Skip to main content

Showing 1–27 of 27 results for author: Classen, J

.
  1. arXiv:2404.19464  [pdf, other

    physics.plasm-ph

    Effect of detachment on Magnum-PSI ELM-like pulses: I. Direct observations and qualitative results

    Authors: Fabio Federici, Bruce Lipschultz, Gijs R. A. Akkermans, Kevin Verhaegh, Matthew L. Reinke, Ivo G. J. Classen, Magnum-PSI Team

    Abstract: Conditions similar to those at the end of the divertor leg in a tokamak were replicated in the linear plasma machine Magnum-PSI. The neutral pressure in the target chamber is then increased to cause the target to transition from an attached to a detached state. Superimposed to this steady state regime, ELM-like pulses are reproduced, resulting in a sudden increase in plasma temperature and density… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: 16 pages, 17 figures, Submitted to Nuclear Fusion

  2. arXiv:2312.16356  [pdf, other

    physics.plasm-ph

    Effect of detachment on Magnum-PSI ELM-like pulses: II. Spectroscopic analysis and role of molecular assisted reactions

    Authors: Fabio Federici, Bruce Lipschultz, Gijs R. A. Akkermans, Kevin Verhaegh, Matthew L. Reinke, Ray Chandra, Chris Bowman, Ivo G. J. Classen, the Magnum-PSI Team

    Abstract: The linear plasma machine Magnum-PSI can replicate similar conditions to those found in a tokamak at the end of the divertor leg. A dedicated capacitor bank, in parallel to the plasma source, can release a sudden burst of energy, leading to a rapid increase in plasma temperature and density, resulting in a transient heat flux increase of half of an order of magnitude, a so called ELM-like pulse. T… ▽ More

    Submitted 26 December, 2023; originally announced December 2023.

    Comments: 25 pages, 22 figures. To be published in Nuclear Fusion. This paper is the second related to a single experimental session, the first is: "Effect of detachment on Magnum-PSI ELM-like pulses: I. Direct observations and qualitative results", to be published in Nuclear Fusion

  3. arXiv:2308.07778  [pdf, other

    eess.IV cs.CV

    An Interpretable Machine Learning Model with Deep Learning-based Imaging Biomarkers for Diagnosis of Alzheimer's Disease

    Authors: Wenjie Kang, Bo Li, Janne M. Papma, Lize C. Jiskoot, Peter Paul De Deyn, Geert Jan Biessels, Jurgen A. H. R. Claassen, Huub A. M. Middelkoop, Wiesje M. van der Flier, Inez H. G. B. Ramakers, Stefan Klein, Esther E. Bron

    Abstract: Machine learning methods have shown large potential for the automatic early diagnosis of Alzheimer's Disease (AD). However, some machine learning methods based on imaging data have poor interpretability because it is usually unclear how they make their decisions. Explainable Boosting Machines (EBMs) are interpretable machine learning models based on the statistical framework of generalized additiv… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

    Comments: 11 pages, 5 figures

  4. arXiv:2305.06513  [pdf, other

    stat.AP q-bio.QM

    Interpretable Forecasting of Physiology in the ICU Using Constrained Data Assimilation and Electronic Health Record Data

    Authors: David Albers, Melike Sirlanci, Matthew Levine, Jan Claassen, Caroline Der Nigoghossian, George Hripcsak

    Abstract: Prediction of physiologic states are important in medical practice because interventions are guided by predicted impacts of interventions. But prediction is difficult in medicine because the generating system is complex and difficult to understand from data alone, and the data are sparse relative to the complexity of the generating processes due to human costs of data collection. Computational mac… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  5. Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

    Authors: Jiska Classen, Alexander Heinrich, Robert Reith, Matthias Hollick

    Abstract: When an iPhone is turned off, most wireless chips stay on. For instance, upon user-initiated shutdown, the iPhone remains locatable via the Find My network. If the battery runs low, the iPhone shuts down automatically and enters a power reserve mode. Yet, users can still access credit cards, student passes, and other items in their Wallet. We analyze how Apple implements these standalone wireless… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Journal ref: WiSec 2022: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  6. arXiv:2202.05573  [pdf, other

    cs.CR

    Very Pwnable Network: Cisco AnyConnect Security Analysis

    Authors: Gerbert Roitburd, Matthias Ortmann, Matthias Hollick, Jiska Classen

    Abstract: Corporate Virtual Private Networks (VPNs) enable users to work from home or while traveling. At the same time, VPNs are tied to a company's network infrastructure, forcing users to install proprietary clients for network compatibility reasons. VPN clients run with high privileges to encrypt and reroute network traffic. Thus, bugs in VPN clients pose a substantial risk to their users and in turn th… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

    Journal ref: IEEE Conference on Communications and Network Security 2021

  7. arXiv:2112.05719  [pdf, other

    cs.CR cs.AR

    Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation

    Authors: Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick

    Abstract: Modern mobile devices feature multiple wireless technologies, such as Bluetooth, Wi-Fi, and LTE. Each of them is implemented within a separate wireless chip, sometimes packaged as combo chips. However, these chips share components and resources, such as the same antenna or wireless spectrum. Wireless coexistence interfaces enable them to schedule packets without collisions despite shared resources… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

  8. arXiv:2111.05313  [pdf, other

    cs.CR

    Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging

    Authors: Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen

    Abstract: We present the first over-the-air attack on IEEE 802.15.4z High-Rate Pulse Repetition Frequency (HRP) Ultra-WideBand (UWB) distance measurement systems. Specifically, we demonstrate a practical distance reduction attack against pairs of Apple U1 chips (embedded in iPhones and AirTags), as well as against U1 chips inter-operating with NXP and Qorvo UWB chips. These chips have been deployed in a wid… ▽ More

    Submitted 9 November, 2021; originally announced November 2021.

  9. Happy MitM: Fun and Toys in Every Bluetooth Device

    Authors: Jiska Classen, Matthias Hollick

    Abstract: Bluetooth pairing establishes trust on first use between two devices by creating a shared key. Similar to certificate warnings in TLS, the Bluetooth specification requires warning users upon issues with this key, because this can indicate ongoing Machine-in-the-Middle (MitM) attacks. This paper uncovers that none of the major Bluetooth stacks warns users, which violates the specification. Clear wa… ▽ More

    Submitted 16 August, 2021; originally announced August 2021.

    Journal ref: WiSec 2021: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  10. arXiv:2012.08769  [pdf, other

    eess.IV cs.CV physics.med-ph

    Cross-Cohort Generalizability of Deep and Conventional Machine Learning for MRI-based Diagnosis and Prediction of Alzheimer's Disease

    Authors: Esther E. Bron, Stefan Klein, Janne M. Papma, Lize C. Jiskoot, Vikram Venkatraghavan, Jara Linders, Pauline Aalten, Peter Paul De Deyn, Geert Jan Biessels, Jurgen A. H. R. Claassen, Huub A. M. Middelkoop, Marion Smits, Wiro J. Niessen, John C. van Swieten, Wiesje M. van der Flier, Inez H. G. B. Ramakers, Aad van der Lugt

    Abstract: This work validates the generalizability of MRI-based classification of Alzheimer's disease (AD) patients and controls (CN) to an external data set and to the task of prediction of conversion to AD in individuals with mild cognitive impairment (MCI). We used a conventional support vector machine (SVM) and a deep convolutional neural network (CNN) approach based on structural MRI scans that underwe… ▽ More

    Submitted 26 May, 2021; v1 submitted 16 December, 2020; originally announced December 2020.

  11. arXiv:2011.00077  [pdf, ps, other

    physics.plasm-ph

    Tomographic reconstruction of the runaway distribution function in TCV using multispectral synchrotron images

    Authors: T. A. Wijkamp, A. Perek, J. Decker, B. Duval, M. Hoppe, G. Papp, U. A. Sheikh, I. G. J. Classen, R. J. E. Jaspers, the TCV team, the EUROfusion MST1 team

    Abstract: Synchrotron radiation observed in a quiescent TCV runaway discharge is studied using filtered camera images targeting three distinct wavelength intervals. Through the tomographic SART procedure the high momentum, high pitch angle part of the spatial and momentum distribution of these relativistic particles is reconstructed. Experimental estimates of the distribution are important for verification… ▽ More

    Submitted 5 February, 2021; v1 submitted 30 October, 2020; originally announced November 2020.

    Comments: 18 pages, 13 figures, submitted to Nuclear Fusion

  12. arXiv:2006.16921  [pdf, other

    cs.CR cs.AR cs.NI

    Firmware Insider: Bluetooth Randomness is Mostly Random

    Authors: Jörn Tillmanns, Jiska Classen, Felix Rohrbach, Matthias Hollick

    Abstract: Bluetooth chips must include a Random Number Generator (RNG). This RNG is used internally within cryptographic primitives but also exposed to the operating system for chip-external applications. In general, it is a black box with security-critical authentication and encryption mechanisms depending on it. In this paper, we evaluate the quality of RNGs in various Broadcom and Cypress Bluetooth chips… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

    Comments: WOOT'20

  13. arXiv:2006.09809  [pdf, other

    cs.CR cs.NI

    Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets

    Authors: Jan Ruge, Jiska Classen, Francesco Gringoli, Matthias Hollick

    Abstract: Wireless communication standards and implementations have a troubled history regarding security. Since most implementations and firmwares are closed-source, fuzzing remains one of the main methods to uncover Remote Code Execution (RCE) vulnerabilities in deployed systems. Generic over-the-air fuzzing suffers from several shortcomings, such as constrained speed, limited repeatability, and restricte… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

    Comments: To be published at USENIX Security

  14. DEMO: Attaching InternalBlue to the Proprietary macOS IOBluetooth Framework

    Authors: Davide Toldo, Jiska Classen, Matthias Hollick

    Abstract: In this demo, we provide an overview of the macOS Bluetooth stack internals and gain access to undocumented low-level interfaces. We leverage this knowledge to add macOS support to the InternalBlue firmware modification and wireless experimentation framework.

    Submitted 29 May, 2020; originally announced May 2020.

    Comments: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  15. DEMO: Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips

    Authors: Jiska Classen, Matthias Hollick

    Abstract: Multiple initiatives propose utilizing Bluetooth Low Energy (BLE) advertisements for contact tracing and SARS-CoV-2 exposure notifications. This demo shows a research tool to analyze BLE advertisements; if universally enabled by the vendors, the uncovered features could improve exposure notifications for everyone. We reverse-engineer the firmware-internal implementation of BLE advertisements on Br… ▽ More

    Submitted 29 May, 2020; originally announced May 2020.

    Comments: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  16. arXiv:2005.08572  [pdf, other

    cs.CR cs.NI cs.SD eess.AS

    Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication

    Authors: Florentin Putz, Flor Álvarez, Jiska Classen

    Abstract: Secure Device Pairing (SDP) relies on an out-of-band channel to authenticate devices. This requires a common hardware interface, which limits the use of existing SDP systems. We propose to use short-range acoustic communication for the initial pairing. Audio hardware is commonly available on existing off-the-shelf devices and can be accessed from user space without requiring firmware or hardware m… ▽ More

    Submitted 10 August, 2020; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: 11 pages, 11 figures. Published at ACM WiSec 2020 (13th ACM Conference on Security and Privacy in Wireless and Mobile Networks). Updated references

    Journal ref: WiSec 2020: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks

  17. Lost and Found: Stop** Bluetooth Finders from Leaking Private Information

    Authors: Mira Weller, Jiska Classen, Fabian Ullrich, Denis Waßmann, Erik Tews

    Abstract: A Bluetooth finder is a small battery-powered device that can be attached to important items such as bags, keychains, or bikes. The finder maintains a Bluetooth connection with the user's phone, and the user is notified immediately on connection loss. We provide the first comprehensive security and privacy analysis of current commercial Bluetooth finders. Our analysis reveals several significant s… ▽ More

    Submitted 17 May, 2020; originally announced May 2020.

    Comments: WiSec '20

  18. MagicPairing: Apple's Take on Securing Bluetooth Peripherals

    Authors: Dennis Heinze, Jiska Classen, Felix Rohrbach

    Abstract: Device pairing in large Internet of Things (IoT) deployments is a challenge for device manufacturers and users. Bluetooth offers a comparably smooth trust on first use pairing experience. Bluetooth, though, is well-known for security flaws in the pairing process. In this paper, we analyze how Apple improves the security of Bluetooth pairing while still maintaining its usability and specification c… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

  19. Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices

    Authors: Jiska Classen, Matthias Hollick

    Abstract: Bluetooth is among the dominant standards for wireless short-range communication with multi-billion Bluetooth devices shipped each year. Basic Bluetooth analysis inside consumer hardware such as smartphones can be accomplished observing the Host Controller Interface (HCI) between the operating system's driver and the Bluetooth chip. However, the HCI does not provide insights to tasks running insid… ▽ More

    Submitted 2 May, 2019; originally announced May 2019.

  20. InternalBlue - Bluetooth Binary Patching and Experimentation Framework

    Authors: Dennis Mantz, Jiska Classen, Matthias Schulz, Matthias Hollick

    Abstract: Bluetooth is one of the most established technologies for short range digital wireless data transmission. With the advent of wearables and the Internet of Things (IoT), Bluetooth has again gained importance, which makes security research and protocol optimizations imperative. Surprisingly, there is a lack of openly available tools and experimental platforms to scrutinize Bluetooth. In particular,… ▽ More

    Submitted 2 May, 2019; originally announced May 2019.

  21. arXiv:1706.09165  [pdf, other

    cs.CR

    Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit

    Authors: Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti

    Abstract: Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect information about their exercising patterns. Smartphones push this health-related data to vendors' cloud platforms, enabling users to analyze summary statistics on-line and adjust their habits. Third-parties including health insurance providers now offer discounts and financial rewards in exchange f… ▽ More

    Submitted 28 June, 2017; originally announced June 2017.

  22. arXiv:1505.01081  [pdf, other

    cs.NI

    Practical Covert Channels for WiFi Systems

    Authors: Jiska Classen, Matthias Schulz, Matthias Hollick

    Abstract: Wireless covert channels promise to exfiltrate information with high bandwidth by circumventing traditional access control mechanisms. Ideally, they are only accessible by the intended recipient and---for regular system users/operators---indistinguishable from normal operation. While a number of theoretical and simulation studies exist in literature, the practical aspects of WiFi covert channels a… ▽ More

    Submitted 5 May, 2015; originally announced May 2015.

    Comments: Submitted to CNS 2015

  23. Energetic particle instabilities in fusion plasmas

    Authors: S E Sharapov, B Alper, H L Berk, D N Borba, B N Breizman, C D Challis, I G J Classen, E M Edlund, J Eriksson, A Fasoli, E D Fredrickson, G Y Fu, M Garcia-Munoz, T Gassner, K Ghantous, V Goloborodko, N N Gorelenkov, M P Gryaznevich, S Hacquin, W W Heidbrink, C Hellesen, V G Kiptily, G J Kramer, P Lauber, M K Lilley , et al. (19 additional authors not shown)

    Abstract: Remarkable progress has been made in diagnosing energetic particle instabilities on present-day machines and in establishing a theoretical framework for describing them. This overview describes the much improved diagnostics of Alfven instabilities and modelling tools developed world-wide, and discusses progress in interpreting the observed phenomena. A multi-machine comparison is presented giving… ▽ More

    Submitted 31 October, 2013; originally announced October 2013.

    Comments: 37 pages, 20 figures

    Journal ref: Nuclear Fusion, Vol.53, No.10, October 2013, p.104022

  24. arXiv:1305.7271  [pdf, other

    q-bio.NC

    A methodology for detecting and exploring non-convulsive seizures in patients with SAH

    Authors: D J Albers, J Claassen, M J Schmidt, G Hripcsak

    Abstract: A methodology for understanding and de- tecting nonconvulsive seizures in individuals with sub- arachnoid hemorrhage is introduced. Specifically, begin- ning with an EEG signal, the power spectrum is esti- mated yielding a multivariate time series which is then ana- lyzed using empirical orthogonal functional analysis. This methodology allows for easy identification and observation of seizures tha… ▽ More

    Submitted 30 May, 2013; originally announced May 2013.

    Comments: Submitted to NOLTA 2013

  25. ac Losses in a Finite Z Stack Using an Anisotropic Homogeneous-Medium Approximation

    Authors: John R Clem, J. H. Claassen, Yasunori Mawatari

    Abstract: A finite stack of thin superconducting tapes, all carrying a fixed current I, can be approximated by an anisotropic superconducting bar with critical current density Jc=Ic/2aD, where Ic is the critical current of each tape, 2a is the tape width, and D is the tape-to-tape periodicity. The current density J must obey the constraint \int J dx = I/D, where the tapes lie parallel to the x axis and ar… ▽ More

    Submitted 29 August, 2007; originally announced August 2007.

    Comments: 21 pages, 17 figures, accepted by Supercond. Sci. Technol

    Journal ref: Supercond. Sci. Technol. 20, 1130-1139 (2007)

  26. arXiv:cond-mat/0509313  [pdf

    cond-mat.supr-con

    Evidence for High-Temperature Superconductivity in Doped Laser-Processed Sr-Ru-O

    Authors: A. M. Gulian, K. S. Wood, D. Van Vechten, J. Claassen, R. J. Soulen, Jr., S. Qadri, M. Osofsky, A. Lucarelli, G. Luepke, G. R. Badalyan, V. S. Kuzanyan, A. S. Kuzanyan, V. R. Nikoghosyan

    Abstract: We have discovered that samples of a new material produced by special processing of crystals of Sr2RuO4 (which is known to be a triplet superconductor with Tc values ~1.0-1.5K) exhibit signatures of superconductivity (zero DC resistance and expulsion of magnetic flux) at temperatures exceeding 200K. The special processing includes deposition of a silver coating and laser micromachining; Ag dopin… ▽ More

    Submitted 12 September, 2005; originally announced September 2005.

  27. Effects of the Two- Gap Nature on the Microwave Conductivity of 39 K Polycrystalline MgB2 Films

    Authors: Sang Young Lee, J. H. Lee, Jung Hoon Han, S. H. Moon, H. N. Lee, James C. Booth, J. H. Claassen

    Abstract: The surface resistance (Rs) and the real part (sigma_1) of the microwave complex conductivity of a ~380 nm-thick polycrystalline MgB2 film with the critical temperature (Tc) of 39.3 K were investigated at ~8.5 GHz as a function of temperature. Two coherence peaks were observed in the sigma_1 versus temperature curve at temperatures of ~0.5 Tc and ~0.9 Tc, respectively, providing a direct evidenc… ▽ More

    Submitted 27 March, 2004; originally announced March 2004.

    Comments: 8 pages, 9 figures (cond-mat/0403644 is replaced by this version)