Publications
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents
2021 - Christine Utz, Steffen Becker, Theodor Schnitzler, Florian Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth
ACM CHI Conference on Human Factors in Computing Systems 2021 [arXiv Preprint]We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor
2021 - Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls
IEEE European Symposium on Security and Privacy (EuroS&P '21). Virtual Conference, September 6-10, 2021 [Paper]SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data
2021 - Theodor Schnitzler, Shujaat Mirza, Markus Dürmuth, Christina Pöpper
Proceedings of Privacy Enhancing Technologies 2021, Volume 1, pp. 229-249, November 9, 2020 [PDF] [DOI]Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
2020 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
USENIX Security Symposium, Boston, MA, USA, August 2020 [Website] [PDF]Akzeptanz von Corona-Apps in Deutschland vor der Einführung der Corona-Warn-App
2020 - Steffen Becker, Martin Degeling, Markus Dürmuth, Florian Farke, Leonie Schaewitz, Theodor Schnitzler, Christine Utz
Vorabveröffentlichung (Preprint), Juni 2020 [PDF (Deutsch)]“You still use the password after all” – Exploring FIDO2 Security Keys in a Small Company
2020 - Florian Farke, Lennart Lorenz, Theodor Schnitzler, Philipp Markert, Markus Dürmuth
Symposium on Usable Privacy and Security (SOUPS '20). Virtual Conference, August 7-11, 2020 [Video] [PDF] [Slides]IMP4GT: IMPersonation Attacks in 4G NeTworks
2020 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 2020 [PDF]Exploring User Perceptions of Deletion in Mobile Instant Messaging Applications
2020 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth
Journal of Cybersecurity, Volume 6, Issue 1, January 30, 2020 [DOI]Towards Contractual Agreements for Revocation of Online Data
2019 - Theodor Schnitzler, Markus Dürmuth, Christina Pöpper
IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC '19), Lisbon, Portugal, June 25-27, 2019 [PDF]Breaking LTE on Layer Two
2019 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
IEEE Symposium on Security & Privacy (Oakland), May 2019 [Website] [PDF]POSTER: Application-Layer Routing Attacks on Tor
2019 - Katharina Kohls, Christina Pöpper
IEEE Symposium on Security & Privacy (Oakland), May 2019 [Proposal] [Poster]Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two
2019 - Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA, ACM [PDF]LTE Security Disabled — Misconfiguration in Commercial Networks
2019 - Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA, ACM [PDF]Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
2019 - Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa
Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [Demo] [PDF]On the Challenges of Geographical Avoidance for Tor
2019 - Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper
Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [PDF] [Slides]POSTER: User Perception and Expectations on Deleting Instant Messages -or- "What Happens If I Press This Button?"
2018 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth
USENIX Symposium on Usable Privacy and Security 2018 (SOUPS '18). Baltimore, MD, USA, August 12-14, 2018"Will Any Password Do?" Exploring Rate-Limiting on the Web
2018 - Maximilian Golla, Theodor Schnitzler, Markus Dürmuth
Who Are You?! Adventures in Authentication 2018 (WAY '18). Baltimore, MD, USA, August 12, 2018 [PDF] [Slides]DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
2018 - Katharina Kohls, Christina Pöpper
European Symposium on Research in Computer Security 2018 (ESORICS '18), Barcelona, Spain, September, 2018 [Website] [PDF] [Slides]Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
2018 - Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens Schmitt
IEEE Symposium on Security and Privacy (SP) 2018 [PDF]On Security Research Towards Future Mobile Network Generations
2018 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
IEEE Communications Surveys and Tutorials, Volume: 20, Issue:3, 2018 [arXiv] [IEEE Xplore]