default search action
Christina Pöpper
Person information
- affiliation: New York University Abu Dhabi, UEA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Shujaat Shujaat Mirza, Corban Villa, Christina Pöpper:
Media talks Privacy: Unraveling a Decade of Privacy Discourse around the World. Proc. Priv. Enhancing Technol. 2024(4): 102-122 (2024) - [c46]Syed Khandker, Michele Guerra, Evangelos Bitsikas, Roger Piqueras Jover, Aanjhan Ranganathan, Christina Pöpper:
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices. WISEC 2024: 89-100 - [c45]Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan:
Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks. WOOT @ USENIX Security Symposium 2024: 59-73 - [e7]Christina Pöpper, Lejla Batina:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14583, Springer 2024, ISBN 978-3-031-54769-0 [contents] - [e6]Christina Pöpper, Lejla Batina:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14584, Springer 2024, ISBN 978-3-031-54772-0 [contents] - [e5]Christina Pöpper, Lejla Batina:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14585, Springer 2024, ISBN 978-3-031-54775-1 [contents] - [i7]Shujaat Shujaat Mirza, Bruno Coelho, Yuyuan Cui, Christina Pöpper, Damon McCoy:
Global-Liar: Factuality of LLMs over Time and Geographic Regions. CoRR abs/2401.17839 (2024) - 2023
- [c44]Muhammad Shujaat Mirza, Labeeba Begum, Liang Niu, Sarah Pardo, Azza Abouzied, Paolo Papotti, Christina Pöpper:
Tactics, Threats & Targets: Modeling Disinformation and its Mitigation. NDSS 2023 - [c43]Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper:
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers. NDSS 2023 - [c42]Liang Niu, Muhammad Shujaat Mirza, Zayd Maradni, Christina Pöpper:
CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot. USENIX Security Symposium 2023: 2133-2150 - [c41]Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan:
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings. USENIX Security Symposium 2023: 2151-2168 - [c40]Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef:
Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables. USENIX Security Symposium 2023: 5719-5736 - [c39]Evangelos Bitsikas, Syed Khandker, Ahmad Salous, Aanjhan Ranganathan, Roger Piqueras Jover, Christina Pöpper:
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework. WISEC 2023: 121-132 - [c38]Brian Hyeongseok Kim, Muhammad Shujaat Mirza, Christina Pöpper:
Extending Browser Extension Fingerprinting to Mobile Devices. WPES@CCS 2023: 141-146 - [i6]Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan:
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings. CoRR abs/2306.07695 (2023) - [i5]Liang Niu, Nian Xue, Christina Pöpper:
Unveiling the Sentinels: Assessing AI Performance in Cybersecurity Peer Review. CoRR abs/2309.05457 (2023) - 2022
- [c37]Evangelos Bitsikas, Christina Pöpper:
You have been warned: Abusing 5G's Warning and Emergency Systems. ACSAC 2022: 561-575 - [c36]Ala Darabseh, Christina Pöpper:
Towards Security-Optimized Placement of ADS-B Sensors. WISEC 2022: 39-44 - [i4]Ala Darabseh, Christina Pöpper:
Towards Security-Optimized Placement of ADS-B Sensors. CoRR abs/2204.01994 (2022) - [i3]Evangelos Bitsikas, Christina Pöpper:
You have been warned: Abusing 5G's Warning and Emergency Systems. CoRR abs/2207.02506 (2022) - [i2]Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper:
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers. CoRR abs/2210.10523 (2022) - 2021
- [j6]Christina Pöpper, Michail Maniatakos, Roberto Di Pietro:
Cyber security research in the Arab region: a blooming ecosystem with global ambitions. Commun. ACM 64(4): 96-101 (2021) - [j5]Theodor Schnitzler, Muhammad Shujaat Mirza, Markus Dürmuth, Christina Pöpper:
SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data. Proc. Priv. Enhancing Technol. 2021(1): 229-249 (2021) - [c35]Evangelos Bitsikas, Christina Pöpper:
Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications. ACSAC 2021: 900-915 - [c34]Christina Pöpper:
High we Fly: Wireless Witnessing and Crowdsourcing for Air-Traffic Communication Security. CPSS@AsiaCCS 2021: 3-4 - [c33]Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls:
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor. EuroS&P 2021: 319-336 - [c32]Kai Jansen, Liang Niu, Nian Xue, Ivan Martinovic, Christina Pöpper:
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance. NDSS 2021 - [c31]Merlin Chlosta, David Rupprecht, Christina Pöpper, Thorsten Holz:
5G SUCI-catchers: still catching them all? WISEC 2021: 359-364 - [e4]Christina Pöpper, Mathy Vanhoef, Lejla Batina, René Mayrhofer:
WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021. ACM 2021, ISBN 978-1-4503-8349-3 [contents] - [e3]Christina Pöpper, Mathy Vanhoef:
WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, Abu Dhabi, United Arab Emirates, July 2, 2021. ACM 2021, ISBN 978-1-4503-8561-9 [contents] - 2020
- [j4]Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth:
Exploring user perceptions of deletion in mobile instant messaging applications. J. Cybersecur. 6(1): tyz016 (2020) - [c30]Nian Xue, Liang Niu, Xianbin Hong, Zhen Li, Larissa Hoffaeller, Christina Pöpper:
DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching. ACSAC 2020: 304-319 - [c29]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
IMP4GT: IMPersonation Attacks in 4G NeTworks. NDSS 2020 - [c28]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. USENIX Security Symposium 2020: 73-88 - [c27]Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef:
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. USENIX Security Symposium 2020: 1985-2002 - [c26]Ala Darabseh, Hoda Alkhzaimi, Christina Pöpper:
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors. WISEC 2020: 53-64 - [c25]Mathy Vanhoef, Prasant Adhikari, Christina Pöpper:
Protecting wi-fi beacons from outsider forgeries. WISEC 2020: 155-160
2010 – 2019
- 2019
- [c24]Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper:
On the Challenges of Geographical Avoidance for Tor. NDSS 2019 - [c23]Theodor Schnitzler, Markus Dürmuth, Christina Pöpper:
Towards Contractual Agreements for Revocation of Online Data. SEC 2019: 374-387 - [c22]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
Breaking LTE on Layer Two. IEEE Symposium on Security and Privacy 2019: 1121-1136 - [c21]Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper:
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two. WiSec 2019: 249-260 - [c20]Merlin Chlosta, David Rupprecht, Thorsten Holz, Christina Pöpper:
LTE security disabled: misconfiguration in commercial networks. WiSec 2019: 261-266 - [e2]Christina Pöpper, Martin Strohmeier:
Proceedings of the 7th OpenSky Workshop 2019, Zurich, Switzerland, November 21-22, 2019. EPiC Series in Computing 67, EasyChair 2019 [contents] - 2018
- [j3]David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar R. Weippl, Christina Pöpper:
On Security Research Towards Future Mobile Network Generations. IEEE Commun. Surv. Tutorials 20(3): 2518-2542 (2018) - [c19]Ghous Amjad, Muhammad Shujaat Mirza, Christina Pöpper:
Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting. CODASPY 2018: 342-353 - [c18]Katharina Kohls, Christina Pöpper:
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor. ESORICS (1) 2018: 512-530 - [c17]Kai Jansen, Matthias Schäfer, Daniel Moser, Vincent Lenders, Christina Pöpper, Jens B. Schmitt:
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks. IEEE Symposium on Security and Privacy 2018: 1018-1031 - [e1]Panos Papadimitratos, Kevin R. B. Butler, Christina Pöpper:
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018. ACM 2018 [contents] - 2017
- [c16]Kai Jansen, Matthias Schäfer, Vincent Lenders, Christina Pöpper, Jens B. Schmitt:
Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System. AsiaCCS 2017: 914-916 - [c15]Katharina Siobhan Kohls, Christina Pöpper:
Traffic Analysis Attacks in Anonymity Networks. AsiaCCS 2017: 917-919 - [c14]Kai Jansen, Christina Pöpper:
Advancing attacker models of satellite-based localization systems: the case of multi-device attackers. WISEC 2017: 156-159 - [i1]David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar R. Weippl, Christina Pöpper:
On Security Research towards Future Mobile Network Generations. CoRR abs/1710.08932 (2017) - 2016
- [c13]Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper:
Multi-receiver GPS spoofing detection: error models and realization. ACSAC 2016: 237-250 - [c12]Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper:
SkypeLine: Robust Hidden Data Transmission for VoIP. AsiaCCS 2016: 877-888 - [c11]Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper:
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data. CODASPY 2016: 14-25 - [c10]David Rupprecht, Kai Jansen, Christina Pöpper:
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness. WOOT 2016 - 2015
- [c9]Sebastian Brenza, Andre Pawlowski, Christina Pöpper:
A practical investigation of identity theft vulnerabilities in Eduroam. WISEC 2015: 14:1-14:11 - 2014
- [c8]Naveed Ahmed, Christina Pöpper, Srdjan Capkun:
Enabling Short Fragments for Uncoordinated Spread Spectrum Communication. ESORICS (1) 2014: 488-507 - 2011
- [b1]Christina Pöpper:
On Secure Wireless Communication under Adversarial Interference. ETH Zurich, Zürich, Switzerland, 2011 - [c7]Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun:
On the requirements for successful GPS spoofing attacks. CCS 2011: 75-86 - [c6]Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun:
Investigation of Signal and Message Manipulations on the Wireless Channel. ESORICS 2011: 40-59 - 2010
- [j2]Christina Pöpper, Mario Strasser, Srdjan Capkun:
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE J. Sel. Areas Commun. 28(5): 703-715 (2010) - [c5]Christina Pöpper, David A. Basin, Srdjan Capkun, Cas Cremers:
Keeping data secret under full compromise using porter devices. ACSAC 2010: 241-250
2000 – 2009
- 2009
- [c4]Mario Strasser, Christina Pöpper, Srdjan Capkun:
Efficient uncoordinated FHSS anti-jamming communication. MobiHoc 2009: 207-218 - [c3]Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun:
Attacks on public WLAN-based positioning systems. MobiSys 2009: 29-40 - [c2]Christina Pöpper, Mario Strasser, Srdjan Capkun:
Jamming-resistant Broadcast Communication without Shared Keys. USENIX Security Symposium 2009: 231-248 - 2008
- [j1]Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava:
Secure Time Synchronization in Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): 23:1-23:35 (2008) - [c1]Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj:
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. SP 2008: 64-78
Coauthor Index
aka: Katharina Siobhan Kohls
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint