Thomas Hupperich

Orcid: 0000-0002-4981-9522

According to our database1, Thomas Hupperich authored at least 25 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Assessing the Security and Privacy of Baby Monitor Apps.
J. Cybersecur. Priv., June, 2023

On DDoS Attacks as an Expression of Digital Protest in the Russo-Ukrainian War 2022.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

2022
Improving the Performance of Opportunistic Networks in Real-World Applications Using Machine Learning Techniques.
J. Sens. Actuator Networks, 2022

Blossom: Cluster-Based Routing for Preserving Privacy in Opportunistic Networks.
J. Sens. Actuator Networks, 2022

A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus.
Proceedings of the Thirteenth Language Resources and Evaluation Conference, 2022

Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?
Proceedings of the 17th International Conference on Software Technologies, 2022

Discovering Vulnerabilities and Patches for Open Source Security.
Proceedings of the 17th International Conference on Software Technologies, 2022

2021
Unifying Privacy Policy Detection.
Proc. Priv. Enhancing Technol., 2021

Secure and privacy-preserving structure in opportunistic networks.
Comput. Secur., 2021

2020
Opportunistic Tracking in Cyber-Physical Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern Security.
Proceedings of the 19th IEEE International Conference on Trust, 2020

HeadPrint: detecting anomalous communications through header-based application fingerprinting.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2018
An Empirical Study on Online Price Differentiation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
On the feasibility and impact of digital fingerprinting for system recognition.
PhD thesis, 2017

May the Force Be with You: The Future of Force-Sensitive Authentication.
IEEE Internet Comput., 2017

An Empirical Study on Price Differentiation Based on System Fingerprints.
CoRR, 2017

2016
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016

Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Leveraging Sensor Fingerprinting for Mobile Device Authentication.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Going Wild: Large-Scale Classification of Open DNS Resolvers.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones.
Proceedings of the Financial Cryptography and Data Security, 2015

On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2012
Flexible patient-controlled security for electronic health records.
Proceedings of the ACM International Health Informatics Symposium, 2012


  Loading...