Publications

POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System

2017 - Kai Jansen, Matthias Schäfer, Vincent Lenders, Christina Pöpper, Jens Schmitt

ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF]

POSTER: Traffic Analysis Attacks in Anonymity Networks

2017 - Katharina Kohls, Christina Pöpper

ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF]

Multi-Receiver GPS Spoofing Detection: Error Models and Realization

2016 - Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper

In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016 [PDF]

Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness

2016 - David Rupprecht, Kai Jansen, Christina Pöpper

USENIX Workshop on Offensive Technologies (WOOT), 2016 [PDF]

SkypeLine: Robust Hidden Data Transmission for VoIP

2016 - Katharina Kohls, Thorsten Holz, Do­ro­thea Kolossa, Christina Pöpper

ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), Xi'an, May 2016 [PDF]

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data

2016 - Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper

In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2016 *** OUTSTANDING PAPER AWARD *** [PDF]

A Practical Investigation of Identity Theft Vulnerabilities in Eduroam

2015 - Sebastian Brenza, Andre Pawlowski, Christina Pöpper

In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015 [Project Webpage] [PDF]

Enabling Short Fragments for Uncoordinated Spread Spectrum Communication

2014 - Naveed Ahmed, Christina Pöpper, Srdjan Capkun

In Proceedings of 19th European Symposium on Research in Computer Security (ESORICS), 2014 [PDF]

Ze­ro-Com­mu­ni­ca­ti­on Seed Es­ta­blish­ment for An­ti-Jamming Tech­ni­ques

2014 - Kim Pecina, Esfandiar Mohammadi, Christina Pöpper

In NDSS Work­shop on Se­cu­ri­ty of Emer­ging Net­wor­king Tech­no­lo­gies (SENT), 2014 [PDF]

On the Requirements for Successful GPS Spoofing Attacks

2011 - Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun

In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011
Page: