Breaking LTE on Layer Two D Rupprecht, K Kohls, T Holz, C Pöpper IEEE Symposium on Security & Privacy (SP), 2019 | 216 | 2019 |
On Security Research towards Future Mobile Network Generations D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper IEEE Communications Surveys & Tutorials, 2018 | 119 | 2018 |
IMP4GT: IMPersonation Attacks in 4G NeTworks D Rupprecht, K Kohls, T Holz, C Pöpper Network and Distributed System Security Symposium (NDSS), 2020 | 70 | 2020 |
LTE Security Disabled: Misconfiguration in Commercial Networks M Chlosta, D Rupprecht, T Holz, C Pöpper Conference on Security and Privacy in Wireless and Mobile Networks, 261-266, 2019 | 66 | 2019 |
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness D Rupprecht, K Jansen, C Pöpper 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 65 | 2016 |
Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two K Kohls, D Rupprecht, T Holz, C Pöpper Conference on Security and Privacy in Wireless and Mobile Networks, 249-260, 2019 | 57 | 2019 |
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE D Rupprecht, K Kohls, T Holz, C Pöpper USENIX Security Symposium 2020, 2020 | 51 | 2020 |
5G SUCI-Catchers: Still catching them all? M Chlosta, D Rupprecht, C Pöpper, T Holz Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 48 | 2021 |
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 C Beierle, P Derbez, G Leander, G Leurent, H Raddum, Y Rotella, ... Annual International Conference on the Theory and Applications of …, 2021 | 27 | 2021 |
On the Challenges of Geographical Avoidance for Tor. K Kohls, K Jansen, D Rupprecht, T Holz, C Pöpper Network and Distributed System Security Symposium (NDSS), 2019 | 26 | 2019 |
On the challenges of automata reconstruction in lte networks M Chlosta, D Rupprecht, T Holz Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 9 | 2021 |
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G B Karakoc, N Fürste, D Rupprecht, K Kohls Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023 | 4 | 2023 |
Instructions unclear: undefined behaviour in cellular network specifications D Klischies, M Schloegel, T Scharnowski, M Bogodukhov, D Rupprecht, ... 32nd USENIX Security Symposium (USENIX Security 23), 3475-3492, 2023 | 2 | 2023 |
Enhancing the security of 4G and 5G mobile networks on protocol layer two D Rupprecht Dissertation, Bochum, Ruhr-Universität Bochum, 2020, 2021 | 2 | 2021 |
BigMac: Performance Overhead of User Plane Integrity Protection in 5G networks T Heijligenberg, G Knips, C Böhm, D Rupprecht, K Kohls Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023 | 1 | 2023 |
Intrusion Detection System for 5G Core Systems T Hammouchi, D Rupprecht, KS Kohls | | 2023 |
Security analysis of a TETRA Base J Jagt, CMM Blue, WBM Blue, E Poll, D Rupprecht | | 2023 |