| Practical Attacks Against Privacy and Availability in 4G/LTE A Shaik, R Borgaonkar, JP Seifert, N Asokan, V Niem 23nd Annual Network and Distributed System Security Symposium, NDSS 2016 …, 2016 | 474* | 2016 |
| Practical attacks against privacy and availability in 4G/LTE mobile communication systems A Shaik, R Borgaonkar, N Asokan, V Niemi, JP Seifert arXiv preprint arXiv:1510.07563, 2015 | 474 | 2015 |
| New privacy issues in mobile telephony: fix and verification M Arapinis, L Mancini, E Ritter, M Ryan, N Golde, K Redon, R Borgaonkar Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 267 | 2012 |
| New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities A Shaik, R Borgaonkar, S Park, JP Seifert Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 200 | 2019 |
| New privacy threat on 3G, 4G, and upcoming 5G AKA protocols R Borgaonkar, L Hirschi, S Park, A Shaik Cryptology ePrint Archive, 2018 | 190 | 2018 |
| SMS-Based One-Time Passwords: Attacks and Defense: (Short Paper) C Mulliner, R Borgaonkar, P Stewin, JP Seifert International Conference on Detection of Intrusions and Malware, and …, 2013 | 190 | 2013 |
| A security architecture for 5G networks G Arfaoui, P Bisson, R Blom, R Borgaonkar, H Englund, E Félix, ... IEEE access 6, 22466-22479, 2018 | 131 | 2018 |
| Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications. N Golde, K Redon, R Borgaonkar NDSS, 2012 | 98 | 2012 |
| Improving smart grid security through 5G enabled IoT and edge computing R Borgaonkar, I Anne Tøndel, M Zenebe Degefa, M Gilje Jaatun Concurrency and Computation: Practice and Experience 33 (18), e6466, 2021 | 84 | 2021 |
| White-Stingray: Evaluating IMSI Catchers Detection Applications R Borgaonkar, S Park, A Shaik, A Martin, JP Seifert | 71* | 2017 |
| On the impact of rogue base stations in 4g/lte self organizing networks A Shaik, R Borgaonkar, S Park, JP Seifert Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018 | 66 | 2018 |
| New paradigms for access control in constrained environments A Cherkaoui, L Bossuet, L Seitz, G Selander, R Borgaonkar 2014 9th International Symposium on Reconfigurable and Communication-Centric …, 2014 | 54 | 2014 |
| Anatomy of commercial IMSI catchers and detectors S Park, A Shaik, R Borgaonkar, JP Seifert Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 74-86, 2019 | 52 | 2019 |
| Security analysis of a femtocell device R Borgaonkar, K Redon, JP Seifert Proceedings of the 4th International Conference on Security of Information …, 2011 | 43 | 2011 |
| An analysis of the asprox botnet R Borgaonkar 2010 Fourth International Conference on Emerging Security Information …, 2010 | 39 | 2010 |
| Mobile subscriber wifi privacy P O’hanlon, R Borgaonkar, L Hirschi 2017 IEEE Security and Privacy Workshops (SPW), 169-178, 2017 | 37 | 2017 |
| Secret policing B Friedman U. Chi. Legal F., 99, 2016 | 33 | 2016 |
| Cellpot: A concept for next generation cellular network honeypots S Liebergeld, M Lange, R Borgaonkar Internet Society, 1-6, 2014 | 32 | 2014 |
| 5G as an enabler for secure IoT in the smart grid R Borgaonkar, MG Jaatun 2019 first international conference on societal automation (SA), 1-7, 2019 | 31 | 2019 |
| Analysis of trusted execution environment usage in samsung KNOX A Atamli-Reineh, R Borgaonkar, RA Balisane, G Petracca, A Martin Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016 | 31 | 2016 |