Publications

POSTER: Traffic Analysis Attacks in Anonymity Networks

2017 - Katharina Kohls, Christina Pöpper

ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017 [PDF]

Multi-Receiver GPS Spoofing Detection: Error Models and Realization

2016 - Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper

In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016 [PDF]

Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness

2016 - David Rupprecht, Kai Jansen, Christina Pöpper

USENIX Workshop on Offensive Technologies (WOOT), 2016 [PDF]

SkypeLine: Robust Hidden Data Transmission for VoIP

2016 - Katharina Kohls, Thorsten Holz, Do­ro­thea Kolossa, Christina Pöpper

ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), Xi'an, May 2016 [PDF]

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data

2016 - Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper

In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2016 *** OUTSTANDING PAPER AWARD *** [PDF]

A Practical Investigation of Identity Theft Vulnerabilities in Eduroam

2015 - Sebastian Brenza, Andre Pawlowski, Christina Pöpper

In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015 [Project Webpage] [PDF]

Enabling Short Fragments for Uncoordinated Spread Spectrum Communication

2014 - Naveed Ahmed, Christina Pöpper, Srdjan Capkun

In Proceedings of 19th European Symposium on Research in Computer Security (ESORICS), 2014 [PDF]

Ze­ro-Com­mu­ni­ca­ti­on Seed Es­ta­blish­ment for An­ti-Jamming Tech­ni­ques

2014 - Kim Pecina, Esfandiar Mohammadi, Christina Pöpper

In NDSS Work­shop on Se­cu­ri­ty of Emer­ging Net­wor­king Tech­no­lo­gies (SENT), 2014 [PDF]

On the Requirements for Successful GPS Spoofing Attacks

2011 - Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun

In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2011

Investigation of Signal and Message Manipulations on the Wireless Channel

2011 - Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun

In Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2011
Page: