No photo of Christina Poepper

Christina Poepper

Assistant Professor of Computer Science

    20082019
    If you made any changes in Pure, your changes will be visible here soon.

    Fingerprint Weighted list of dominant concepts in the researcher's publications (titles and abstracts).

    • 9 Similar Profiles
    Jamming Engineering & Materials Science
    Long Term Evolution (LTE) Engineering & Materials Science
    Communication Engineering & Materials Science
    Global positioning system Engineering & Materials Science
    Frequency hopping Engineering & Materials Science
    Network protocols Engineering & Materials Science
    Internet Engineering & Materials Science
    Spread spectrum communication Engineering & Materials Science

    Network Recent external collaboration on country level. Dive into details by clicking on the dots.

    Research Output 2008 2019

    • 21 Conference contribution
    • 3 Article
    • 2 Editorial

    Breaking LTE on Layer Two

    Rupprecht, D., Kohls, K., Holz, T. & Poepper, C., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 1121-1136 16 p. 8835335. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Long Term Evolution (LTE)
    Websites
    Network protocols
    Communication
    Critical infrastructures

    Lost traffic encryption: Fingerprinting LTE/4G traffic on layer two

    Kohls, K., Rupprecht, D., Holz, T. & Poepper, C., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 249-260 12 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    Long Term Evolution (LTE)
    Cryptography
    Websites
    Network layers
    Metadata

    LTE security disabled-misconfiguration in commercial networks

    Chlosta, M., Rupprecht, D., Holz, T. & Poepper, C., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 261-266 6 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    Long Term Evolution (LTE)
    Cryptography
    Specifications
    Communication
    Costs

    Towards contractual agreements for revocation of online data

    Schnitzler, T., Dürmuth, M. & Poepper, C., Jan 1 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer New York LLC, p. 374-387 14 p. (IFIP Advances in Information and Communication Technology; vol. 562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Personal data
    Threat
    Prototype
    Incentives
    Privacy

    Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

    Jansen, K., Schafer, M., Moser, D., Lenders, V., Poepper, C. & Schmitt, J., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-May. p. 1018-1031 14 p. 8418651

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Global positioning system
    Unmanned aerial vehicles (UAV)
    Air
    Monitoring
    Air traffic control