Research
I'm a full professor for IT security at the Hof University of Applied Sciences. My research focus is on system security, peer-to-peer networks, network security, and privacy.
Security Vulnerabilites
- CVSS v3: 9.8
-
CVE-2018-8865 — In Lantech IDS 2102 2.0 and prior, a stack-based buffer overflow vulnerability has been identified which may allow remote code execution. (CVSS v3: 9.8)Press: securityweek.com
- CVSS v3: 9.8
-
CVE-2018-8869 — Several cross-site scripting vulnerabilites on Lantech IDS 2102. (CVSS v3: 9.8)
- CVSS v3: 7.5
-
CVE-2017-16719 — TCP Initial Sequence Number (ISN) prediction on Moxa NPort 5110/5130 devices. (CVSS v3: 7.5)Press: securityweek.com
- CVSS v3: 7.5
-
CVE-2017-16715 — Exposing kernel memory by using uninitialized memory for padding (Etherleaking) on Moxa NPort 5110/5130 devices. (CVSS v3: 7.5)
- CVSS v3: 7.5
-
CVE-2017-14028 — TCP SYN flooding on Moxa NPort 5110/5130 devices. (CVSS v3: 7.5)
- CVSS v3: 9.8
-
CVE-2018-8865 — In Lantech IDS 2102 2.0 and prior, a stack-based buffer overflow vulnerability has been identified which may allow remote code execution.Press: securityweek.com
Peer-Reviewed Scientific Publications
- ACM CCS
-
Employees' Attitude towards Phishing Simulations: "It's like when a child reaches onto the hot hob: Schiller, Katharina; Adamsky, Florian, Eichenmüller, Christian; Reimert, Matthias; Benenson, Zinaida; 2024 ACM Conference on Computer and Communications Security (CCS), Salt Lake City (acceptance rate of 16.9 %) [pdf] [extended version] (CCS)
- WPES
-
OnionVPN: Onion Routing-Based VPN-Tunnels with Onion Services: Pahl, Sebastian; Kaiser, Daniel; Engel, Thomas; Adamsky, Florian, 2024: Workshop on Privacy in the Electronic Society (WPES), Salt Lake City [pdf] (WPES)
- DIMVA
-
Presshammer: Rowhammer and Rowpress without Physical Address Information: Juffinger, J.; Sudheendra , R.; Heckel, M.; Schwarz, L.; Adamsky, Florian; Gruss, D., 2024: 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Lausanne (acceptance rate of 23.9 %) [pdf] (DIMVA)
- TRUSTbus
-
Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App: Graßhoff, Hendrik; Adamsky, Florian; Schiffner, Stefan; 2023: TRUSTbus at ARES 2023 (20th International Workshop on Trust, Privacy and Security in the Digital Society) [pdf] (TRUSTbus)
- DRAMSec
-
Reverse-Engineering Bank Addressing Functions on AMD CPUs: Heckel, Martin; Adamsky, Florian, 2023: The 3rd Workshop on DRAM Security (DRAMSec 2023), co-located with ISCA 2023 [pdf] (DRAMSec)
- ACM CHI
-
Towards an Empirical Study to determine the Effectiveness of Support Systems against E-Mail Phishing Attacks: Schiller, Katharina; Adamsky, Florian, Benenson, Zinaida, 2023: The ACM CHI Conference on Human Factors in Computing Systems [pdf] (ACM CHI)
- PETS
-
Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance: Pahl, Sebastian; Adamsky, Florian, Kaiser, Daniel; Engel, Thomas, 2023: 23rd Privacy Enhancing Technologies Symposium, Lausanne, (acceptance rate of 22 %) [pdf] (PETS)
- STAST
-
Work in Progress: Can Johnny Encrypt E-Mails on Smartphones? Schiller, Katharina; Adamsky, Florian, 2021: 11th International Workshop on Socio-Technical Aspects in Security affiliated with the 26th European Symposium on Research in Computer Security (ESORICS 2021). [pdf] [bibtex] (STAST)Press: campuls.hof-university.de
- NDSS
-
Poster: Evaluating Cascading-VPN Performance: Pahl, Sebastian; Adamsky, Florian; Kaiser, Daniel; Engel, Thomas, 2021: The Network and Distributed System Security Symposium. [pdf] (NDSS)
- ICCNS
-
Locust: Highly Concurrent DHT Experimentation Framework for Security Evaluations: Adamsky, Florian; Kaiser, Daniel; Steglich, Michael; Engel, Thomas, 2020: 10th International Conference on Communication and Network Security, Tokyo, Japan. (ICCNS)
- APF
-
Tracking without Traces—Fingerprinting in an Era of Individualism and Complexity: Adamsky, Florian; Schiffner, Stefan; Engel, Thomas, 2020: Annual Privacy Forum 2020 (acceptance rate of 20 %), Lisbon. (APF)
- IEEE NoF
-
Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection: Rinaldi, Giulia; Adamsky, Florian; Soua, Ridha; Baiocchi, Andrea; Engel, Thomas, 2019 [pdf] (IEEE NoF)
- IEEE VTC
-
Experimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks: Turcanu, Ion; Adamsky, Florian; Engel, Thomas, 2019 (IEEE VTC)
- EAI SESA
- ACM WiSec
-
Poster: WLAN Device Fingerprinting using Channel State Information (CSI): Adamsky F., Retunskaia T., Schiffner S., and Engel T.: In 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2018 [pdf] (Best Poster Award) (ACM WiSec)
- IEEE VNC
-
Poster: Performance Evaluation of an Open-Source AVB/TSN Testbed for Automotive Ethernet: Xu A., Adamsky F., Turcanu I., Soua R., Köbel C., Engel T., and Baiocchi A.: In IEEE Vehicular Networking Conference, 2018 (IEEE VNC)
- IEEE TrustCom
-
Machine Learning for Reliable Network Attack Detection in SCADA Systems: Perez, R., Adamsky F., Soua R., and Engel T.: In 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, 2018 (IEEE TrustCom)
- IEEE GlobeCom
-
Multi-Access Edge Computing for Vehicular Networks: a Position Paper: Soua R., Turcanu I., Adamsky F., Führer D., and Engel T.: In IEEE GLOBECOM 2018 Workshops: Vehicular Networking and Intelligent Transportation Systems, 2018 (IEEE GlobeCom)
- Elsevier IJCI
-
Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach: Adamsky F., Aubigny M., Battisti F., Carli M., Cimorelli F., Cruz T., Giorgio A., Foglietta C., Galli A., Giuseppi A., Liberati F., Neri A., Panzieri S., Pascucci F., Proença J., Pucci P., Rosa L., Soua R.: In Elsevier International Journal of Critical Infrastructure, 2018 (Elsevier IJCI)
- Usenix WOOT
-
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks: Adamsky F.; Khayam S.; Jäger. R. Rajarajan, M.: In 9th USENIX Workshop on Offensive Technologies (WOOT '15), Washington, D.C., USA (acceptance rate of 35 %) [pdf] [slides] [bibtex] (Usenix WOOT)Press: torrentfreak.com, arstechnica, ZDNet, Heise Security, Golem, Softpedia, IBN Live, digital journal, techworm, BitTorrent's Engineering Blog
- Elsevier ComSec
-
Stealing Bandwidth from BitTorrent Seeders: Adamsky F.; Khayam S.; Jäger. R. Rajarajan, M.: In Elsevier Journal Computers & Security [pdf] [Link] (Elsevier ComSec)Press: torrentfreak.com, International Business Times
- IEEE EUC
- IEEE CyberC
- ACM CCS
- IEEE ICCE
- IEEE ICCCN
Final Papers
Doctor of Philosophy (Ph.D.)
- Ph.D.
-
Analysis of Bandwidth Attacks in a Bittorrent Swarm: Adamsky F.; PhD Thesis in Information Engineering from the City University London, August 2016 [pdf]; Supervisors: Dr. M. Rajarajan and Dr. Syed Ali Khayam
Bachelor of Science (B. Sc.)
- B.Sc.