Breaking LTE on Layer Two D Rupprecht, K Kohls, T Holz, C Pöpper IEEE Symposium on Security & Privacy (SP), 2019 | 68 | 2019 |
On Security Research towards Future Mobile Network Generations D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper IEEE Communications Surveys & Tutorials, 2018 | 49 | 2018 |
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness D Rupprecht, K Jansen, C Pöpper 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 25 | 2016 |
LTE Security Disabled: Misconfiguration in Commercial Networks M Chlosta, D Rupprecht, T Holz, C Pöpper Conference on Security and Privacy in Wireless and Mobile Networks, 261-266, 2019 | 9 | 2019 |
Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two K Kohls, D Rupprecht, T Holz, C Pöpper Conference on Security and Privacy in Wireless and Mobile Networks, 249-260, 2019 | 8 | 2019 |
On the Challenges of Geographical Avoidance for Tor. K Kohls, K Jansen, D Rupprecht, T Holz, C Pöpper Network and Distributed System Security Symposium (NDSS), 2019 | 6 | 2019 |
IMP4GT: IMPersonation Attacks in 4G NeTworks D Rupprecht, K Kohls, T Holz, C Pöpper Network and Distributed System Security Symposium (NDSS), 2020 | 3 | 2020 |
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE D Rupprecht, K Kohls, T Holz, C Pöpper USENIX Security Symposium 2020, 2020 | 2 | 2020 |