default search action
Katharina Kohls
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Thijs Heijligenberg, David Rupprecht, Katharina Kohls:
The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections. CSET @ USENIX Security Symposium 2024: 54-64 - [i5]Sotiris Michaelides, David Rupprecht, Katharina Kohls:
Poster: Developing an O-RAN Security Test Lab. CoRR abs/2409.01107 (2024) - 2023
- [c20]Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper:
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers. NDSS 2023 - [c19]Bedran Karakoc, Nils Fürste, David Rupprecht, Katharina Kohls:
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G. WISEC 2023: 97-108 - [c18]Thijs Heijligenberg, Guido Knips, Christian Böhm, David Rupprecht, Katharina Kohls:
BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks. WISEC 2023: 145-150 - 2022
- [j1]Vera Rimmer, Theodor Schnitzler, Tom van Goethem, Abel Rodríguez Romero, Wouter Joosen, Katharina Kohls:
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor. Proc. Priv. Enhancing Technol. 2022(3): 314-335 (2022) - [c17]Thijs Heijligenberg, Oualid Lkhaouni, Katharina Kohls:
Leaky Blinders: Information Leakage in Mobile VPNs. ACNS Workshops 2022: 481-494 - [c16]Katharina Kohls, Claudia Díaz:
VerLoc: Verifiable Localization in Decentralized Systems. USENIX Security Symposium 2022: 2637-2654 - [i4]Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper:
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers. CoRR abs/2210.10523 (2022) - 2021
- [c15]Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls:
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor. EuroS&P 2021: 319-336 - [i3]Theresa Stadler, Wouter Lueks, Katharina Kohls, Carmela Troncoso:
Preliminary Analysis of Potential Harms in the Luca Tracing System. CoRR abs/2103.11958 (2021) - [i2]Katharina Kohls, Claudia Díaz:
VerLoc: Verifiable Localization in Decentralized Systems. CoRR abs/2105.11928 (2021) - 2020
- [c14]Ram Sundara Raman, Prerana Shenoy, Katharina Kohls, Roya Ensafi:
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. CCS 2020: 49-66 - [c13]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
IMP4GT: IMPersonation Attacks in 4G NeTworks. NDSS 2020 - [c12]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. USENIX Security Symposium 2020: 73-88
2010 – 2019
- 2019
- [b1]Katharina Siobhan Kohls:
Internet anonymity and privacy in the presence of large-scale adversaries. Ruhr University Bochum, Germany, 2019 - [c11]Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper:
On the Challenges of Geographical Avoidance for Tor. NDSS 2019 - [c10]Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. NDSS 2019 - [c9]David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
Breaking LTE on Layer Two. IEEE Symposium on Security and Privacy 2019: 1121-1136 - [c8]Katharina Kohls, David Rupprecht, Thorsten Holz, Christina Pöpper:
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two. WiSec 2019: 249-260 - 2018
- [c7]Katharina Kohls, Christina Pöpper:
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor. ESORICS (1) 2018: 512-530 - [i1]Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. CoRR abs/1808.05665 (2018) - 2017
- [c6]Katharina Siobhan Kohls, Christina Pöpper:
Traffic Analysis Attacks in Anonymity Networks. AsiaCCS 2017: 917-919 - 2016
- [c5]Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper:
SkypeLine: Robust Hidden Data Transmission for VoIP. AsiaCCS 2016: 877-888 - [c4]Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper:
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data. CODASPY 2016: 14-25 - 2014
- [c3]Patrick-Benjamin Bok, Katharina Siobhan Kohls, Daniel Behnke, Christian Wietfeld:
Distributed Flow Permission Inspection for Mission-Critical Communication of Untrusted Autonomous Vehicles. VTC Fall 2014: 1-6 - 2012
- [c2]Patrick-Benjamin Bök, Katharina Kohls, Stephanie Dünhaupt, York Tüchelmann:
Improving the Distributed Fair Congestion Avoidance Protocol for Home Area Networks with Internet Access Links. ICCCN 2012: 1-6 - 2011
- [c1]Patrick-Benjamin Bök, Katharina Kohls, York Tüchelmann, Kolja Kollorz:
I-DWRR - An insolvency enabled scheduling scheme extending Deficit Weighted Round Robin. GLOBECOM Workshops 2011: 695-700
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint