Christina Popper

Christina Pöpper

Assistant Professor of Computer Science

    20082025

    Research activity per year

    Filter
    Conference contribution

    Search results

    • 2024

      Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks

      Bitsikas, E., Schnitzler, T., Pöpper, C. & Ranganathan, A., 2024, Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024. USENIX Association, p. 59-73 15 p. (Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices

      Khandker, S., Guerra, M., Bitsikas, E., Jover, R. P., Ranganathan, A. & Pöpper, C., May 27 2024, WiSec 2024 - Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 89-100 12 p. (WiSec 2024 - Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2023

      Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables

      Xue, N., Malla, Y., Xia, Z., Pöpper, C. & Vanhoef, M., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 5719-5736 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 8).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot

      Niu, L., Mirza, S., Maradni, Z. & Pöpper, C., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 2133-2150 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 3).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Extending Browser Extension Fingerprinting to Mobile Devices

      Kim, B. H., Mirza, S. & Pöpper, C., Nov 26 2023, WPES 2023 - Proceedings of the 22nd Workshop on Privacy in the Electronic Society. Association for Computing Machinery, Inc, p. 141-146 6 p. (WPES 2023 - Proceedings of the 22nd Workshop on Privacy in the Electronic Society).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings

      Bitsikas, E., Schnitzler, T., Pöpper, C. & Ranganathan, A., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 2151-2168 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 3).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Hope of Delivery: Extracting User Locations From Mobile Instant Messengers

      Schnitzler, T., Kohls, K., Bitsikas, E. & Pöpper, C., 2023, 30th Annual Network and Distributed System Security Symposium, NDSS 2023. The Internet Society, (30th Annual Network and Distributed System Security Symposium, NDSS 2023).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Tactics, Threats & Targets: Modeling Disinformation and its Mitigation

      Mirza, S., Begum, L., Niu, L., Pardo, S., Abouzied, A., Papotti, P. & Pöpper, C., 2023, 30th Annual Network and Distributed System Security Symposium, NDSS 2023. The Internet Society, (30th Annual Network and Distributed System Security Symposium, NDSS 2023).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework

      Bitsikas, E., Khandker, S., Salous, A., Ranganathan, A., Piqueras Jover, R. & Pöpper, C., May 29 2023, WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 121-132 12 p. (WiSec 2023 - Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2022

      Towards Security-Optimized Placement of ADS-B Sensors

      Darabseh, A. & Pöpper, C., May 16 2022, WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 39-44 6 p. (WiSec 2022 - Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • You have been warned: Abusing 5G's Warning and Emergency Systems

      Bitsikas, E. & Pöpper, C., Dec 5 2022, Proceedings - 38th Annual Computer Security Applications Conference, ACSAC 2022. Association for Computing Machinery, p. 561-575 15 p. (ACM International Conference Proceeding Series).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2021

      5G SUCI-catchers: Still catching them all?

      Chlosta, M., Rupprecht, D., Pöpper, C. & Holz, T., Jun 21 2021, WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 359-364 6 p. 3467826. (WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Don’t hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications

      Bitsikas, E. & Pöpper, C., Dec 6 2021, Annual Computer Security Applications Conference. Association for Computing Machinery (ACM), Vol. 2021. p. 900-915 16 p. (ACM International Conference Proceeding Series).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • High we Fly: Wireless Witnessing and Crowdsourcing for Air-Traffic Communication Security

      Pöpper, C., May 24 2021, CPSS 2021 - Proceedings of the 7th ACM Cyber-Physical System Security Workshop. Association for Computing Machinery, Inc, p. 3-4 2 p. (CPSS 2021 - Proceedings of the 7th ACM Cyber-Physical System Security Workshop).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance

      Jansen, K., Niu, L., Xue, N., Martinovic, I. & Pöpper, C., Feb 21 2021, Network and Distributed Systems Security (NDSS) Symposium. The Internet Society, Vol. 2021. 17 p. (Annual Network and Distributed System Security Symposium (NDSS); vol. 2021).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • We built this circuit: Exploring threat vectors in circuit establishment in tor

      Schnitzler, T., Popper, C., Durmuth, M. & Kohls, K., Sep 2021, Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021. Institute of Electrical and Electronics Engineers Inc., p. 319-336 18 p. (Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • 2020

      Call me maybe: Eavesdropping encrypted LTE calls with REVOLTE

      Rupprecht, D., Kohls, K., Holz, T. & Pöpper, C., 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association, p. 73-88 16 p. (Proceedings of the 29th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching

      Xue, N., Niu, L., Hong, X., Li, Z., Hoffaeller, L. & Pöpper, C., Dec 7 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, p. 304-319 16 p. 3427254. (ACM International Conference Proceeding Series).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • IMP4GT: IMPersonation Attacks in 4G NeTworks

      Rupprecht, D., Kohls, K., Holz, T. & Pöpper, C., 2020, 27th Annual Network and Distributed System Security Symposium, NDSS 2020. The Internet Society, (27th Annual Network and Distributed System Security Symposium, NDSS 2020).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • IMP4GT: IMPersonation Attacks in 4G NeTworks

      Rupprecht, D., Kohls, K., Holz, T. & Pöpper, C., Feb 2020, IMP4GT: IMPersonation Attacks in 4G NeTworks. (Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS)).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors

      Darabseh, A., Alkhzaimi, H. & Pöpper, C., Jul 8 2020, WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 53-64 12 p. (WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Protecting wi-fi beacons from outsider forgeries

      Vanhoef, M., Adhikari, P. & Pöpper, C., Jul 8 2020, WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, p. 155-160 6 p. (WiSec 2020 - Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections

      van Goethem, T., Pöpper, C., Joosen, W. & Vanhoef, M., 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association, p. 1985-2002 18 p. (Proceedings of the 29th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2019

      Breaking LTE on Layer Two

      Rupprecht, D., Kohls, K., Holz, T. & Popper, C., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 1121-1136 16 p. 8835335. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Lost traffic encryption: Fingerprinting LTE/4G traffic on layer two

      Kohls, K., Rupprecht, D., Holz, T. & Pöpper, C., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 249-260 12 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • LTE security disabled-misconfiguration in commercial networks

      Chlosta, M., Rupprecht, D., Holz, T. & Pöpper, C., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 261-266 6 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On the Challenges of Geographical Avoidance for Tor

      Kohls, K., Jansen, K., Rupprecht, D., Holz, T. & Poepper, C., Feb 24 2019, Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS). 26 ed. The Internet Society, 15 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • On the Challenges of Geographical Avoidance for Tor

      Kohls, K., Jansen, K., Rupprecht, D., Holz, T. & Pöpper, C., 2019, 26th Annual Network and Distributed System Security Symposium, NDSS 2019. The Internet Society, (26th Annual Network and Distributed System Security Symposium, NDSS 2019).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Towards contractual agreements for revocation of online data

      Schnitzler, T., Dürmuth, M. & Pöpper, C., 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer New York LLC, p. 374-387 14 p. (IFIP Advances in Information and Communication Technology; vol. 562).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2018

      Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

      Jansen, K., Schafer, M., Moser, D., Lenders, V., Popper, C. & Schmitt, J., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 1018-1031 14 p. 8418651. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2018-May).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • DigesTor: Comparing passive traffic analysis attacks on tor

      Kohls, K. & Pöpper, C., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Lopez, J., Zhou, J. & Soriano, M. (eds.). Springer Verlag, p. 512-530 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11098 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Forgetting with puzzles: Using cryptographic puzzles to support digital forgetting

      Amjad, G., Mirza, M. S. & Pöpper, C., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 342-353 12 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2017

      Opinion: Advancing attacker models of satellite-based localization systems-the case of multi-device attackers

      Jansen, K. & Popper, C., Jul 18 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 156-159 4 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • POSTER: Traffic analysis attacks in anonymity networks

      Kohls, K. & Pöpper, C., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 917-919 3 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • POSTER: Localization of spoofing devices using a large-scale air traffic surveillance system

      Jansen, K., Schäfer, M., Lenders, V., Pöpper, C. & Schmitt, J., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 914-916 3 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2016

      Multi-receiver GPS spoofing detection: Error models and realization

      Jansen, K., Tippenhauer, N. O. & Pöpper, C., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, p. 237-250 14 p. (ACM International Conference Proceeding Series; vol. 5-9-December-2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Neuralyzer: Flexible expiration times for the revocation of online data

      Zarras, A., Kohls, K., Dürmuth, M. & Pöpper, C., Mar 9 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 14-25 12 p. (CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • SkypeLine: Robust hidden data transmission for VoIP

      Kohls, K., Kolossa, D., Holz, T. & Pöpper, C., May 30 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 877-888 12 p. (ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2015

      A practical investigation of identity theft vulnerabilities in eduroam

      Brenza, S., Pawlowski, A. & Pöpper, C., Jun 22 2015, Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015. Association for Computing Machinery, Inc, a14. (Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2014

      Enabling short fragments for uncoordinated spread spectrum communication

      Ahmed, N., Pöpper, C. & Capkun, S., 2014, Computer Security, ESORICS 2014 - 19th European Symposium on Research in Compter Security, Proceedings. PART 1 ed. Springer Verlag, p. 488-507 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8712 LNCS, no. PART 1).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • 2011

      Investigation of signal and message manipulations on the wireless channel

      Pöpper, C., Tippenhauer, N. O., Danev, B. & Capkun, S., 2011, Computer Security, ESORICS 2011 - 16th European Symposium on Research in Computer Security, Proceedings. Springer Verlag, p. 40-59 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6879 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On the requirements for successful GPS spoofing attacks

      Tippenhauer, N. O., Pöpper, C., Rasmussen, K. B. & Čapkun, S., 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 75-85 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • 2010

      Keeping data secret under full compromise using porter devices

      Pöpper, C., Basin, D., Čapkun, S. & Cremers, C., 2010, Proceedings - 26th Annual Computer Security Applications Conference, ACSAC 2010. IEEE Computer Society, p. 241-250 10 p. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2009

      Attacks on public WLAN-based positioning systems

      Tippenhauer, N. O., Rasmussen, K. B., Pöpper, C. & Čapkun, S., 2009, MobiSys'09 - Proceedings of the 7th ACM International Conference on Mobile Systems, Applications, and Services. p. 29-39 11 p. (MobiSys'09 - Proceedings of the 7th ACM International Conference on Mobile Systems, Applications, and Services).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Efficient uncoordinated fhss anti-jamming communication

      Strasser, M., Pöpper, C. & Čapkun, S., 2009, MobiHoc'09 - Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 207-217 11 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Jamming-resistant broadcast communication without shared keys

      Pöpper, C., Strasser, M. & Čapkun, S., Aug 2009, Proceedings of the 18th USENIX Security Symposium. USENIX Association, p. 231-247 17 p. (Proceedings of the 18th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2008

      Jamming-resistant key establishment using uncoordinated frequency hopping

      Strasser, M., Čapkun, S., Pöpper, C. & Čagalj, M., 2008, Proceedings - 2008 IEEE Symposium on Security and Privacy, SP. p. 64-78 15 p. 4531145. (Proceedings - IEEE Symposium on Security and Privacy).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Your message has successfully been sent.
    Your message was not sent due to an error.