Follow
Christina Pöpper
Christina Pöpper
New York University Abu Dhabi
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
On the requirements for successful GPS spoofing attacks
NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun
Proceedings of the 18th ACM conference on Computer and communications …, 2011
6932011
Jamming-resistant key establishment using uncoordinated frequency hopping
M Strasser, C Pöpper, S Capkun, M Cagalj
Security and Privacy, 2008. SP 2008. IEEE Symposium on, 64-78, 2008
3692008
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
C Pöpper, M Strasser, S Capkun
Selected Areas in Communications, IEEE Journal on 28 (5), 703-715, 2010
2782010
Breaking LTE on Layer Two
D Rupprecht, K Kohls, T Holz, C Pöpper
IEEE Symposium on Security and Privacy, 2019
2112019
Efficient uncoordinated FHSS anti-jamming communication
M Strasser, C Pöpper, S Čapkun
Proceedings of the tenth ACM international symposium on Mobile ad hoc …, 2009
1932009
Jamming-resistant Broadcast Communication without Shared Keys.
C Pöpper, M Strasser, S Capkun
USENIX Security Symposium, 231-248, 2009
1822009
Secure time synchronization in sensor networks
S Ganeriwal, C Pöpper, S Čapkun, MB Srivastava
ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-35, 2008
1572008
Attacks on public WLAN-based positioning systems
NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun
Proceedings of the 7th international conference on Mobile systems …, 2009
1502009
Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks
K Jansen, M Schäfer, D Moser, V Lenders, C Pöpper, J Schmitt
2018 IEEE Symposium on Security and Privacy (SP), 1018-1031, 2018
1382018
On security research towards future mobile network generations
D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper
IEEE Communications Surveys & Tutorials 20 (3), 2518-2542, 2018
1172018
Investigation of signal and message manipulations on the wireless channel
C Pöpper, NO Tippenhauer, B Danev, S Capkun
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
1152011
IMP4GT: IMPersonation Attacks in 4G NeTworks.
D Rupprecht, K Kohls, T Holz, C Pöpper
NDSS, 2020
682020
Multi-receiver GPS spoofing detection: Error models and realization
K Jansen, NO Tippenhauer, C Pöpper
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
652016
Putting {LTE} security functions to the test: A framework to evaluate implementation correctness
D Rupprecht, K Jansen, C Pöpper
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
642016
LTE security disabled: misconfiguration in commercial networks
M Chlosta, D Rupprecht, T Holz, C Pöpper
Proceedings of the 12th conference on security and privacy in wireless and …, 2019
632019
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two
K Kohls, D Rupprecht, T Holz, C Pöpper
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
562019
Call me maybe: Eavesdropping encrypted {LTE} calls with {ReVoLTE}
D Rupprecht, K Kohls, T Holz, C Pöpper
29th USENIX security symposium (USENIX security 20), 73-88, 2020
512020
A Practical Investigation of Identity Theft Vulnerabilities in Eduroam
S Brenza, A Pawlowski, C Pöpper
ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec …, 2015
472015
5G SUCI-Catchers: Still catching them all?
M Chlosta, D Rupprecht, C Pöpper, T Holz
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
462021
Deepsim: Gps spoofing detection on uavs using satellite imagery matching
N Xue, L Niu, X Hong, Z Li, L Hoffaeller, C Pöpper
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
462020
The system can't perform the operation now. Try again later.
Articles 1–20