What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Matthias Hollick
Google Scholar
ORCID:
0000-0002-9163-5989
48
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Okay Google, Where's My Tracker? Security, Privacy, and Performance Evaluation of Google's Find My Device Network.
Leon Böttger
Alexander Matern
Dennis Arndt
Matthias Hollick
2025
journals/popets
WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch.
Nils Rollshausen
Alexander Heinrich
Matthias Hollick
Jiska Classen
2025
conf/ndss
Starshields for iOS: Navigating the Security Cosmos in Satellite Communication.
Jiska Classen
Alexander Heinrich
Fabian Portner
Felix Rohrbach
Matthias Hollick
2025
conf/wisec
BlindSpot: Efficient Single-Node Selective Jamming for LoRaWAN.
Vincenz Mechler
Frank Hessel
Matthias Hollick
Bastian Bloessl
2025
conf/wisec
DEMO: Illuminating the BlindSpot: Efficient Single-Node Selective Jamming for LoRaWAN.
Vincenz Mechler
Frank Hessel
Matthias Hollick
Bastian Bloessl
2024
journals/popets
Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection.
Alexander Heinrich
Leon Würsching
Matthias Hollick
2024
conf/sp
To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices.
Sönke Huster
Matthias Hollick
Jiska Classen
2024
conf/esorics
Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements.
Swantje Lange
Francesco Gringoli
Matthias Hollick
Jiska Classen
2023
journals/popets
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges.
Alina Stöver
Nina Gerber
Henning Pridöhl
Max Maass
Sebastian Bretthauer
Indra Spiecker genannt Döhmann
Matthias Hollick
Dominik Herrmann
2023
conf/cns
BeamSec: A Practical mmWave Physical Layer Security Scheme Against Strong Adversaries.
Afifa Ishtiaq
Arash Asadi
Ladan Khaloopour
Waqar Ahmed
Vahid Jamali
Matthias Hollick
2023
conf/acsac
Detection of Anomalies in Electric Vehicle Charging Sessions.
Dustin Kern
Christoph Krauß
Matthias Hollick
2022
conf/uss
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging.
Patrick Leu
Giovanni Camurati
Alexander Heinrich
Marc Roeschlin
Claudio Anliker
Matthias Hollick
Srdjan Capkun
Jiska Classen
2022
conf/sp
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.
Jiska Classen
Francesco Gringoli
Michael Hermann
Matthias Hollick
2022
conf/sp
AirTag of the Clones: Shenanigans with Liberated Item Finders.
Thomas Roth
Fabian Freyer
Matthias Hollick
Jiska Classen
2022
conf/dsn
Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols.
Stephan Kleber
Frank Kargl
Milan Stute
Matthias Hollick
2022
conf/wisec
OpenHaystack Mobile - Tracking Custom Find My Accessories on Smartphones.
Lukas Burg
Max Granzow
Alexander Heinrich
Matthias Hollick
2022
conf/wisec
Evil Never Sleeps: When Wireless Malware Stays On after Turning Off iPhones.
Jiska Classen
Alexander Heinrich
Robert Reith
Matthias Hollick
2022
conf/wisec
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices.
Alexander Heinrich
Niklas Bittner
Matthias Hollick
2021
journals/popets
Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System.
Alexander Heinrich
Milan Stute
Tim Kornhuber
Matthias Hollick
2021
conf/uss
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
Alexander Heinrich
Matthias Hollick
Thomas Schneider
Milan Stute
Christian Weinert
2021
conf/uss
Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi.
Milan Stute
Alexander Heinrich
Jannik Lorenz
Matthias Hollick
2021
conf/uss
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support.
Max Maass
Alina Stöver
Henning Pridöhl
Sebastian Bretthauer
Dominik Herrmann
Matthias Hollick
Indra Spiecker
2021
conf/esorics
ARIstoteles - Dissecting Apple's Baseband Interface.
Tobias Kröll
Stephan Kleber
Frank Kargl
Matthias Hollick
Jiska Classen
2021
conf/cns
Very Pwnable Network: Cisco AnyConnect Security Analysis.
Gerbert Roitburd
Matthias Ortmann
Matthias Hollick
Jiska Classen
2021
conf/wisec
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop.
Alexander Heinrich
Matthias Hollick
Thomas Schneider
Milan Stute
Christian Weinert
2021
conf/wisec
OpenHaystack: a framework for tracking personal bluetooth devices via Apple's massive find my network.
Alexander Heinrich
Milan Stute
Matthias Hollick
2021
conf/wisec
Happy MitM: fun and toys in every bluetooth device.
Jiska Classen
Matthias Hollick
2020
conf/uss
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets.
Jan Ruge
Jiska Classen
Francesco Gringoli
Matthias Hollick
2019
conf/uss
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Milan Stute
Sashank Narain
Alex Mariotto
Alexander Heinrich
David Kreitschmann
Guevara Noubir
Matthias Hollick
2019
conf/wisec
Inside job: diagnosing bluetooth lower layers using off-the-shelf devices.
Jiska Classen
Matthias Hollick
2018
conf/cns
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
Santiago Aragon
Marco Tiloca
Max Maass
Matthias Hollick
Shahid Raza
2018
conf/wisec
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
Daniel Steinmetzer
Yimin Yuan
Matthias Hollick
2017
conf/wisec
Demonstrating reactive smartphone-based jamming: demo.
Matthias Schulz
Efstathios Deligeorgopoulos
Matthias Hollick
Francesco Gringoli
2017
conf/wisec
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
Matthias Schulz
Francesco Gringoli
Daniel Steinmetzer
Michael Koch
Matthias Hollick
2016
journals/tifs
On the Privacy and Performance of Mobile Anonymous Microblogging.
Marius Senftleben
Ana Barroso
Mihai Bucicoiu
Matthias Hollick
Stefan Katzenbeisser
Erik Tews
2016
conf/ccs
Analyzing TETRA Location Privacy and Network Availability.
Martin Pfeiffer
Jan-Pascal Kwiotek
Jiska Classen
Robin Klose
Matthias Hollick
2016
conf/wisec
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
Matthias Schulz
Adrian Loch
Matthias Hollick
2016
conf/wisec
DEMO: Using NexMon, the C-based WiFi firmware modification framework.
Matthias Schulz
Daniel Wegemer
Matthias Hollick
2016
conf/wisec
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
Yao Zheng
Matthias Schulz
Wenjing Lou
Y. Thomas Hou
Matthias Hollick
2016
conf/wisec
DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices.
Tobias Schultes
Markus Grau
Daniel Steinmetzer
Matthias Hollick
2016
conf/wisec
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
Matthias Schulz
Patrick Klapper
Matthias Hollick
Erik Tews
Stefan Katzenbeisser
2015
conf/cns
Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves.
Daniel Steinmetzer
Joe Chen
Jiska Classen
Edward W. Knightly
Matthias Hollick
2015
conf/cns
Practical covert channels for WiFi systems.
Jiska Classen
Matthias Schulz
Matthias Hollick
2015
conf/acsac
Using Channel State Information for Tamper Detection in the Internet of Things.
Ibrahim Ethem Bagci
Utz Roedig
Ivan Martinovic
Matthias Schulz
Matthias Hollick
2015
conf/wisec
Lockpicking physical layer key exchange: weak adversary models invite the thief.
Daniel Steinmetzer
Matthias Schulz
Matthias Hollick
2014
conf/ndss
Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
Matthias Schulz
Adrian Loch
Matthias Hollick
2014
conf/wisec
Short paper: gathering tamper evidence in wi-fi networks based on channel state information.
Ibrahim Ethem Bagci
Utz Roedig
Matthias Schulz
Matthias Hollick
2013
journals/istr
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications.
Delphine Christin
Pablo Sánchez López
Andreas Reinhardt
Matthias Hollick
Michaela Kauer
Coauthors
Adrian Loch
(2)
Afifa Ishtiaq
(1)
Alex Mariotto
(1)
Alexander Heinrich
(13)
Alexander Matern
(1)
Alina Stöver
(2)
Ana Barroso
(1)
Andreas Reinhardt
(1)
Arash Asadi
(1)
Bastian Bloessl
(2)
Christian Weinert
(2)
Christoph Krauß
(1)
Claudio Anliker
(1)
Daniel Steinmetzer
(5)
Daniel Wegemer
(1)
David Kreitschmann
(1)
Delphine Christin
(1)
Dennis Arndt
(1)
Dominik Herrmann
(2)
Dustin Kern
(1)
Edward W. Knightly
(1)
Efstathios Deligeorgopoulos
(1)
Erik Tews
(2)
Fabian Freyer
(1)
Fabian Portner
(1)
Felix Rohrbach
(1)
Francesco Gringoli
(5)
Frank Hessel
(2)
Frank Kargl
(2)
Gerbert Roitburd
(1)
Giovanni Camurati
(1)
Guevara Noubir
(1)
Henning Pridöhl
(2)
Ibrahim Ethem Bagci
(2)
Indra Spiecker
(1)
Indra Spiecker genannt Döhmann
(1)
Ivan Martinovic
(1)
Jan Ruge
(1)
Jan-Pascal Kwiotek
(1)
Jannik Lorenz
(1)
Jiska Classen
(16)
Joe Chen
(1)
Ladan Khaloopour
(1)
Leon Böttger
(1)
Leon Würsching
(1)
Lukas Burg
(1)
Marc Roeschlin
(1)
Marco Tiloca
(1)
Marius Senftleben
(1)
Markus Grau
(1)
Martin Pfeiffer
(1)
Matthias Hollick
(48)
Matthias Ortmann
(1)
Matthias Schulz
(11)
Max Granzow
(1)
Max Maass
(3)
Michael Hermann
(1)
Michael Koch
(1)
Michaela Kauer
(1)
Mihai Bucicoiu
(1)
Milan Stute
(7)
Niklas Bittner
(1)
Nils Rollshausen
(1)
Nina Gerber
(1)
Pablo Sánchez López
(1)
Patrick Klapper
(1)
Patrick Leu
(1)
Robert Reith
(1)
Robin Klose
(1)
Santiago Aragon
(1)
Sashank Narain
(1)
Sebastian Bretthauer
(2)
Shahid Raza
(1)
Sönke Huster
(1)
Srdjan Capkun
(1)
Stefan Katzenbeisser
(2)
Stephan Kleber
(2)
Swantje Lange
(1)
Thomas Roth
(1)
Thomas Schneider
(2)
Tim Kornhuber
(1)
Tobias Kröll
(1)
Tobias Schultes
(1)
Utz Roedig
(2)
Vahid Jamali
(1)
Vincenz Mechler
(2)
Waqar Ahmed
(1)
Wenjing Lou
(1)
Y. Thomas Hou
(1)
Yao Zheng
(1)
Yimin Yuan
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to