DBLP | Google Scholar | Semantic Scholar
Mobile Network Security
- Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan
Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks
In Proceedings of 18th USENIX WOOT Conference on Offensive Technologies (Usenix WOOT 2024) [PDF] - Syed Khandker, Michele Guerra, Evangelos Bitsikas, Roger Piqueras Jover, Aanjhan Ranganathan, Christina Pöpper
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices
In Proceedings of 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2024 [PDF] [code] - Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
In Proceedings of the USENIX Security Symposium, 2023 [PDF] - Evangelos Bitsikas, Syed Khandker, Ahmad Salous, Aanjhan Ranganathan, Roger Piqueras Jover, Christina Pöpper
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2023 [PDF] [code] - Evangelos Bitsikas, Christina Pöpper
You have been warned: Abusing 5G’s Warning and Emergency Systems
In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2022 [PDF] - Evangelos Bitsikas, Christina Pöpper
Don’t hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications
In Proceedings of Annual Computer Security Applications Conference (ACSAC), 2021 [PDF] - Merlin Chlosta, David Rupprecht, Christina Pöpper, Thorsten Holz
5G SUCI-Catchers: Still catching them all?
In Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2021 [PDF, Presentation] - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
In Proceedings of the USENIX Security Symposium, 2020 [PDF, Website, Video, App] - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
IMP4GT: IMPersonation Attacks in 4G NeTworks
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2020 [PDF] - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
Breaking LTE on Layer Two
In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2019 [PDF, Website, Video] - Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper
Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two
In Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2019 [PDF] - Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper
LTE Security Disabled—Misconfiguration in Commercial Networks
In Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2019 [PDF] - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
On Security Research Towards Future Mobile Network Generations
IEEE Communications Surveys and Tutorials, 20 (3), p. 2518-2542, ISSN: 1553-877X, DOI: 10.1109/COMST.2018.2820728, 2018 [PDF], Related TR: [arXiv], Pre-Print: [PDF] - David Rupprecht, Kai Jansen, Christina Pöpper
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness
USENIX Workshop on Offensive Technologies (WOOT), 2016 [PDF]
Secure Positioning and Aerial Security
- Syed Khandker, Krzysztof Jurczok, Christina Pöpper
COSPAS Search and Rescue Satellite Uplink: A MAC-Based Security Enhancement
2nd Workshop on the Security of Space and Satellite Systems (SpaceSec), 2024 [PDF] - Ala’ Darabseh, Christina Pöpper
Towards Security-Optimized Placement of ADS-B Sensors
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2022 [PDF, full arXiv version, presentation] - Kai Jansen, Liang Niu, Nian Xue, Ivan Martinovic, Christina Pöpper
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2021 [PDF, Video] - Nian Xue, Liang Niu, Xianbin Hong, Zhen Li, Larissa Hoffaeller, Christina Pöpper
DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2020 [PDF, source code + dataset] - Ala’ Darabseh, Hoda Alkhzaimi, Christina Pöpper
MAVPro: ADS-B Message Verification for Aviation Security with Minimal Numbers of On-Ground Sensors
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2020 [PDF, Teaser Video] - Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens Schmitt
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
In Proceedings of IEEE Symposium on Security and Privacy (S&P), 2018 [PDF], Youtube-Video - Kai Jansen, Christina Pöpper
Opinion: Advancing Attacker Models of Satellite-based Localization Systems–The case of Multi-device Attackers
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017 [PDF] - Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper
Multi-Receiver GPS Spoofing Detection: Error Models and Realization
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016 [PDF] - Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun
On the Requirements for Successful GPS Spoofing Attacks
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Chicago, Illinois, 2011 [PDF] - Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun
Attacks on Public WLAN-based Positioning Systems
In Proceedings of the ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), Poland, 2009 [PDF]
Communication & Network Security and Privacy
- Brian Hyeongseok Kim, Shujaat Mirza, Christina Pöpper
Extending Browser Extension Fingerprinting to Mobile Devices
Workshop on Privacy in the Electronic Society (WPES), 2023 [PDF] - Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef
Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables
In Proceedings of the USENIX Security Symposium, 2023 [PDF] - Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2023 [PDF, extended arXiv version] - Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, and Katharina Kohls
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor
In Proceedings of the 6th IEEE European Symposium on Security and Privacy (EuroS&P), 2021 [PDF] - Tom Van Goethem, Christina Pöpper, Wouter Joosens, and Mathy Vanhoef
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections
In Proceedings of the USENIX Security Symposium, 2020 [PDF] - Mathy Vanhoef, Prasant Adhikari, Christina Pöpper
Short Paper: Protecting Wi-Fi Beacons from Outsider Forgeries
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2020 [PDF] - Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper
On the Challenges of Geographical Avoidance for Tor
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019 [PDF] - Katharina Kohls, Christina Pöpper
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), 2018 [PDF, Website] - Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
SkypeLine: Robust Hidden Data Transmission for VoIP
In Proceedings of the ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), 2016 [PDF] - Sebastian Brenza, Andre Pawlowski, Christina Pöpper
A Practical Investigation of Identity Theft Vulnerabilities in Eduroam
In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2015, [Project Website], [PDF] - Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava
Secure Time Synchronization in Sensor Networks
in ACM Transactions on Information and System Security, July 2008 [PDF]
Digital Forgetting, Data Privacy & Disinformation
- Shujaat Mirza, Corban Villa, Christina Pöpper
Media talks Privacy: Unraveling a Decade of Privacy Discourse around the World
In Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024) [PDF] - Shujaat Mirza, Labeeba Begum, Liang Niu, Sarah Pardo, Azza Abouzied, Paolo Papotti, Christina Pöpper
Tactics, Threats & Targets: Modeling Disinformation and its Mitigation
In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2023 [PDF] - Shujaat Mirza, Christina Pöpper
My Past Dictates my Present: Relevance, Exposure, and Influence of Longitudinal Data on Facebook
In Proceeding to the Workshop on Usable Security (USEC), 2021 [PDF] - Theodor Schnitzler, Shujaat Mirza, Markus Dürmuth, Christina Pöpper
SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data
In Proceedings of Privacy Enhancing Technologies (PoPETS), 2021 [PDF] - Theodor Schnitzler, Christine Utz, Florian M. Farke, Christina Pöpper, Markus Dürmuth
Exploring User Perceptions of Deletion in Mobile Instant Messaging Applications
Journal of Cybersecurity (Oxford University Press), 2020 [PDF] - Theodor Schnitzler, Markus Dürmuth, Christina Pöpper
Towards Contractual Agreements for Revocation of Online Data
IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), 2019 [PDF] - Theodor Schnitzler, Christine Utz, Florian M. Farke, Christina Pöpper, Markus Dürmuth
User Perception and Expectations on Deleting Instant Messages —or— “What Happens If I Press This Button?”European Workshop on Usable Security (EuroUSEC), 2018 [PDF]
- Ghous Amjad, Muhammad Shujaat Mirza, Christina Pöpper
Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting
In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2018 [PDF] - Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
In Proceedings of the ACM Conference on Data and Application Security and Privacy (ACM CODASPY), 2016 [PDF]
*** Outstanding Paper Award *** - Christina Pöpper, David Basin, Srdjan Capkun, Cas Cremers
Keeping Data Secret under Full Compromise using Porter Devices
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Austin, Texas, 2010 [PDF]
Machine Learning Security & Privacy
- Liang Niu, Shujaat Mirza, Zayd Maradni, Christina Pöpper
CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot
In Proceedings of the USENIX Security Symposium, 2023 [PDF]
Wireless Security & Anti-Jamming
- Naveed Ahmed, Christina Pöpper, Srdjan Capkun
Enabling Short Fragments for Uncoordinated Spread Spectrum Communication
In Proceedings of the 19th European Symposium on Research in Computer Security (ESORICS), 2014 [PDF] - Kim Pecina, Esfandiar Mohammadi, Christina Pöpper
Zero-Communication Seed Establishment for Anti-Jamming Techniques
In NDSS Workshop on Security of Emerging Networking Technologies (SENT), San Diego, California, 2014 [PDF] - Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
Investigation of Signal and Message Manipulations on the Wireless Channel
In Proceedings of the European Symposium on Research in Computer Security (ESORICS), Leuven, Belgium, 2011 [PDF] - Christina Pöpper, Mario Strasser, Srdjan Capkun
Anti-jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques
IEEE Journal on Selected Areas in Communications: Special Issue on Mission Critical Networking, 2010 [PDF] - Christina Pöpper, Mario Strasser, Srdjan Capkun
Jamming-resistant Broadcast Communication without Shared Keys
In Proceedings of the USENIX Security Symposium, Montreal, Canada, 2009 [PDF] - Mario Strasser, Christina Pöpper, Srdjan Capkun
Efficient Uncoordinated FHSS Anti-jamming Communication
In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), New Orleans, Louisiana, 2009 [PDF] - Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
in Proceedings of IEEE Symposium on Security and Privacy (S&P), Oakland, CA, 2008 [PDF]