Marcell Szakaly : Publications
-
[1]
Short: PIBuster: Exploiting a Common Misconfiguration in CCS EV Chargers
Marcell Szakály‚ Sebastian Köhler and Ivan Martinovic
In 3rd USENIX Symposium on Vehicle Security and Privacy (VehicleSec '25). 2025.
Details about Short: PIBuster: Exploiting a Common Misconfiguration in CCS EV Chargers | BibTeX data for Short: PIBuster: Exploiting a Common Misconfiguration in CCS EV Chargers
-
[2]
Current Affairs: A Security Measurement Study of CCS EV Charging Deployments
Marcell Szakály‚ Sebastian Köhler and Ivan Martinovic
In 34th USENIX Security Symposium. 2025.
Details about Current Affairs: A Security Measurement Study of CCS EV Charging Deployments | BibTeX data for Current Affairs: A Security Measurement Study of CCS EV Charging Deployments
-
[3]
Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks
Marcell Szakály‚ Sebastian Köhler‚ Martin Strohmeier and Ivan Martinovic
In 2024 Annual Computer Security Applications Conference (ACSAC). Pages 224−239. 2024.
Details about Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks | BibTeX data for Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks | DOI (10.1109/ACSAC63791.2024.00033)
-
[4]
Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks
Edd Salkield‚ Marcell Szakály‚ Joshua Smailes‚ Simon Birnbach‚ Sebastian Köhler‚ Martin Strohmeier and Ivan Martinovic
In Proceedings of the 16th Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). May, 2023.
Best Paper Award: Runner Up!
Details about Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | BibTeX data for Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | Download (pdf) of Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks | Link to Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks