Christina Pöpper
New York University
H-index: 24
North America-United States
Top articles of Christina Pöpper
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I | Christina Pöpper | 2024/3/5 | |
Global-liar: Factuality of llms over time and geographic regions | arXiv preprint arXiv:2401.17839 | Shujaat Mirza Bruno Coelho Yuyuan Cui Christina Pöpper Damon McCoy | 2024/1/31 |
CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot | Liang Niu Shujaat Mirza Zayd Maradni Christina Pöpper | 2023 | |
Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables | Nian Xue Yashaswi Malla Zihang Xia Christina Pöpper Mathy Vanhoef | 2023 | |
Freaky Leaky {SMS}: Extracting User Locations by Analyzing {SMS} Timings | Evangelos Bitsikas Theodor Schnitzler Christina Pöpper Aanjhan Ranganathan | 2023 | |
Extending Browser Extension Fingerprinting to Mobile Devices | Brian Hyeongseok Kim Shujaat Mirza Christina Poepper | 2023/11 | |
Tactics, Threats & Targets: Modeling Disinformation and its Mitigation. | Muhammad Shujaat Mirza Labeeba Begum Liang Niu Sarah Pardo Azza Abouzied | 2023 | |
Unveiling the Sentinels: Assessing AI Performance in Cybersecurity Peer Review | arXiv preprint arXiv:2309.05457 | Liang Niu Nian Xue Christina Pöpper | 2023/9/11 |
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework | Evangelos Bitsikas Syed Khandker Ahmad Salous Aanjhan Ranganathan Roger Piqueras Jover | 2023/5/29 | |
Towards Security-Optimized Placement of ADS-B Sensors | Ala' Darabseh Christina Pöpper | 2022/5/16 | |
You have been warned: Abusing 5G’s Warning and Emergency Systems | Evangelos Bitsikas Christina Pöpper | 2022/12/5 | |
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers | Theodor Schnitzler Katharina Kohls Evangelos Bitsikas Christina Pöpper | 2023/2/28 | |
5G SUCI-Catchers: Still catching them all? | Merlin Chlosta David Rupprecht Christina Pöpper Thorsten Holz | 2021/6/28 | |
High we Fly: Wireless Witnessing and Crowdsourcing for Air-Traffic Communication Security | Christina Pöpper | 2021/5/24 | |
Cellular Privacy | Christina Pöpper | 2021/12/18 | |
Cyber security research in the Arab region: A blooming ecosystem with global ambitions | Communications of the ACM | Christina Pöpper Michail Maniatakos Roberto Di Pietro | 2021/3/22 |
Don’t hand it over: Vulnerabilities in the handover procedure of cellular telecommunications | Evangelos Bitsikas Christina Pöpper | 2021/12/6 | |
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance. | Kai Jansen Liang Niu Nian Xue Ivan Martinovic Christina Pöpper | 2021/2/21 | |
ACM WiSec 2021: Program Committee Chairs & General Chairs Report | Lejla Batina René Mayrhofer Christina Pöpper Mathy Vanhoef | 2021/10/17 | |
WiSec'21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi United Arab Emirates 28 June 2021-2 July 2021 | Christina Pöpper M Vanhoef L Batina R Mayrhofer | 2021 |