Publications by Date

DBLP | Google Scholar

    • David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
      Breaking LTE on Layer Two
      In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2019 [PDF] (to appear)
    • David Rupp­recht, Adri­an Da­brow­ski, Thors­ten Holz, Edgar Weippl, Chris­ti­na Pöp­per
      On Security Research Towards Future Mobile Network Generations
      IEEE Com­mu­ni­ca­ti­ons Sur­veys and Tu­to­ri­als, 2018 [PDF, Pre-Print] (to appear)
    • Katharina Kohls, Christina Pöpper
      DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
      In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), 2018 [PDF] (to appear)
    • Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens Schmitt
      Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
      In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2018 [PDF]
    • Theodor Schnitzler, Christine Utz, Florian M. Farke, Chris­ti­na Pöp­per, Markus Dürmuth
      User Perception and Expectations on Deleting Instant Messages —or— “What Happens If I Press This Button?”
      European Workshop on Usable Security (EuroUSEC), 2018 [PDF]
    • Ghous Amjad, Muhammad Shujaat Mirza, Christina Pöpper
      Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting
      In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2018 [PDF]
    • Kai Jan­sen, Chris­ti­na Pöpper
      Opinion: Advancing Attacker Models of Satellite-based Localization Systems–The case of Multi-device Attackers
      In Proceedings of the ACM Con­fe­rence on Se­cu­ri­ty and Pri­va­cy in Wire­less and Mo­bi­le Networks (WiSec), 2017 [PDF]
    • Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper
      Multi-Receiver GPS Spoofing Detection: Error Models and Realization
      In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016 [PDF]
    • David Rupprecht, Kai Jansen, Christina Pöpper
      Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness
      USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT), 2016 [PDF]
    • Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
      SkypeLine: Robust Hidden Data Transmission for VoIP
      In Proceedings of the ACM Sym­po­si­um on In­for­mA­ti­on, Com­pu­ter and Com­mu­ni­ca­ti­ons Secu­ri­ty (ASIACCS), 2016 [PDF]
    • Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper
      Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
      In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2016 [PDF]
      *** Outstanding Paper Award ***
    • Sebastian Brenza, Andre Pawlowski, Christina Pöpper
      A Practical Investigation of Identity Theft Vulnerabilities in Eduroam
      In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015, [Project Website], [PDF]
    • Naveed Ahmed, Christina Pöpper, Srdjan Capkun
      Enabling Short Fragments for Uncoordinated Spread Spectrum Communication
      In Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS), 2014 [PDF]
    • Kim Pecina, Esfandiar Mohammadi, Christina Pöpper
      Zero-Communication Seed Establishment for Anti-Jamming Techniques
      In NDSS Workshop on Security of Emerging Networking Technologies (SENT), San Diego, California, 2014 [PDF]
    • Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
      On the Requirements for Successful GPS Spoofing Attacks
      In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, Illinois, 2011 [PDF]
    • Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
      Investigation of Signal and Message Manipulations on the Wireless Channel
      In Proceedings of the European Symposium on Research in Computer Security (ESORICS), Leuven, Belgium, 2011 [PDF]
    • Christina Pöpper, David Basin, Srdjan Capkun, Cas Cremers
      Keeping Data Secret under Full Compromise using Porter Devices
      In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Austin, Texas, 2010 [PDF]
    • Christina Pöpper, Mario Strasser, Srdjan Capkun
      Anti-jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques
      IEEE Journal on Selected Areas in Communications: Special Issue on Mission Critical Networking, 2010 [PDF]
    • Christina Pöpper, Mario Strasser, Srdjan Capkun
      Jamming-resistant Broadcast Communication without Shared Keys
      In Proceedings of the USENIX Security Symposium, Montreal, Canada, 2009 [PDF]
    • Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun
      Attacks on Public WLAN-based Positioning Systems
      In Proceedings of the ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), Poland, 2009 [PDF]
    • Mario Strasser, Christina Pöpper, Srdjan Capkun
      Efficient Uncoordinated FHSS Anti-jamming Communication
      In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), New Orleans, Louisiana, 2009 [PDF]
    • Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava
      Secure Time Synchronization in Sensor Networks
      in ACM Transactions on Information and System Security, July 2008 [PDF]
    • Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj
      Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
      in Proceedings of IEEE Symposium on Security and Privacy (S&P), Oakland, CA, 2008 [PDF]