Christina Pöpper
Orcid: 0000-0002-2814-962XAffiliations:
- New York University Abu Dhabi, UEA
According to our database1,
Christina Pöpper
authored at least 56 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
2023
CoRR, 2023
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Cyber security research in the Arab region: a blooming ecosystem with global ambitions.
Commun. ACM, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
High we Fly: Wireless Witnessing and Crowdsourcing for Air-Traffic Communication Security.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
J. Cybersecur., 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Computer Security, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Advancing attacker models of satellite-based localization systems: the case of multi-device attackers.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
IEEE J. Sel. Areas Commun., 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009
2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008