No photo of Christina Poepper

Christina Poepper

Assistant Professor of Computer Science

20082019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Weighted list of dominant concepts in the researcher's publications (titles and abstracts).

  • 8 Similar Profiles
Jamming Engineering & Materials Science
Long Term Evolution (LTE) Engineering & Materials Science
Communication Engineering & Materials Science
Global positioning system Engineering & Materials Science
Frequency hopping Engineering & Materials Science
Network protocols Engineering & Materials Science
Internet Engineering & Materials Science
Spread spectrum communication Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2008 2019

  • 21 Conference contribution
  • 3 Article
  • 2 Editorial

Breaking LTE on Layer Two

Rupprecht, D., Kohls, K., Holz, T. & Poepper, C., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 1121-1136 16 p. 8835335. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Long Term Evolution (LTE)
Websites
Network protocols
Communication
Critical infrastructures

Lost traffic encryption: Fingerprinting LTE/4G traffic on layer two

Kohls, K., Rupprecht, D., Holz, T. & Poepper, C., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 249-260 12 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Long Term Evolution (LTE)
Cryptography
Websites
Network layers
Metadata

LTE security disabled-misconfiguration in commercial networks

Chlosta, M., Rupprecht, D., Holz, T. & Poepper, C., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 261-266 6 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Long Term Evolution (LTE)
Cryptography
Specifications
Communication
Costs

Towards contractual agreements for revocation of online data

Schnitzler, T., Dürmuth, M. & Poepper, C., Jan 1 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer New York LLC, p. 374-387 14 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Personal data
Threat
Prototype
Incentives
Privacy

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

Jansen, K., Schafer, M., Moser, D., Lenders, V., Poepper, C. & Schmitt, J., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-May. p. 1018-1031 14 p. 8418651

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Global positioning system
Unmanned aerial vehicles (UAV)
Air
Monitoring
Air traffic control