On the requirements for successful GPS spoofing attacks NO Tippenhauer, C Pöpper, KB Rasmussen, S Capkun Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 709 | 2011 |
Jamming-resistant key establishment using uncoordinated frequency hopping M Strasser, C Pöpper, S Capkun, M Cagalj Security and Privacy, 2008. SP 2008. IEEE Symposium on, 64-78, 2008 | 372 | 2008 |
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques C Pöpper, M Strasser, S Capkun Selected Areas in Communications, IEEE Journal on 28 (5), 703-715, 2010 | 280 | 2010 |
Breaking LTE on Layer Two D Rupprecht, K Kohls, T Holz, C Pöpper IEEE Symposium on Security and Privacy, 2019 | 221 | 2019 |
Efficient uncoordinated FHSS anti-jamming communication M Strasser, C Pöpper, S Čapkun Proceedings of the tenth ACM international symposium on Mobile ad hoc …, 2009 | 195 | 2009 |
Jamming-resistant Broadcast Communication without Shared Keys. C Pöpper, M Strasser, S Capkun USENIX Security Symposium, 231-248, 2009 | 183 | 2009 |
Secure time synchronization in sensor networks S Ganeriwal, C Pöpper, S Čapkun, MB Srivastava ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-35, 2008 | 157 | 2008 |
Attacks on public WLAN-based positioning systems NO Tippenhauer, KB Rasmussen, C Pöpper, S Čapkun Proceedings of the 7th international conference on Mobile systems …, 2009 | 154 | 2009 |
Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks K Jansen, M Schäfer, D Moser, V Lenders, C Pöpper, J Schmitt 2018 IEEE Symposium on Security and Privacy (SP), 1018-1031, 2018 | 146 | 2018 |
On security research towards future mobile network generations D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper IEEE Communications Surveys & Tutorials 20 (3), 2518-2542, 2018 | 122 | 2018 |
Investigation of signal and message manipulations on the wireless channel C Pöpper, NO Tippenhauer, B Danev, S Capkun Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 115 | 2011 |
IMP4GT: IMPersonation Attacks in 4G NeTworks. D Rupprecht, K Kohls, T Holz, C Pöpper NDSS, 2020 | 71 | 2020 |
LTE security disabled: misconfiguration in commercial networks M Chlosta, D Rupprecht, T Holz, C Pöpper Proceedings of the 12th conference on security and privacy in wireless and …, 2019 | 69 | 2019 |
Multi-receiver GPS spoofing detection: Error models and realization K Jansen, NO Tippenhauer, C Pöpper Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 67 | 2016 |
Putting {LTE} security functions to the test: A framework to evaluate implementation correctness D Rupprecht, K Jansen, C Pöpper 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 66 | 2016 |
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two K Kohls, D Rupprecht, T Holz, C Pöpper Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 59 | 2019 |
Call me maybe: Eavesdropping encrypted {LTE} calls with {ReVoLTE} D Rupprecht, K Kohls, T Holz, C Pöpper 29th USENIX security symposium (USENIX security 20), 73-88, 2020 | 54 | 2020 |
Deepsim: Gps spoofing detection on uavs using satellite imagery matching N Xue, L Niu, X Hong, Z Li, L Hoffaeller, C Pöpper Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 52 | 2020 |
5G SUCI-Catchers: Still catching them all? M Chlosta, D Rupprecht, C Pöpper, T Holz Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 49 | 2021 |
A Practical Investigation of Identity Theft Vulnerabilities in Eduroam S Brenza, A Pawlowski, C Pöpper ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec …, 2015 | 49 | 2015 |