No photo of Christina Poepper

Christina Poepper

Assistant Professor of Computer Science

20082019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Weighted list of dominant concepts in the researcher's publications (titles and abstracts).

  • 11 Similar Profiles
Jamming Engineering & Materials Science
Communication Engineering & Materials Science
Global positioning system Engineering & Materials Science
Frequency hopping Engineering & Materials Science
Long Term Evolution (LTE) Engineering & Materials Science
Network protocols Engineering & Materials Science
Internet Engineering & Materials Science
Spread spectrum communication Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2008 2019

  • 20 Conference contribution
  • 3 Article
  • 2 Editorial

Lost traffic encryption: Fingerprinting LTE/4G traffic on layer two

Kohls, K., Rupprecht, D., Holz, T. & Poepper, C., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 249-260 12 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Long Term Evolution (LTE)
Cryptography
Websites
Network layers
Metadata

LTE security disabled-misconfiguration in commercial networks

Chlosta, M., Rupprecht, D., Holz, T. & Poepper, C., May 15 2019, WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 261-266 6 p. (WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Long Term Evolution (LTE)
Cryptography
Specifications
Communication
Costs

Towards contractual agreements for revocation of online data

Schnitzler, T., Dürmuth, M. & Poepper, C., Jan 1 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer New York LLC, p. 374-387 14 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Personal data
Threat
Prototype
Incentives
Privacy

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

Jansen, K., Schafer, M., Moser, D., Lenders, V., Poepper, C. & Schmitt, J., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-May. p. 1018-1031 14 p. 8418651

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Global positioning system
Unmanned aerial vehicles (UAV)
Air
Monitoring
Air traffic control

DigesTor: Comparing passive traffic analysis attacks on tor

Kohls, K. & Poepper, C., Jan 1 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Lopez, J., Zhou, J. & Soriano, M. (eds.). Springer-Verlag, p. 512-530 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11098 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual private networks
Traffic Analysis
Attack
Anonymity
Countermeasures