David Rupprecht

Orcid: 0000-0001-5880-013X

According to our database1, David Rupprecht authored at least 20 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Poster: Developing an O-RAN Security Test Lab.
CoRR, 2024

The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections.
Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 2024

2023
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Instructions Unclear: Undefined Behaviour in Cellular Network Specifications.
Proceedings of the 32nd USENIX Security Symposium, 2023

2021
Enhancing the security of 4G and 5G mobile networks on protocol layer two.
PhD thesis, 2021

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.
IACR Cryptol. ePrint Arch., 2021

5G SUCI-catchers: still catching them all?
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

On the challenges of automata reconstruction in LTE networks.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2020
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE.
Proceedings of the 29th USENIX Security Symposium, 2020

IMP4GT: IMPersonation Attacks in 4G NeTworks.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

LTE security disabled: misconfiguration in commercial networks.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Breaking LTE on Layer Two.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

On the Challenges of Geographical Avoidance for Tor.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
On Security Research Towards Future Mobile Network Generations.
IEEE Commun. Surv. Tutorials, 2018

2016
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

2004
Semi-numerical absolute factorization of polynomials with integer coefficients.
J. Symb. Comput., 2004

2002
Irreducible Decomposition of Curves.
J. Symb. Comput., 2002

2001
Semi-numerical determination of irreducible branches of a reduced space curve.
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001


  Loading...