Follow
Katharina Kohls
Title
Cited by
Cited by
Year
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
L Schönherr, K Kohls, S Zeiler, T Holz, D Kolossa
Network and Distributed System Security Symposium (NDSS), 2019
3242019
Breaking LTE on Layer Two
D Rupprecht, K Kohls, T Holz, C Pöpper
IEEE Symposium on Security and Privacy, 0, 2019
2142019
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
R Sundara Raman, P Shenoy, K Kohls, R Ensafi
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
892020
IMP4GT: IMPersonation Attacks in 4G NeTworks
D Rupprecht, K Kohls, T Holz, C Pöpper
Symposium on Network and Distributed System Security (NDSS). ISOC, 2020
682020
Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two
K Kohls, D Rupprecht, T Holz, C Pöpper
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
562019
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE.
D Rupprecht, K Kohls, T Holz, C Pöpper
USENIX Security Symposium, 73-88, 2020
512020
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
A Zarras, K Kohls, M Dürmuth, C Pöpper
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
302016
On the Challenges of Geographical Avoidance for Tor
K Kohls, K Jansen, D Rupprecht, T Holz, C Pöpper
Network and Distributed System Security Symposium (NDSS), 2019
252019
Skypeline: Robust hidden data transmission for VoIP
K Kohls, T Holz, D Kolossa, C Pöpper
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
252016
Preliminary Analysis of Potential Harms in the Luca Tracing System
T Stadler, W Lueks, K Kohls, C Troncoso
arXiv preprint arXiv:2103.11958, 2021
122021
{VerLoc}: Verifiable Localization in Decentralized Systems
K Kohls, C Diaz
31st USENIX Security Symposium (USENIX Security 22), 2637-2654, 2022
112022
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor
V Rimmer, T Schnitzler, T Van Goethem, AR Romero, W Joosen, K Kohls
Proceedings on Privacy Enhancing Technologies 3, 314-335, 2022
102022
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
K Kohls, C Pöpper
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
92018
I-DWRR—An insolvency enabled scheduling scheme extending Deficit Weighted Round Robin
PB Bök, K Kohls, Y Tüchelmann, K Kollorz
2011 IEEE GLOBECOM Workshops (GC Wkshps), 695-700, 2011
92011
POSTER: Traffic Analysis Attacks in Anonymity Networks
KS Kohls, C Pöpper
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
52017
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor
T Schnitzler, C Pöpper, M Dürmuth, K Kohls
European Symposium on Security and Privacy, 2021
42021
Distributed flow permission inspection for mission-critical communication of untrusted autonomous vehicles
PB Bok, KS Kohls, D Behnke, C Wietfeld
2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 1-6, 2014
42014
BIM-basierte Bauablaufsimulation von Hochbauten
K Kohls, M Block, A Marx, M Hamm
Forum Bauinformatik, 145-152, 2010
42010
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G
B Karakoc, N Fürste, D Rupprecht, K Kohls
32023
Validating the accuracy of the MaxMind GeoLite2 City database
M Schopman, HPE Vranken, K Kohls
Technical report, Radboud University, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20