Johanna Ullrich

Orcid: 0000-0003-0297-9614

According to our database1, Johanna Ullrich authored at least 25 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An extended view on measuring tor AS-level adversaries.
Comput. Secur., September, 2023

In the loop: A measurement study of persistent routing loops on the IPv4/IPv6 Internet.
Comput. Networks, February, 2023

2022
Not that Simple: Email Delivery in the 21st Century.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

2019
From Hack to Elaborate Technique - A Survey on Binary Rewriting.
ACM Comput. Surv., 2019

Measuring Cookies and Web Privacy in a Post-GDPR World.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

2018
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid.
Elektrotech. Informationstechnik, 2018

Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2017
Network-Based Secret Communication in Clouds: A Survey.
IEEE Commun. Surv. Tutorials, 2017

A Performance Assessment of Network Address Shuffling in IoT Systems.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2017, 2017

Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

A Trust-based Resilient Routing Mechanism for the Internet of Things.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Lightweight Address Hopping for Defending the IPv6 IoT.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
The role and security of firewalls in cyber-physical cloud computing.
EURASIP J. Inf. Secur., 2016

The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor.
Proceedings of the Computer Security - ESORICS 2016, 2016

Secure cyber-physical production systems: Solid steps towards realization.
Proceedings of the 1st International Workshop on Cyber-Physical Production Systems, 2016

2015
CyPhySec: Defending Cyber-Physical Systems.
ERCIM News, 2015

Privacy is Not an Option: Attacking the IPv6 Privacy Extension.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

On Reconnaissance with IPv6: A Pattern-Based Scanning Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

The Role and Security of Firewalls in IaaS Cloud Computing.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Protection through isolation: Virtues and pitfalls.
Proceedings of the Cloud Security Ecosystem, 2015

2014
IPv6 Security: Attacks and Countermeasures in a Nutshell.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

QR Inception: Barcode-in-Barcode Attacks.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

Towards a Hardware Trojan Detection Cycle.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Cloudoscopy: services discovery and topology mapping.
Proceedings of the CCSW'13, 2013


  Loading...