Publications
On Security Research towards Future Mobile Network Generations
2017 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
arXiv:1710.08932, November 2017 [arXiv] [PDF]Opinion: Advancing Attacker Models of Satellite-based Localization Systems—The Case of Multi-device Attackers
2017 - Kai Jansen, Christina Pöpper
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC) 2017 [PDF]POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System
2017 - Kai Jansen, Matthias Schäfer, Vincent Lenders, Christina Pöpper, Jens Schmitt
ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF]POSTER: Traffic Analysis Attacks in Anonymity Networks
2017 - Katharina Kohls, Christina Pöpper
ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF]Multi-Receiver GPS Spoofing Detection: Error Models and Realization
2016 - Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016 [PDF]Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness
2016 - David Rupprecht, Kai Jansen, Christina Pöpper
USENIX Workshop on Offensive Technologies (WOOT), 2016 [PDF]SkypeLine: Robust Hidden Data Transmission for VoIP
2016 - Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), Xi'an, May 2016 [PDF]Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
2016 - Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper
In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2016 *** OUTSTANDING PAPER AWARD *** [PDF]Technical Report: SkypeLine Robust Hidden Data Transmission for VoIP
2016 - Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
TR-HGI-2016-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), February 2016 [PDF]A Practical Investigation of Identity Theft Vulnerabilities in Eduroam
2015 - Sebastian Brenza, Andre Pawlowski, Christina Pöpper
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015 [Project Webpage] [PDF]