Publications by Date

DBLP | Google Scholar | Semantic Scholar

2024

  • Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan
    Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks

    In Proceedings of 18th USENIX WOOT Conference on Offensive Technologies (Usenix WOOT 2024) [PDF] (to appear)
  • Syed Khandker, Michele Guerra, Evangelos Bitsikas, Roger Piqueras Jover, Aanjhan Ranganathan, Christina Pöpper
    ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices
    In Proceedings of 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2024 [PDF] (to appear)
  • Syed Khandker, Krzysztof Jurczok, Christina Pöpper
    COSPAS Search and Rescue Satellite Uplink: A MAC-Based Security Enhancement
    2nd Workshop on the Security of Space and Satellite Systems (SpaceSec), 2024 [PDF]

2023

  • Liang Niu, Shujaat Mirza, Zayd Maradni, Christina Pöpper
    CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot
    In Proceedings of the USENIX Security Symposium, 2023 [PDF]
  • Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan
    Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
    In Proceedings of the USENIX Security Symposium, 2023 [PDF]
  • Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef
    Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables
    In Proceedings of the USENIX Security Symposium, 2023 [PDF]
  • Brian Hyeongseok Kim, Shujaat Mirza, Christina Pöpper
    Extending Browser Extension Fingerprinting to Mobile Devices
    Workshop on Privacy in the Electronic Society (WPES), 2023 [PDF]
  • Evangelos Bitsikas, Syed Khandker, Ahmad Salous, Aanjhan Ranganathan, Roger Piqueras Jover, Christina Pöpper
    UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2023 [PDF] [code]
  • Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper
    Hope of Delivery: Extracting User Locations From Mobile Instant Messengers
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2023 [PDF]
  • Shujaat Mirza, Labeeba Begum, Liang Niu, Sarah Pardo, Azza Abouzied, Paolo Papotti, Christina Pöpper
    Tactics, Threats & Targets: Modeling Disinformation and its Mitigation
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2023 [PDF]

2022

  • Evangelos Bitsikas, Christina Pöpper
    You have been warned: Abusing 5G’s Warning and Emergency Systems
    In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2022 [PDF]
  • Ala’ Darabseh, Christina Pöpper
    Towards Security-Optimized Placement of ADS-B Sensors
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2022 [PDF, full arXiv version, presentation]

2021

  • Christina Pöpper, Michail Maniatakos, Roberto Di Pietro:
    Cyber security research in the Arab region: a blooming ecosystem with global ambitions
    Communications of the ACM 64(4): 96-101, 2021 [PDF]
  • Evangelos Bitsikas, Christina Pöpper
    Don’t hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications
    In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2021 [PDF]
  • Merlin Chlosta, David Rupprecht, Christina Pöpper, Thorsten Holz
    5G SUCI-Catchers: Still catching them all?
    In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2021 [PDF, Presentation]
  • Muhammad Shujaat Mirza, Christina Pöpper
    My Past Dictates my Present: Relevance, Exposure, and Influence of Longitudinal Data on Facebook
    In Proceedings of the Workshop on Usable Security (USEC), 2021 [PDF]
  • Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, and Katharina Kohls
    We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor
    In Proceedings of the 6th IEEE European Symposium on Security and Privacy (EuroS&P), 2021 [PDF]
  • Kai Jansen, Liang Niu, Nian Xue, Ivan Martinovic, Christina Pöpper
    Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2021 [PDF, Presentation]
  • Theodor Schnitzler, Shujaat Mirza, Markus Dürmuth, Christina Pöpper
    SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data
    In Proceedings of Privacy Enhancing Technologies (PoPETS), 2021 [PDF, Presentation]

2020

  • Nian Xue, Liang Niu, Xianbin Hong, Zhen Li, Larissa Hoffaeller, Christina Pöpper
    DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2020 [PDF , source code + dataset]
  • Tom Van Goethem, Christina Pöpper, Wouter Joosens, and Mathy Vanhoef
    Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections
    In Proceedings of the USENIX Security Symposium, 2020, [PDF]
  • David Rupp­recht, Ka­tha­ri­na Kohls, Thors­ten Holz, Chris­ti­na Pöp­per
    Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
    In Proceedings of the USE­NIX Se­cu­ri­ty Sym­po­si­um, 2020 [PDFWebsite, Video, App]
  • Ala’ Darabseh, Hoda Alkhzaimi, Christina Pöpper
    MAVPro: ADS-B Message Verification for Aviation Security with Minimal Numbers of On-Ground Sensors
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2020 [PDF, Teaser Video]
  • Mathy Vanhoef, Prasant Adhikari, Christina Pöpper
    Short Paper: Protecting Wi-Fi Beacons from Outsider Forgeries
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2020 [PDF]
  • David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
    IMP4GT: IMPersonation Attacks in 4G NeTworks
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2020 [PDF]
  • Theodor Schnitzler, Christine Utz, Florian M. Farke, Christina Pöpper, Markus Dürmuth
    Exploring User Perceptions of Deletion in Mobile Instant Messaging Applications
    Journal of Cybersecurity (Oxford University Press), 2020 [PDF]

2019

  • David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
    Breaking LTE on Layer Two
    In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2019 [PDF, Website, Video]
  • Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper
    Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two
    In Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2019 [PDF]
  • Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper
    LTE Security Disabled—Misconfiguration in Commercial Networks
    In Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2019 [PDF]
  • Theodor Schnitzler, Markus Dürmuth, Christina Pöpper
    Towards Contractual Agreements for Revocation of Online Data
    IFIP In­ter­na­tio­nal Con­fe­rence on ICT Sys­tems Se­cu­ri­ty and Pri­va­cy Pro­tec­tion (IFIP SEC), 2019 [PDF]
  • Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper
    On the Challenges of Geographical Avoidance for Tor
    In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019 [PDF]

2018

  • David Rupp­recht, Adri­an Da­brow­ski, Thors­ten Holz, Edgar Weippl, Chris­ti­na Pöp­per
    On Security Research Towards Future Mobile Network Generations
    IEEE Com­mu­ni­ca­ti­ons Sur­veys and Tu­to­ri­als, 20 (3), p. 2518-2542, ISSN: 1553-877X, DOI: 10.1109/COMST.2018.2820728, 2018
    [PDF, Pre-Print]
  • Katharina Kohls, Christina Pöpper
    DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
    In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), 2018 [PDF, Website]
  • Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens Schmitt
    Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
    In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2018 [PDF]
  • Theodor Schnitzler, Christine Utz, Florian M. Farke, Chris­ti­na Pöp­per, Markus Dürmuth
    User Perception and Expectations on Deleting Instant Messages —or— “What Happens If I Press This Button?”
    European Workshop on Usable Security (EuroUSEC), 2018 [PDF]
  • Ghous Amjad, Muhammad Shujaat Mirza, Christina Pöpper
    Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2018 [PDF]

2017

  • Kai Jan­sen, Chris­ti­na Pöpper
    Opinion: Advancing Attacker Models of Satellite-based Localization Systems–The case of Multi-device Attackers
    In Proceedings of the ACM Con­fe­rence on Se­cu­ri­ty and Pri­va­cy in Wire­less and Mo­bi­le Networks (WiSec), 2017 [PDF]

2016

  • Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper
    Multi-Receiver GPS Spoofing Detection: Error Models and Realization
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016 [PDF]
  • David Rupprecht, Kai Jansen, Christina Pöpper
    Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness
    USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT), 2016 [PDF]
  • Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
    SkypeLine: Robust Hidden Data Transmission for VoIP
    In Proceedings of the ACM Sym­po­si­um on In­for­mA­ti­on, Com­pu­ter and Com­mu­ni­ca­ti­ons Secu­ri­ty (ASIACCS), 2016 [PDF]
  • Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper
    Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
    In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2016 [PDF]
    *** Outstanding Paper Award ***

2015 and before

  • Sebastian Brenza, Andre Pawlowski, Christina Pöpper
    A Practical Investigation of Identity Theft Vulnerabilities in Eduroam
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015, [Project Website], [PDF]
  • Naveed Ahmed, Christina Pöpper, Srdjan Capkun
    Enabling Short Fragments for Uncoordinated Spread Spectrum Communication
    In Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS), 2014 [PDF]
  • Kim Pecina, Esfandiar Mohammadi, Christina Pöpper
    Zero-Communication Seed Establishment for Anti-Jamming Techniques
    In NDSS Workshop on Security of Emerging Networking Technologies (SENT), San Diego, California, 2014 [PDF]
  • Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
    On the Requirements for Successful GPS Spoofing Attacks
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, Illinois, 2011 [PDF]
  • Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
    Investigation of Signal and Message Manipulations on the Wireless Channel
    In Proceedings of the European Symposium on Research in Computer Security (ESORICS), Leuven, Belgium, 2011 [PDF]
  • Christina Pöpper, David Basin, Srdjan Capkun, Cas Cremers
    Keeping Data Secret under Full Compromise using Porter Devices
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Austin, Texas, 2010 [PDF]
  • Christina Pöpper, Mario Strasser, Srdjan Capkun
    Anti-jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques
    IEEE Journal on Selected Areas in Communications: Special Issue on Mission Critical Networking, 2010 [PDF]
  • Christina Pöpper, Mario Strasser, Srdjan Capkun
    Jamming-resistant Broadcast Communication without Shared Keys
    In Proceedings of the USENIX Security Symposium, Montreal, Canada, 2009 [PDF]
  • Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun
    Attacks on Public WLAN-based Positioning Systems
    In Proceedings of the ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), Poland, 2009 [PDF]
  • Mario Strasser, Christina Pöpper, Srdjan Capkun
    Efficient Uncoordinated FHSS Anti-jamming Communication
    In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), New Orleans, Louisiana, 2009 [PDF]
  • Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava
    Secure Time Synchronization in Sensor Networks
    in ACM Transactions on Information and System Security, July 2008 [PDF]
  • Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj
    Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
    in Proceedings of IEEE Symposium on Security and Privacy (S&P), Oakland, CA, 2008 [PDF]