a denial of service attack on the Starlink user term… ▽ More

    Submitted 8 March, 2023; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: 6 pages, 2 figures; the first two authors contributed equally to this paper

  14. arXiv:2301.03594  [pdf, other

    cs.CR

    RingAuth: Wearable Authentication using a Smart Ring

    Authors: Jack Sturgess, Simon Birnbach, Simon Eberz, Ivan Martinovic

    Abstract: In this paper, we show that by using inertial sensor data generated by a smart ring, worn on the finger, the user can be authenticated when making mobile payments or when knocking on a door (for access control). The proposed system can be deployed purely in software and does not require updates to existing payment terminals or infrastructure. We also demonstrate that smart ring data can authentica… ▽ More

    Submitted 9 December, 2022; originally announced January 2023.

    Comments: arXiv admin note: text overlap with arXiv:2202.01736

  15. arXiv:2212.03793  [pdf

    cs.CR

    RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection

    Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic

    Abstract: Network analysis and machine learning techniques have been widely applied for building malware detection systems. Though these systems attain impressive results, they often are $(i)$ not extensible, being monolithic, well tuned for the specific task they have been designed for but very difficult to adapt and/or extend to other settings, and $(ii)$ not interpretable, being black boxes whose inner c… ▽ More

    Submitted 13 April, 2023; v1 submitted 7 December, 2022; originally announced December 2022.

  16. arXiv:2207.12140  [pdf, other

    cs.CR

    Techniques for Continuous Touch-Based Authentication Modeling

    Authors: Martin Georgiev, Simon Eberz, Ivan Martinovic

    Abstract: The field of touch-based authentication has been rapidly developing over the last decade, creating a fragmented and difficult-to-navigate area for researchers and application developers alike due to the variety of methods investigated. In this study, we perform a systematic literature analysis of 30 studies on the techniques used for feature extraction, classification, and aggregation in touch-bas… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

  17. arXiv:2204.13514  [pdf, other

    cs.CR

    Death By A Thousand COTS: Disrupting Satellite Communications using Low Earth Orbit Constellations

    Authors: Frederick Rawlins, Richard Baker, Ivan Martinovic

    Abstract: Satellites in Geostationary Orbit (GEO) provide a number of commercial, government, and military services around the world, offering everything from surveillance and monitoring to video calls and internet access. However a dramatic lowering of the cost-per-kilogram to space has led to a recent explosion in real and planned constellations in Low Earth Orbit (LEO) of smaller satellites. These conste… ▽ More

    Submitted 28 April, 2022; originally announced April 2022.

    Comments: 13 pages, 25 figures

  18. arXiv:2202.06278  [pdf, other

    cs.CR

    I'm Hearing (Different) Voices: Anonymous Voices to Protect User Privacy

    Authors: Henry Turner, Giulio Lovisotto, Simon Eberz, Ivan Martinovic

    Abstract: In this paper, we present AltVoice -- a system designed to help user's protect their privacy when using remotely accessed voice services. The system allows a user to conceal their true voice identity information with no cooperation from the remote voice service: AltVoice re-synthesizes user's spoken audio to sound as if it has been spoken by a different, private identity. The system converts audio… ▽ More

    Submitted 13 February, 2022; originally announced February 2022.

    Comments: 14 pages

  19. arXiv:2202.03845  [pdf, other

    cs.CR

    BeeHIVE: Behavioral Biometric System based on Object Interactions in Smart Environments

    Authors: Klaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic

    Abstract: The lack of standard input interfaces in the Internet of Things (IoT) ecosystems presents a challenge in securing such infrastructures. To tackle this challenge, we introduce a novel behavioral biometric system based on naturally occurring interactions with objects in smart environments. This biometric leverages existing sensors to authenticate users without requiring any hardware modifications of… ▽ More

    Submitted 18 February, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

  20. Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging

    Authors: Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic

    Abstract: We present a novel attack against the Combined Charging System, one of the most widely used DC rapid charging technologies for electric vehicles (EVs). Our attack, Brokenwire, interrupts necessary control communication between the vehicle and charger, causing charging sessions to abort. The attack requires only temporary physical proximity and can be conducted wirelessly from a distance, allowing… ▽ More

    Submitted 26 March, 2024; v1 submitted 4 February, 2022; originally announced February 2022.

    Journal ref: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023. The Internet Society 2023

  21. arXiv:2202.01736  [pdf, other

    cs.CR

    WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch

    Authors: Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic

    Abstract: In this paper, we show that the tap gesture, performed when a user 'taps' a smartwatch onto an NFC-enabled terminal to make a payment, is a biometric capable of implicitly authenticating the user and simultaneously recognising intent-to-pay. The proposed system can be deployed purely in software on the watch without requiring updates to payment terminals. It is agnostic to terminal type and positi… ▽ More

    Submitted 11 December, 2022; v1 submitted 3 February, 2022; originally announced February 2022.

  22. arXiv:2201.10606  [pdf, other

    cs.CR

    FETA: Fair Evaluation of Touch-based Authentication

    Authors: Martin Georgiev, Simon Eberz, Henry Turner, Giulio Lovisotto, Ivan Martinovic

    Abstract: In this paper, we investigate common pitfalls affecting the evaluation of authentication systems based on touch dynamics. We consider different factors that lead to misrepresented performance, are incompatible with stated system and threat models or impede reproducibility and comparability with previous work. Specifically, we investigate the effects of (i) small sample sizes (both number of users… ▽ More

    Submitted 9 January, 2023; v1 submitted 25 January, 2022; originally announced January 2022.

  23. arXiv:2110.04571  [pdf, other

    cs.LG cs.CR

    Widen The Backdoor To Let More Attackers In

    Authors: Siddhartha Datta, Giulio Lovisotto, Ivan Martinovic, Nigel Shadbolt

    Abstract: As collaborative learning and the outsourcing of data collection become more common, malicious actors (or agents) which attempt to manipulate the learning process face an additional obstacle as they compete with each other. In backdoor attacks, where an adversary attempts to poison a model by introducing malicious samples into the training data, adversaries have to consider that the presence of ad… ▽ More

    Submitted 9 October, 2021; originally announced October 2021.

  24. arXiv:2108.08881  [pdf, other

    cs.CR cs.CV

    Signal Injection Attacks against CCD Image Sensors

    Authors: Sebastian Köhler, Richard Baker, Ivan Martinovic

    Abstract: Since cameras have become a crucial part in many safety-critical systems and applications, such as autonomous vehicles and surveillance, a large body of academic and non-academic work has shown attacks against their main component - the image sensor. However, these attacks are limited to coarse-grained and often suspicious injections because light is used as an attack vector. Furthermore, due to t… ▽ More

    Submitted 13 December, 2021; v1 submitted 19 August, 2021; originally announced August 2021.

  25. arXiv:2106.00541  [pdf, other

    cs.CR cs.LG cs.NI

    MalPhase: Fine-Grained Malware Detection Using Network Flow Data

    Authors: Michal Piskozub, Fabio De Gaspari, Frederick Barr-Smith, Luigi V. Mancini, Ivan Martinovic

    Abstract: Economic incentives encourage malware authors to constantly develop new, increasingly complex malware to steal sensitive data or blackmail individuals and companies into paying large ransoms. In 2017, the worldwide economic impact of cyberattacks is estimated to be between 445 and 600 billion USD, or 0.8% of global GDP. Traditionally, one of the approaches used to defend against malware is network… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Paper accepted for publication at ACM AsiaCCS 2021

  26. arXiv:2104.12675  [pdf, other

    cs.HC

    Daily Turking: Designing Longitudinal Daily-task Studies on Mechanical Turk

    Authors: Henry Turner, Simon Eberz, Ivan Martinovic

    Abstract: In this paper, we present our system design for conducting longitudinal daily-task studies with the same workers throughout on Amazon Mechanical Turk. We implement this system to conduct a study into touch dynamics, and present our experiences, challenges and lessons learned from doing so. Study participants installed our application on their Apple iOS phones and completed two tasks daily for 31 d… ▽ More

    Submitted 17 November, 2021; v1 submitted 26 April, 2021; originally announced April 2021.

    Comments: 9 pages, 6 figures, 2 tables, updated following submission

  27. arXiv:2101.10011  [pdf, other

    cs.CV cs.CR

    They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors

    Authors: Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic

    Abstract: In this paper, we describe how the electronic rolling shutter in CMOS image sensors can be exploited using a bright, modulated light source (e.g., an inexpensive, off-the-shelf laser), to inject fine-grained image disruptions. We demonstrate the attack on seven different CMOS cameras, ranging from cheap IoT to semi-professional surveillance cameras, to highlight the wide applicability of the rolli… ▽ More

    Submitted 1 December, 2021; v1 submitted 25 January, 2021; originally announced January 2021.

    Comments: 15 pages, 15 figures

  28. arXiv:2011.13979  [pdf, other

    cs.CR cs.HC

    IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients

    Authors: Ivo Sluganovic, Enis Ulqinaku, Aritra Dhar, Daniele Lain, Srdjan Capkun, Ivan Martinovic

    Abstract: Remote services and applications that users access via their local clients (laptops or desktops) usually assume that, following a successful user authentication at the beginning of the session, all subsequent communication reflects the user's intent. However, this is not true if the adversary gains control of the client and can therefore manipulate what the user sees and what is sent to the remote… ▽ More

    Submitted 27 November, 2020; originally announced November 2020.

  29. arXiv:2010.13457  [pdf, other

    cs.SD cs.CL cs.CR eess.AS

    Speaker Anonymization with Distribution-Preserving X-Vector Generation for the VoicePrivacy Challenge 2020

    Authors: Henry Turner, Giulio Lovisotto, Ivan Martinovic

    Abstract: In this paper, we present a Distribution-Preserving Voice Anonymization technique, as our submission to the VoicePrivacy Challenge 2020. We observe that the challenge baseline system generates fake X-vectors which are very similar to each other, significantly more so than those extracted from organic speakers. This difference arises from averaging many X-vectors from a pool of speakers in the anon… ▽ More

    Submitted 5 January, 2021; v1 submitted 26 October, 2020; originally announced October 2020.

    Comments: 5 pages Replacement: A small processing bug led to slightly incorrect results. Conclusions remain the same

  30. arXiv:2010.10872  [pdf, other

    cs.CR

    SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research

    Authors: James Pavur, Ivan Martinovic

    Abstract: As the space industry approaches a period of rapid change, securing both emerging and legacy satellite missions will become vital. However, space technology has been largely overlooked by the systems security community. This systematization of knowledge paper seeks to understand why this is the case and to offer a starting point for technical security researchers seeking impactful contributions be… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

  31. arXiv:2010.01034  [pdf, other

    cs.CR

    Understanding Realistic Attacks on Airborne Collision Avoidance Systems

    Authors: Matthew Smith, Martin Strohmeier, Vincent Lenders, Ivan Martinovic

    Abstract: Airborne collision avoidance systems provide an onboard safety net should normal air traffic control procedures fail to keep aircraft separated. These systems are widely deployed and have been constantly refined over the past three decades, usually in response to near misses or mid-air collisions. Recent years have seen security research increasingly focus on aviation, identifying that key wireles… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

  32. arXiv:2007.04137  [pdf, other

    cs.CV cs.LG

    SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations

    Authors: Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, Ivan Martinovic

    Abstract: Research into adversarial examples (AE) has developed rapidly, yet static adversarial patches are still the main technique for conducting attacks in the real world, despite being obvious, semi-permanent and unmodifiable once deployed. In this paper, we propose Short-Lived Adversarial Perturbations (SLAP), a novel technique that allows adversaries to realize physically robust real-world AE by usi… ▽ More

    Submitted 6 January, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

    Comments: 13 pages, to be published in Usenix Security 2021, project page https://github.com/ssloxford/short-lived-adversarial-perturbations

  33. Seeing Red: PPG Biometrics Using Smartphone Cameras

    Authors: Giulio Lovisotto, Henry Turner, Simon Eberz, Ivan Martinovic

    Abstract: In this paper, we propose a system that enables photoplethysmogram (PPG)-based authentication by using a smartphone camera. PPG signals are obtained by recording a video from the camera as users are resting their finger on top of the camera lens. The signals can be extracted based on subtle changes in the video that are due to changes in the light reflection properties of the skin as the blood flo… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: 8 pages, 15th IEEE Computer Society Workshop on Biometrics 2020

  34. arXiv:2002.05091  [pdf, other

    cs.CR cs.NI cs.PF

    QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband

    Authors: James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic

    Abstract: Satellite broadband services are critical infrastructures enabling advanced technologies to function in the most remote regions of the globe. However, status-quo services are often unencrypted by default and vulnerable to eavesdropping attacks. In this paper, we challenge the historical perception that over-the-air security must trade off with TCP performance in high-latency satellite networks due… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

    Comments: A reference implementation of QPEP and a dockerized version of the testbed and scripts used for its evaluation can be found at https://www.github.com/pavja2/qpep

  35. arXiv:1912.04836  [pdf, other

    cs.HC cs.CR cs.LG

    Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning

    Authors: Chris Xiaoxuan Lu, Bowen Du, Hongkai Wen, Sen Wang, Andrew Markham, Ivan Martinovic, Yiran Shen, Niki Trigoni

    Abstract: Demand for smartwatches has taken off in recent years with new models which can run independently from smartphones and provide more useful features, becoming first-class mobile platforms. One can access online banking or even make payments on a smartwatch without a paired phone. This makes smartwatches more attractive and vulnerable to malicious attacks, which to date have been largely overlooked.… ▽ More

    Submitted 11 December, 2019; v1 submitted 10 December, 2019; originally announced December 2019.

    Comments: 27 pages. Originally published at ACM UbiComp 2018. This version corrects some errors in the original version and add the pointer to released code & dataset

  36. arXiv:1908.01061  [pdf, other

    cs.LG cs.IR stat.ML

    Classi-Fly: Inferring Aircraft Categories from Open Data using Machine Learning

    Authors: Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic

    Abstract: In recent years, air traffic communication data has become easy to access, enabling novel research in many fields. Exploiting this new data source, a wide range of applications have emerged, from weather forecasting to stock market prediction, or the collection of information about military and government movements. Typically these applications require knowledge about the metadata of the aircraft,… ▽ More

    Submitted 5 August, 2020; v1 submitted 30 July, 2019; originally announced August 2019.

    Comments: 10 pages, 6 figures, 8 tables, 40 references

  37. Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating

    Authors: Giulio Lovisotto, Simon Eberz, Ivan Martinovic

    Abstract: In this work, we investigate the concept of biometric backdoors: a template poisoning attack on biometric systems that allows adversaries to stealthily and effortlessly impersonate users in the long-term by exploiting the template update procedure. We show that such attacks can be carried out even by attackers with physical limitations (no digital access to the sensor) and zero knowledge of traini… ▽ More

    Submitted 27 September, 2020; v1 submitted 22 May, 2019; originally announced May 2019.

    Comments: 12 pages

  38. arXiv:1905.08039  [pdf, other

    cs.CR

    Safety vs. Security: Attacking Avionic Systems with Humans in the Loop

    Authors: Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic

    Abstract: Many wireless communications systems found in aircraft lack standard security mechanisms, leaving them fundamentally vulnerable to attack. With affordable software-defined radios available, a novel threat has emerged, allowing a wide range of attackers to easily interfere with wireless avionic systems. Whilst these vulnerabilities are known, concrete attacks that exploit them are still novel and n… ▽ More

    Submitted 20 May, 2019; originally announced May 2019.

  39. arXiv:1802.00337  [pdf

    eess.SP cs.MM

    Biomedical Signals Reconstruction Under the Compressive Sensing Approach

    Authors: Ivan Martinovic, Vesna Mandic

    Abstract: The paper analyses the possibility to recover different biomedical signals if limited number of samples is available. Having in mind that monitoring of health condition is done by measuring and observing key parameters such as heart activity through electrocardiogram or anatomy and body processes through magnetic resonance imaging, it is important to keep the quality of the reconstructed signal as… ▽ More

    Submitted 31 January, 2018; originally announced February 2018.

    Comments: paper submitted to the 7th Mediterranean Conference on Embedded Computing - MECO'2018

  40. arXiv:1708.03520  [pdf, other

    cs.CR

    Intra-Library Collusion: A Potential Privacy Nightmare on Smartphones

    Authors: Vincent F. Taylor, Alastair R. Beresford, Ivan Martinovic

    Abstract: Smartphones contain a trove of sensitive personal data including our location, who we talk to, our habits, and our interests. Smartphone users trade access to this data by permitting apps to use it, and in return obtain functionality provided by the apps. In many cases, however, users fail to appreciate the scale or sensitivity of the data that they share with third-parties when they use apps. To… ▽ More

    Submitted 11 August, 2017; originally announced August 2017.

  41. arXiv:1705.07065  [pdf, other

    cs.CR cs.CY

    Analyzing Privacy Breaches in the Aircraft Communications Addressing and Reporting System (ACARS)

    Authors: Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic

    Abstract: The manner in which Aircraft Communications, Addressing and Reporting System (ACARS) is being used has significantly changed over time. Whilst originally used by commercial airliners to track their flights and provide automated timekeeping on crew, today it serves as a multi-purpose air-ground data link for many aviation stakeholders including private jet owners, state actors and military. Since A… ▽ More

    Submitted 19 May, 2017; originally announced May 2017.

    Comments: 16 pages

  42. arXiv:1704.06099  [pdf, other

    cs.CR cs.NI

    Robust Smartphone App Identification Via Encrypted Network Traffic Analysis

    Authors: Vincent F. Taylor, Riccardo Spolaor, Mauro conti, Ivan Martinovic

    Abstract: The apps installed on a smartphone can reveal much information about a user, such as their medical conditions, sexual orientation, or religious beliefs. Additionally, the presence or absence of particular apps on a smartphone can inform an adversary who is intent on attacking the device. In this paper, we show that a passive eavesdropper can feasibly identify smartphone apps by fingerprinting the… ▽ More

    Submitted 20 April, 2017; originally announced April 2017.

  43. FADEWICH: Fast Deauthentication over the Wireless Channel

    Authors: Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik

    Abstract: Both authentication and deauthentication are instrumental for preventing unauthorized access to computer and data assets. While there are obvious motivating factors for using strong authentication mechanisms, convincing users to deauthenticate is not straight-forward, since deauthentication is not considered mandatory. A user who leaves a logged-in workstation unattended (especially for a short ti… ▽ More

    Submitted 27 December, 2016; originally announced December 2016.

    Comments: conference

  44. arXiv:1610.06754  [pdf, other

    cs.NI

    A Localization Approach for Crowdsourced Air Traffic Communication Networks

    Authors: Martin Strohmeier, Vincent Lenders, Ivan Martinovic

    Abstract: In this work, we argue that current state-of-the-art methods of aircraft localization such as multilateration are insufficient, in particular for modern crowdsourced air traffic networks with random, unplanned deployment geometry. We propose an alternative, a grid-based localization approach using the k-Nearest Neighbor algorithm, to deal with the identified shortcomings. Our proposal does not req… ▽ More

    Submitted 21 October, 2016; originally announced October 2016.

    Comments: 10 pages, 10 figures, 5 tables

  45. arXiv:1610.02801  [pdf, other

    cs.CR

    STASH: Securing transparent authentication schemes using prover-side proximity verification

    Authors: Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N. Asokan, Ivan Martinovic

    Abstract: Transparent authentication (TA) schemes are those in which a user is authenticated by a verifier without requiring explicit user interaction. By doing so, those schemes promise high usability and security simultaneously. The majority of TA implementations rely on the received signal strength as an indicator for the proximity of a user device (prover). However, such implicit proximity verification… ▽ More

    Submitted 29 March, 2017; v1 submitted 10 October, 2016; originally announced October 2016.

    Comments: Updated name of paper. Paper accepted to IEEE SECON'17

  46. arXiv:1606.01708  [pdf, other

    cs.CR cs.CY

    Quantifying Permission-Creep in the Google Play Store

    Authors: Vincent F. Taylor, Ivan Martinovic

    Abstract: Although there are over 1,600,000 third-party Android apps in the Google Play Store, little has been conclusively shown about how their individual (and collective) permission usage has evolved over time. Recently, Android 6 overhauled the way permissions are granted by users, by switching to run-time permission requests instead of install-time permission requests. This is a welcome change, but rec… ▽ More

    Submitted 10 August, 2016; v1 submitted 6 June, 2016; originally announced June 2016.

  47. On Perception and Reality in Wireless Air Traffic Communications Security

    Authors: Martin Strohmeier, Matthias Schäfer, Rui Pinheiro, Vincent Lenders, Ivan Martinovic

    Abstract: More than a dozen wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure as security was never part of their design. Recent contributions from academic and hacking communities have exploited this inherent vulnerability to demonstrate attacks on some of these technologies. However, not all of these… ▽ More

    Submitted 24 October, 2016; v1 submitted 28 February, 2016; originally announced February 2016.

    Comments: 20 pages, 5 figures, 7 tables

  48. arXiv:1312.6052  [pdf, other

    cs.CR

    Subliminal Probing for Private Information via EEG-Based BCI Devices

    Authors: Mario Frank, Tiffany Hwu, Sakshi Jain, Robert Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Dawn Song

    Abstract: Martinovic et al. proposed a Brain-Computer-Interface (BCI) -based attack in which an adversary is able to infer private information about a user, such as their bank or area-of-living, by analyzing the user's brain activities. However, a key limitation of the above attack is that it is intrusive, requiring user cooperation, and is thus easily detectable and can be reported to other users. In this… ▽ More

    Submitted 29 May, 2017; v1 submitted 20 December, 2013; originally announced December 2013.

    Comments: under review for a journal publication

  49. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

    Authors: Martin Strohmeier, Vincent Lenders, Ivan Martinovic

    Abstract: Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion passengers per year, besides being crucial to many other interest groups in aviation. The inherent lack of security measures in… ▽ More

    Submitted 15 April, 2014; v1 submitted 13 July, 2013; originally announced July 2013.

    Comments: Survey, 22 Pages, 21 Figures

    Report number: RR-13-10

  50. arXiv:1305.4038  [pdf, other

    cs.NI

    Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference

    Authors: Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, Vincent Lenders

    Abstract: Securing wireless sensor networks (WSNs) is a hard problem. In particular, network access control is notoriously difficult to achieve due to the inherent broadcast characteristics of wireless communications: an attacker can easily target any node in its transmission range and affect large parts of a sensor network simultaneously. In this paper, we therefore propose a distributed guardian system to… ▽ More

    Submitted 17 May, 2013; originally announced May 2013.

    Comments: 16 pages, 13 figures