Christina Pöpper

Orcid: 0000-0002-2814-962X

Affiliations:
  • New York University Abu Dhabi, UEA


According to our database1, Christina Pöpper authored at least 53 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Global-Liar: Factuality of LLMs over Time and Geographic Regions.
CoRR, 2024

2023
Unveiling the Sentinels: Assessing AI Performance in Cybersecurity Peer Review.
CoRR, 2023

Extending Browser Extension Fingerprinting to Mobile Devices.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables.
Proceedings of the 32nd USENIX Security Symposium, 2023

CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot.
Proceedings of the 32nd USENIX Security Symposium, 2023

Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings.
Proceedings of the 32nd USENIX Security Symposium, 2023

Hope of Delivery: Extracting User Locations From Mobile Instant Messengers.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Tactics, Threats & Targets: Modeling Disinformation and its Mitigation.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Towards Security-Optimized Placement of ADS-B Sensors.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

You have been warned: Abusing 5G's Warning and Emergency Systems.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data.
Proc. Priv. Enhancing Technol., 2021

Cyber security research in the Arab region: a blooming ecosystem with global ambitions.
Commun. ACM, 2021

5G SUCI-catchers: still catching them all?
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

High we Fly: Wireless Witnessing and Crowdsourcing for Air-Traffic Communication Security.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Exploring user perceptions of deletion in mobile instant messaging applications.
J. Cybersecur., 2020

Protecting wi-fi beacons from outsider forgeries.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE.
Proceedings of the 29th USENIX Security Symposium, 2020

Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Proceedings of the 29th USENIX Security Symposium, 2020

IMP4GT: IMPersonation Attacks in 4G NeTworks.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

LTE security disabled: misconfiguration in commercial networks.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Breaking LTE on Layer Two.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Towards Contractual Agreements for Revocation of Online Data.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

On the Challenges of Geographical Avoidance for Tor.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
On Security Research Towards Future Mobile Network Generations.
IEEE Commun. Surv. Tutorials, 2018

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

DigesTor: Comparing Passive Traffic Analysis Attacks on Tor.
Proceedings of the Computer Security, 2018

Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Advancing attacker models of satellite-based localization systems: the case of multi-device attackers.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Traffic Analysis Attacks in Anonymity Networks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

SkypeLine: Robust Hidden Data Transmission for VoIP.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Multi-receiver GPS spoofing detection: error models and realization.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
A practical investigation of identity theft vulnerabilities in Eduroam.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

2014
Enabling Short Fragments for Uncoordinated Spread Spectrum Communication.
Proceedings of the Computer Security - ESORICS 2014, 2014

2011
On Secure Wireless Communication under Adversarial Interference.
PhD thesis, 2011

Investigation of Signal and Message Manipulations on the Wireless Channel.
Proceedings of the Computer Security - ESORICS 2011, 2011

On the requirements for successful GPS spoofing attacks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques.
IEEE J. Sel. Areas Commun., 2010

Keeping data secret under full compromise using porter devices.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Jamming-resistant Broadcast Communication without Shared Keys.
Proceedings of the 18th USENIX Security Symposium, 2009

Attacks on public WLAN-based positioning systems.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Efficient uncoordinated FHSS anti-jamming communication.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

2008
Secure Time Synchronization in Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008


  Loading...