Katharina Kohls

Orcid: 0000-0002-5656-7116

According to our database1, Katharina Kohls authored at least 23 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Hope of Delivery: Extracting User Locations From Mobile Instant Messengers.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor.
Proc. Priv. Enhancing Technol., 2022

VerLoc: Verifiable Localization in Decentralized Systems.
Proceedings of the 31st USENIX Security Symposium, 2022

Leaky Blinders: Information Leakage in Mobile VPNs.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Preliminary Analysis of Potential Harms in the Luca Tracing System.
CoRR, 2021

We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE.
Proceedings of the 29th USENIX Security Symposium, 2020

IMP4GT: IMPersonation Attacks in 4G NeTworks.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Censored Planet: An Internet-wide, Longitudinal Censorship Observatory.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Internet anonymity and privacy in the presence of large-scale adversaries.
PhD thesis, 2019

Lost traffic encryption: fingerprinting LTE/4G traffic on layer two.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Breaking LTE on Layer Two.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

On the Challenges of Geographical Avoidance for Tor.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor.
Proceedings of the Computer Security, 2018

2017
Traffic Analysis Attacks in Anonymity Networks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

SkypeLine: Robust Hidden Data Transmission for VoIP.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2014
Distributed Flow Permission Inspection for Mission-Critical Communication of Untrusted Autonomous Vehicles.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

2012
Improving the Distributed Fair Congestion Avoidance Protocol for Home Area Networks with Internet Access Links.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

2011
I-DWRR - An insolvency enabled scheduling scheme extending Deficit Weighted Round Robin.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011


  Loading...