Follow
Katharina Kohls
Title
Cited by
Cited by
Year
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
L Schönherr, K Kohls, S Zeiler, T Holz, D Kolossa
Network and Distributed System Security Symposium (NDSS), 2019
3572019
Breaking LTE on Layer Two
D Rupprecht, K Kohls, T Holz, C Pöpper
IEEE Symposium on Security and Privacy, 0, 2019
2392019
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
R Sundara Raman, P Shenoy, K Kohls, R Ensafi
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
1062020
IMP4GT: IMPersonation Attacks in 4G NeTworks
D Rupprecht, K Kohls, T Holz, C Pöpper
Symposium on Network and Distributed System Security (NDSS). ISOC, 2020
782020
Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two
K Kohls, D Rupprecht, T Holz, C Pöpper
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
682019
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE.
D Rupprecht, K Kohls, T Holz, C Pöpper
USENIX Security Symposium, 73-88, 2020
592020
On the Challenges of Geographical Avoidance for Tor
K Kohls, K Jansen, D Rupprecht, T Holz, C Pöpper
Network and Distributed System Security Symposium (NDSS), 2019
292019
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
A Zarras, K Kohls, M Dürmuth, C Pöpper
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
292016
Skypeline: Robust hidden data transmission for VoIP
K Kohls, T Holz, D Kolossa, C Pöpper
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
282016
{VerLoc}: Verifiable Localization in Decentralized Systems
K Kohls, C Diaz
31st USENIX Security Symposium (USENIX Security 22), 2637-2654, 2022
202022
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor
V Rimmer, T Schnitzler, T Van Goethem, AR Romero, W Joosen, K Kohls
Proceedings on Privacy Enhancing Technologies 3, 314-335, 2022
122022
Preliminary Analysis of Potential Harms in the Luca Tracing System
T Stadler, W Lueks, K Kohls, C Troncoso
arXiv preprint arXiv:2103.11958, 2021
122021
Never let me down again: Bidding-down attacks and mitigations in 5g and 4g
B Karakoc, N Fürste, D Rupprecht, K Kohls
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023
112023
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
K Kohls, C Pöpper
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
92018
I-DWRR—An insolvency enabled scheduling scheme extending Deficit Weighted Round Robin
PB Bök, K Kohls, Y Tüchelmann, K Kollorz
2011 IEEE GLOBECOM Workshops (GC Wkshps), 695-700, 2011
92011
POSTER: Traffic Analysis Attacks in Anonymity Networks
KS Kohls, C Pöpper
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
62017
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor
T Schnitzler, C Pöpper, M Dürmuth, K Kohls
European Symposium on Security and Privacy, 2021
52021
Distributed flow permission inspection for mission-critical communication of untrusted autonomous vehicles
PB Bok, KS Kohls, D Behnke, C Wietfeld
2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 1-6, 2014
52014
Bigmac: Performance overhead of user plane integrity protection in 5g networks
T Heijligenberg, G Knips, C Böhm, D Rupprecht, K Kohls
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023
42023
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers
T Schnitzler, K Kohls, E Bitsikas, C Pöpper
arXiv preprint arXiv:2210.10523, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20