Research

I'm a full professor for IT security at the Hof University of Applied Sciences. My research focus is on system security, peer-to-peer networks, network security, and privacy.

Security Vulnerabilites

CVSS v3: 9.8
CVE-2018-8865 — In Lantech IDS 2102 2.0 and prior, a stack-based buffer overflow vulnerability has been identified which may allow remote code execution. (CVSS v3: 9.8)
Press: securityweek.com
CVSS v3: 9.8
CVE-2018-8869 — Several cross-site scripting vulnerabilites on Lantech IDS 2102. (CVSS v3: 9.8)
CVSS v3: 7.5
CVE-2017-16719 — TCP Initial Sequence Number (ISN) prediction on Moxa NPort 5110/5130 devices. (CVSS v3: 7.5)
Press: securityweek.com
CVSS v3: 7.5
CVE-2017-16715 — Exposing kernel memory by using uninitialized memory for padding (Etherleaking) on Moxa NPort 5110/5130 devices. (CVSS v3: 7.5)
CVSS v3: 7.5
CVE-2017-14028 — TCP SYN flooding on Moxa NPort 5110/5130 devices. (CVSS v3: 7.5)
CVSS v3: 9.8
CVE-2018-8865 — In Lantech IDS 2102 2.0 and prior, a stack-based buffer overflow vulnerability has been identified which may allow remote code execution.
Press: securityweek.com

Peer-Reviewed Scientific Publications

ACM CCS
Employees' Attitude towards Phishing Simulations: "It's like when a child reaches onto the hot hob: Schiller, Katharina; Adamsky, Florian, Eichenmüller, Christian; Reimert, Matthias; Benenson, Zinaida; 2024 ACM Conference on Computer and Communications Security (CCS), Salt Lake City (acceptance rate of 16.9 %) [pdf] [extended version] (CCS)
WPES
OnionVPN: Onion Routing-Based VPN-Tunnels with Onion Services: Pahl, Sebastian; Kaiser, Daniel; Engel, Thomas; Adamsky, Florian, 2024: Workshop on Privacy in the Electronic Society (WPES), Salt Lake City [pdf] (WPES)
DIMVA
Presshammer: Rowhammer and Rowpress without Physical Address Information: Juffinger, J.; Sudheendra , R.; Heckel, M.; Schwarz, L.; Adamsky, Florian; Gruss, D., 2024: 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Lausanne (acceptance rate of 23.9 %) [pdf] (DIMVA)
TRUSTbus
Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App: Graßhoff, Hendrik; Adamsky, Florian; Schiffner, Stefan; 2023: TRUSTbus at ARES 2023 (20th International Workshop on Trust, Privacy and Security in the Digital Society) [pdf] (TRUSTbus)
DRAMSec
Reverse-Engineering Bank Addressing Functions on AMD CPUs: Heckel, Martin; Adamsky, Florian, 2023: The 3rd Workshop on DRAM Security (DRAMSec 2023), co-located with ISCA 2023 [pdf] (DRAMSec)
ACM CHI
Towards an Empirical Study to determine the Effectiveness of Support Systems against E-Mail Phishing Attacks: Schiller, Katharina; Adamsky, Florian, Benenson, Zinaida, 2023: The ACM CHI Conference on Human Factors in Computing Systems [pdf] (ACM CHI)
PETS
Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance: Pahl, Sebastian; Adamsky, Florian, Kaiser, Daniel; Engel, Thomas, 2023: 23rd Privacy Enhancing Technologies Symposium, Lausanne, (acceptance rate of 22 %) [pdf] (PETS)
STAST
Work in Progress: Can Johnny Encrypt E-Mails on Smartphones? Schiller, Katharina; Adamsky, Florian, 2021: 11th International Workshop on Socio-Technical Aspects in Security affiliated with the 26th European Symposium on Research in Computer Security (ESORICS 2021). [pdf] [bibtex] (STAST)
Press: campuls.hof-university.de
NDSS
Poster: Evaluating Cascading-VPN Performance: Pahl, Sebastian; Adamsky, Florian; Kaiser, Daniel; Engel, Thomas, 2021: The Network and Distributed System Security Symposium. [pdf] (NDSS)
ICCNS
Locust: Highly Concurrent DHT Experimentation Framework for Security Evaluations: Adamsky, Florian; Kaiser, Daniel; Steglich, Michael; Engel, Thomas, 2020: 10th International Conference on Communication and Network Security, Tokyo, Japan. (ICCNS)
APF
Tracking without Traces—Fingerprinting in an Era of Individualism and Complexity: Adamsky, Florian; Schiffner, Stefan; Engel, Thomas, 2020: Annual Privacy Forum 2020 (acceptance rate of 20 %), Lisbon. (APF)
IEEE NoF
Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection: Rinaldi, Giulia; Adamsky, Florian; Soua, Ridha; Baiocchi, Andrea; Engel, Thomas, 2019 [pdf] (IEEE NoF)
IEEE VTC
Experimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks: Turcanu, Ion; Adamsky, Florian; Engel, Thomas, 2019 (IEEE VTC)
EAI SESA
Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems: Perez, R., Adamsky F., Soua R., and Engel T.: EAI Endorsed Transactions on Security and Safety, 2019 [pdf] [bibtex] (EAI SESA)
ACM WiSec
Poster: WLAN Device Fingerprinting using Channel State Information (CSI): Adamsky F., Retunskaia T., Schiffner S., and Engel T.: In 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018 [pdf] (Best Poster Award) (ACM WiSec)
IEEE VNC
Poster: Performance Evaluation of an Open-Source AVB/TSN Testbed for Automotive Ethernet: Xu A., Adamsky F., Turcanu I., Soua R., Köbel C., Engel T., and Baiocchi A.: In IEEE Vehicular Networking Conference, 2018 (IEEE VNC)
IEEE TrustCom
Machine Learning for Reliable Network Attack Detection in SCADA Systems: Perez, R., Adamsky F., Soua R., and Engel T.: In 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, 2018 (IEEE TrustCom)
IEEE GlobeCom
Multi-Access Edge Computing for Vehicular Networks: a Position Paper: Soua R., Turcanu I., Adamsky F., Führer D., and Engel T.: In IEEE GLOBECOM 2018 Workshops: Vehicular Networking and Intelligent Transportation Systems, 2018 (IEEE GlobeCom)
Elsevier IJCI
Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach: Adamsky F., Aubigny M., Battisti F., Carli M., Cimorelli F., Cruz T., Giorgio A., Foglietta C., Galli A., Giuseppi A., Liberati F., Neri A., Panzieri S., Pascucci F., Proença J., Pucci P., Rosa L., Soua R.: In Elsevier International Journal of Critical Infrastructure, 2018 (Elsevier IJCI)
Usenix WOOT
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks: Adamsky F.; Khayam S.; Jäger. R. Rajarajan, M.: In 9th USENIX Workshop on Offensive Technologies (WOOT '15), Washington, D.C., USA (acceptance rate of 35 %) [pdf] [slides] [bibtex] (Usenix WOOT)
Press: torrentfreak.com, arstechnica, ZDNet, Heise Security, Golem, Softpedia, IBN Live, digital journal, techworm, BitTorrent's Engineering Blog
Elsevier ComSec
Stealing Bandwidth from BitTorrent Seeders: Adamsky F.; Khayam S.; Jäger. R. Rajarajan, M.: In Elsevier Journal Computers & Security [pdf] [Link] (Elsevier ComSec)
Press: torrentfreak.com, International Business Times
IEEE EUC
Who is going to be the next BitTorrent Peer Idol?: Adamsky F.; Khayam S.; Jäger. R. Rajarajan, M.: In 12th IEEE International Conference on Embedded and Ubiquitous Computing, Milan, Italy. [pdf] [poster] (IEEE EUC)
IEEE CyberC
Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver: Adamsky F.; Khayam S.; Jäger. R. Rajarajan, M.: In CyberC 2012, China (acceptance rate of 27 %) [pdf] [slides] (IEEE CyberC)
ACM CCS
POSTER: Destabilizing BitTorrent's Clusters to Attack High Bandwidth Leechers: Adamsky F.; Khan H.; Rajarajan, M.; Khayam S.; Jäger. R.: In 18th ACM Conference on Computer and Communications Security, USA [pdf] [poster] (ACM CCS)
IEEE ICCE
A Novel Concept for Hybrid Quality Improvements in Consumer Networks: Adamsky, F.; Köhnen, C.; Überall, C.; Rakocevic, V.; Rajarajan, M.; Jäger, R.: In ICCE 2011 Berlin, 09 2011 [pdf] [slides] [bibtex] (IEEE ICCE)
IEEE ICCCN
Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs: Köhnen, C.; Überall, C.; Adamsky, F.; Rakocevic, V.; Rajarajan, M.; Jäger, R.: In ICCCN 2010 NAPET. Zurich, Switzerland, 8 2010 [pdf] [bibtex] (IEEE ICCCN)

Final Papers

Doctor of Philosophy (Ph.D.)

Ph.D.
Analysis of Bandwidth Attacks in a Bittorrent Swarm: Adamsky F.; PhD Thesis in Information Engineering from the City University London, August 2016 [pdf]; Supervisors: Dr. M. Rajarajan and Dr. Syed Ali Khayam

Bachelor of Science (B. Sc.)

B.Sc.
Statistische Analyse zur Identifizierung und Klassifizierung von Protokollen in IP-Strömen, Bachelorthesis from Technische Hochschule Mittelhessen (THM), University of Applied Sciences, June 2010 [pdf] [bibtex]