Publications
Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents
2021 - Christine Utz, Steffen Becker, Theodor Schnitzler, Florian Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth
ACM CHI Conference on Human Factors in Computing Systems 2021 [arXiv Preprint]We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor
2021 - Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls
IEEE European Symposium on Security and Privacy (EuroS&P '21). Virtual Conference, September 6-10, 2021 [Paper]SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data
2021 - Theodor Schnitzler, Shujaat Mirza, Markus Dürmuth, Christina Pöpper
Proceedings of Privacy Enhancing Technologies 2021, Volume 1, pp. 229-249, November 9, 2020 [PDF] [DOI]Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
2020 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
USENIX Security Symposium, Boston, MA, USA, August 2020 [Website] [PDF]Akzeptanz von Corona-Apps in Deutschland vor der Einführung der Corona-Warn-App
2020 - Steffen Becker, Martin Degeling, Markus Dürmuth, Florian Farke, Leonie Schaewitz, Theodor Schnitzler, Christine Utz
Vorabveröffentlichung (Preprint), Juni 2020 [PDF (Deutsch)]“You still use the password after all” – Exploring FIDO2 Security Keys in a Small Company
2020 - Florian Farke, Lennart Lorenz, Theodor Schnitzler, Philipp Markert, Markus Dürmuth
Symposium on Usable Privacy and Security (SOUPS '20). Virtual Conference, August 7-11, 2020 [Video] [PDF] [Slides]IMP4GT: IMPersonation Attacks in 4G NeTworks
2020 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 2020 [PDF]Exploring User Perceptions of Deletion in Mobile Instant Messaging Applications
2020 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth
Journal of Cybersecurity, Volume 6, Issue 1, January 30, 2020 [DOI]Towards Contractual Agreements for Revocation of Online Data
2019 - Theodor Schnitzler, Markus Dürmuth, Christina Pöpper
IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC '19), Lisbon, Portugal, June 25-27, 2019 [PDF]Breaking LTE on Layer Two
2019 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
IEEE Symposium on Security & Privacy (Oakland), May 2019 [Website] [PDF]POSTER: Application-Layer Routing Attacks on Tor
2019 - Katharina Kohls, Christina Pöpper
IEEE Symposium on Security & Privacy (Oakland), May 2019 [Proposal] [Poster]Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two
2019 - Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA, ACM [PDF]LTE Security Disabled — Misconfiguration in Commercial Networks
2019 - Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA, ACM [PDF]Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
2019 - Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa
Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [Demo] [PDF]On the Challenges of Geographical Avoidance for Tor
2019 - Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper
Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [PDF] [Slides]POSTER: User Perception and Expectations on Deleting Instant Messages -or- "What Happens If I Press This Button?"
2018 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth
USENIX Symposium on Usable Privacy and Security 2018 (SOUPS '18). Baltimore, MD, USA, August 12-14, 2018"Will Any Password Do?" Exploring Rate-Limiting on the Web
2018 - Maximilian Golla, Theodor Schnitzler, Markus Dürmuth
Who Are You?! Adventures in Authentication 2018 (WAY '18). Baltimore, MD, USA, August 12, 2018 [PDF] [Slides]DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
2018 - Katharina Kohls, Christina Pöpper
European Symposium on Research in Computer Security 2018 (ESORICS '18), Barcelona, Spain, September, 2018 [Website] [PDF] [Slides]Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
2018 - Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens Schmitt
IEEE Symposium on Security and Privacy (SP) 2018 [PDF]On Security Research Towards Future Mobile Network Generations
2018 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
IEEE Communications Surveys and Tutorials, Volume: 20, Issue:3, 2018 [arXiv] [IEEE Xplore]User Perception and Expectations on Deleting Instant Messages -or- "What Happens If I Press This Button?"
2018 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth
European Workshop on Usable Security (EuroUSEC) 2018, London, England, 23 April 2018 [PDF] [Slides]On Security Research towards Future Mobile Network Generations
2017 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
arXiv:1710.08932, November 2017 [arXiv] [PDF]Opinion: Advancing Attacker Models of Satellite-based Localization Systems—The Case of Multi-device Attackers
2017 - Kai Jansen, Christina Pöpper
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC) 2017 [PDF]POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System
2017 - Kai Jansen, Matthias Schäfer, Vincent Lenders, Christina Pöpper, Jens Schmitt
ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF]POSTER: Traffic Analysis Attacks in Anonymity Networks
2017 - Katharina Kohls, Christina Pöpper
ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF]Multi-Receiver GPS Spoofing Detection: Error Models and Realization
2016 - Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016 [PDF]Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness
2016 - David Rupprecht, Kai Jansen, Christina Pöpper
USENIX Workshop on Offensive Technologies (WOOT), 2016 [PDF]SkypeLine: Robust Hidden Data Transmission for VoIP
2016 - Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), Xi'an, May 2016 [PDF]Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
2016 - Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper
In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2016 *** OUTSTANDING PAPER AWARD *** [PDF]Technical Report: SkypeLine Robust Hidden Data Transmission for VoIP
2016 - Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
TR-HGI-2016-001, Ruhr-Universität Bochum, Horst Görtz Institut für IT-Sicherheit (HGI), February 2016 [PDF]A Practical Investigation of Identity Theft Vulnerabilities in Eduroam
2015 - Sebastian Brenza, Andre Pawlowski, Christina Pöpper
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015 [Project Webpage] [PDF]Enabling Short Fragments for Uncoordinated Spread Spectrum Communication
2014 - Naveed Ahmed, Christina Pöpper, Srdjan Capkun
In Proceedings of 19th European Symposium on Research in Computer Security (ESORICS), 2014 [PDF]Zero-Communication Seed Establishment for Anti-Jamming Techniques
2014 - Kim Pecina, Esfandiar Mohammadi, Christina Pöpper
In NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014 [PDF]On the Requirements for Successful GPS Spoofing Attacks
2011 - Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011Investigation of Signal and Message Manipulations on the Wireless Channel
2011 - Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
In Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2011Keeping Data Secret under Full Compromise using Porter Devices
2010 - Christina Pöpper, David Basin, Srdjan Capkun, Cas Cremers
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2010Anti-jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques
2010 - Christina Pöpper, Mario Strasser, Srdjan Capkun
IEEE Journal on Selected Areas in Communications: Special Issue on Mission Critical Networking, 2010Attacks on Public WLAN-based Positioning Systems
2009 - Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun
In Proceedings of the ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009Jamming-resistant Broadcast Communication without Shared Keys
2009 - Christina Pöpper, Mario Strasser, Srdjan Capkun
In Proceedings of the USENIX Security Symposium, 2009Efficient Uncoordinated FHSS Anti-jamming Communication
2009 - Mario Strasser, Christina Pöpper, Srdjan Capkun
In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2009Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
2008 - Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj
In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2008 [PDF]Secure Time Synchronization in Sensor Networks
2008 - Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava
In ACM Transactions on Information and System Security, July 2008