Publications by Topic

DBLP | Google Scholar

Mobile Network Security

  • David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
    Breaking LTE on Layer Two
    In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2019 [PDF] (to appear)
  • David Rupp­recht, Adri­an Da­brow­ski, Thors­ten Holz, Edgar Weippl, Chris­ti­na Pöp­per
    On Security Research Towards Future Mobile Network Generations
    IEEE Com­mu­ni­ca­ti­ons Sur­veys and Tu­to­ri­als , 2018 [PDF] (to appear)
    Related TR: [arXiv], Pre-Print: [PDF]
  • David Rupprecht, Kai Jansen, Christina Pöpper
    Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness
    USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT), 2016 [PDF]

Secure Positioning

  • Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens Schmitt
    Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
    In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2018 [PDF] (to appear)
  • Kai Jan­sen, Chris­ti­na Pöpper
    Opinion: Advancing Attacker Models of Satellite-based Localization Systems–The case of Multi-device Attackers
    In Proceedings of the ACM Con­fe­rence on Se­cu­ri­ty and Pri­va­cy in Wire­less and Mo­bi­le Networks (WiSec), 2017 [PDF]
  • Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper
    Multi-Receiver GPS Spoofing Detection: Error Models and Realization
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016 [PDF]
  • Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
    On the Requirements for Successful GPS Spoofing Attacks
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, Illinois, 2011 [PDF]
  • Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun
    Attacks on Public WLAN-based Positioning Systems
    In Proceedings of the ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), Poland, 2009 [PDF]

Communication & Network Security and Privacy

  • Katharina Kohls, Christina Pöpper
    DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
    In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), 2018 [PDF]
  • Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
    SkypeLine: Robust Hidden Data Transmission for VoIP
    In Proceedings of the ACM Sym­po­si­um on In­for­mA­ti­on, Com­pu­ter and Com­mu­ni­ca­ti­ons Secu­ri­ty (ASIACCS), 2016 [PDF]
  • Sebastian Brenza, Andre Pawlowski, Christina Pöpper
    A Practical Investigation of Identity Theft Vulnerabilities in Eduroam
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015, [Project Website], [PDF]
  • Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava
    Secure Time Synchronization in Sensor Networks
    in ACM Transactions on Information and System Security, July 2008 [PDF]

Digital Forgetting / Data Deletion

  • Theodor Schnitzler, Christine Utz, Florian M. Farke, Chris­ti­na Pöp­per, Markus Dürmuth
    User Perception and Expectations on Deleting Instant Messages —or— “What Happens If I Press This Button?”
    European Workshop on Usable Security (EuroUSEC), 2018 [PDF]
  • Ghous Amjad, Muhammad Shujaat Mirza, Christina Pöpper
    Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2018 [PDF]
  • Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper
    Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2016 [PDF]
    *** Outstanding Paper Award ***
  • Christina Pöpper, David Basin, Srdjan Capkun, Cas Cremers
    Keeping Data Secret under Full Compromise using Porter Devices
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Austin, Texas, 2010 [PDF]

Wireless Security & Anti-Jamming

  • Naveed Ahmed, Christina Pöpper, Srdjan Capkun
    Enabling Short Fragments for Uncoordinated Spread Spectrum Communication
    In Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS), 2014 [PDF]
  • Kim Pecina, Esfandiar Mohammadi, Christina Pöpper
    Zero-Communication Seed Establishment for Anti-Jamming Techniques
    In NDSS Workshop on Security of Emerging Networking Technologies (SENT), San Diego, California, 2014 [PDF]
  • Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
    Investigation of Signal and Message Manipulations on the Wireless Channel
    In Proceedings of the European Symposium on Research in Computer Security (ESORICS), Leuven, Belgium, 2011 [PDF]
  • Christina Pöpper, Mario Strasser, Srdjan Capkun
    Anti-jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques
    IEEE Journal on Selected Areas in Communications: Special Issue on Mission Critical Networking, 2010 [PDF]
  • Christina Pöpper, Mario Strasser, Srdjan Capkun
    Jamming-resistant Broadcast Communication without Shared Keys
    In Proceedings of the USENIX Security Symposium, Montreal, Canada, 2009 [PDF]
  • Mario Strasser, Christina Pöpper, Srdjan Capkun
    Efficient Uncoordinated FHSS Anti-jamming Communication
    In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), New Orleans, Louisiana, 2009 [PDF]
  • Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj
    Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
    in Proceedings of IEEE Symposium on Security and Privacy (S&P), Oakland, CA, 2008 [PDF]