Joshua Smailes
Joshua Smailes
Department of Computer Science,
Robert Hooke Building
Directions Postal Address
Selected Publications
-
Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks
Joshua Smailes‚ Edd Salkield‚ Sebastian Köhler‚ Simon Birnbach‚ Martin Strohmeier and Ivan Martinovic
In 2nd Workshop on Security of Space and Satellite Systems (SpaceSec). March, 2024.
Details about Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks | BibTeX data for Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks | Download (pdf) of Sticky Fingers: Resilience of Satellite Fingerprinting against Jamming Attacks | DOI (10.14722/spacesec.2024.23054)
-
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
Joshua Smailes‚ Sebastian Köhler‚ Simon Birnbach‚ Martin Strohmeier and Ivan Martinovic
In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 23). November, 2023.
Details about Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | BibTeX data for Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | Download (pdf) of Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting | DOI (10.1145/3576915.3623135) | Link to Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
-
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
Edd Salkield‚ Marcell Szakály‚ Joshua Smailes‚ Simon Birnbach‚ Sebastian Köhler‚ Martin Strohmeier and Ivan Martinovic
In Proceedings of the 16th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). May, 2023.
Best Paper Award: Runner Up!
Details about Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | BibTeX data for Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | Download (pdf) of Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | Link to Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks