Publications

5G SUCI-Catchers: Still catching them all?

2021 - Merlin Chlosta, David Rupprecht, Christina Pöpper, Thorsten Holz

ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Virtual, June 2021 [PDF]

On the Challenges of Automata Reconstruction in LTE Networks

2021 - Merlin Chlosta, David Rupprecht, Thorsten Holz

ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Virtual, June 2021 [PDF]

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2

2021 - Christof Beierle, Patrick Derbez, Gregor Leander, Getan Leurent, Havard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes

[Paper]

We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor

2021 - Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls

IEEE European Symposium on Security and Privacy (EuroS&P '21). Virtual Conference, September 6-10, 2021 [Paper]

Securing Phone as a Key against Relay Attacks

2020 - Paul Staat, Kai Jansen, Christian Zenger, Chris­tof Paar

18th escar Europe: The World's Leading Automotive Cyber Security Conference, page 47-58, 2020. [PDF]

Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE

2020 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper

USENIX Security Symposium, Boston, MA, USA, August 2020 [Website] [PDF]

“You still use the password after all” – Exploring FIDO2 Security Keys in a Small Company

2020 - Florian Farke, Lennart Lorenz, Theodor Schnitzler, Philipp Markert, Markus Dürmuth

Symposium on Usable Privacy and Security (SOUPS '20). Virtual Conference, August 7-11, 2020 [Video] [PDF] [Slides]

IMP4GT: IMPersonation Attacks in 4G NeTworks

2020 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper

Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, February 2020 [PDF]

Towards Contractual Agreements for Revocation of Online Data

2019 - Theodor Schnitzler, Markus Dürmuth, Christina Pöpper

IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC '19), Lisbon, Portugal, June 25-27, 2019 [PDF]

Breaking LTE on Layer Two

2019 - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper

IEEE Symposium on Security & Privacy (Oakland), May 2019 [Website] [PDF]

POSTER: Application-Layer Routing Attacks on Tor

2019 - Katharina Kohls, Christina Pöpper

IEEE Symposium on Security & Privacy (Oakland), May 2019 [Proposal] [Poster]

Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two

2019 - Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper

Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA, ACM [PDF]

LTE Security Disabled — Misconfiguration in Commercial Networks

2019 - Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper

Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’19), May 15–17, 2019, Miami, FL, USA, ACM [PDF]

Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

2019 - Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Do­ro­thea Kolossa

Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [Demo] [PDF]

On the Challenges of Geographical Avoidance for Tor

2019 - Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper

Network and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [PDF] [Slides]

POSTER: User Perception and Expectations on Deleting Instant Messages -or- "What Happens If I Press This Button?"

2018 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth

USENIX Symposium on Usable Privacy and Security 2018 (SOUPS '18). Baltimore, MD, USA, August 12-14, 2018

"Will Any Password Do?" Exploring Rate-Limiting on the Web

2018 - Maximilian Golla, Theodor Schnitzler, Markus Dürmuth

Who Are You?! Adventures in Authentication 2018 (WAY '18). Baltimore, MD, USA, August 12, 2018 [PDF] [Slides]

DigesTor: Comparing Passive Traffic Analysis Attacks on Tor

2018 - Katharina Kohls, Christina Pöpper

European Symposium on Research in Computer Security 2018 (ESORICS '18), Barcelona, Spain, September, 2018 [Website] [PDF] [Slides]

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

2018 - Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens Schmitt

IEEE Symposium on Security and Privacy (SP) 2018 [PDF]

User Perception and Expectations on Deleting Instant Messages -or- "What Happens If I Press This Button?"

2018 - Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth

European Workshop on Usable Security (EuroUSEC) 2018, London, England, 23 April 2018 [PDF] [Slides]

Opinion: Advancing Attacker Models of Satellite-based Localization Systems—The Case of Multi-device Attackers

2017 - Kai Jansen, Christina Pöpper

10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC) 2017 [PDF]

POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System

2017 - Kai Jansen, Matthias Schäfer, Vincent Lenders, Christina Pöpper, Jens Schmitt

ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF]

POSTER: Traffic Analysis Attacks in Anonymity Networks

2017 - Katharina Kohls, Christina Pöpper

ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF]

Multi-Receiver GPS Spoofing Detection: Error Models and Realization

2016 - Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper

In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016 [PDF]

Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness

2016 - David Rupprecht, Kai Jansen, Christina Pöpper

USENIX Workshop on Offensive Technologies (WOOT), 2016 [PDF]

SkypeLine: Robust Hidden Data Transmission for VoIP

2016 - Katharina Kohls, Thorsten Holz, Do­ro­thea Kolossa, Christina Pöpper

ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), Xi'an, May 2016 [PDF]

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data

2016 - Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper

In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2016 *** OUTSTANDING PAPER AWARD *** [PDF]

A Practical Investigation of Identity Theft Vulnerabilities in Eduroam

2015 - Sebastian Brenza, Andre Pawlowski, Christina Pöpper

In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015 [Project Webpage] [PDF]

Enabling Short Fragments for Uncoordinated Spread Spectrum Communication

2014 - Naveed Ahmed, Christina Pöpper, Srdjan Capkun

In Proceedings of 19th European Symposium on Research in Computer Security (ESORICS), 2014 [PDF]

Ze­ro-Com­mu­ni­ca­ti­on Seed Es­ta­blish­ment for An­ti-Jamming Tech­ni­ques

2014 - Kim Pecina, Esfandiar Mohammadi, Christina Pöpper

In NDSS Work­shop on Se­cu­ri­ty of Emer­ging Net­wor­king Tech­no­lo­gies (SENT), 2014 [PDF]

On the Requirements for Successful GPS Spoofing Attacks

2011 - Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun

In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011

Investigation of Signal and Message Manipulations on the Wireless Channel

2011 - Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun

In Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2011

Keeping Data Secret under Full Compromise using Porter Devices

2010 - Christina Pöpper, David Basin, Srdjan Capkun, Cas Cremers

In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2010

Attacks on Public WLAN-based Positioning Systems

2009 - Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun

In Proceedings of the ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009

Jamming-resistant Broadcast Communication without Shared Keys

2009 - Christina Pöpper, Mario Strasser, Srdjan Capkun

In Proceedings of the USENIX Security Symposium, 2009

Efficient Uncoordinated FHSS Anti-jamming Communication

2009 - Mario Strasser, Christina Pöpper, Srdjan Capkun

In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2009

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping

2008 - Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj

In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2008 [PDF]
Page: