Katharina Kohls
Radboud Universiteit
H-index: 10
Europe-Netherlands
Top articles of Katharina Kohls
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G | Bedran Karakoc Nils Fürste David Rupprecht Katharina Kohls | 2023 | |
Data Exfiltration Detection on Network Metadata with Autoencoders | Electronics | Daan Willems Katharina Kohls Bob van der Kamp Harald Vranken | 2023/6/8 |
BigMac: Performance Overhead of User Plane Integrity Protection in 5G networks | Thijs Heijligenberg Guido Knips Christian Böhm David Rupprecht Katharina Kohls | 2023/5/29 | |
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers | Theodor Schnitzler Katharina Kohls Evangelos Bitsikas Christina Pöpper | 2023/2/28 | |
Leaky Blinders: Information Leakage in Mobile VPNs | Thijs Heijligenberg Oualid Lkhaouni Katharina Kohls | 2022/6/20 | |
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor | Proceedings on Privacy Enhancing Technologies | Vera Rimmer Theodor Schnitzler Tom Van Goethem Abel Rodríguez Romero Wouter Joosen | 2022 |
{VerLoc}: Verifiable Localization in Decentralized Systems | Katharina Kohls Claudia Diaz | 2022 | |
Validating the accuracy of the MaxMind GeoLite2 City database | Mike Schopman HPE Vranken K Kohls | 2021/6/3 | |
Preliminary Analysis of Potential Harms in the Luca Tracing System | arXiv preprint arXiv:2103.11958 | Theresa Stadler Wouter Lueks Katharina Kohls Carmela Troncoso | 2021/3/22 |
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor | Theodor Schnitzler Christina Pöpper Markus Dürmuth Katharina Kohls | 2021/9/6 | |
IMP4GT: IMPersonation Attacks in 4G NeTworks | Symposium on Network and Distributed System Security (NDSS). ISOC | David Rupprecht Katharina Kohls Thorsten Holz Christina Pöpper | 2020/2 |
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory | Ram Sundara Raman Prerana Shenoy Katharina Kohls Roya Ensafi | 2020/10/30 | |
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. | David Rupprecht Katharina Kohls Thorsten Holz Christina Pöpper | 2020/8/12 |