Breaking LTE on Layer Two D Rupprecht, K Kohls, T Holz, C Pöpper IEEE Symposium on Security & Privacy (SP), 2019 | 256 | 2019 |
On Security Research towards Future Mobile Network Generations D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper IEEE Communications Surveys & Tutorials, 2018 | 144 | 2018 |
IMP4GT: IMPersonation Attacks in 4G NeTworks D Rupprecht, K Kohls, T Holz, C Pöpper Network and Distributed System Security Symposium (NDSS), 2020 | 88 | 2020 |
LTE Security Disabled: Misconfiguration in Commercial Networks M Chlosta, D Rupprecht, T Holz, C Pöpper Conference on Security and Privacy in Wireless and Mobile Networks, 261-266, 2019 | 83 | 2019 |
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness D Rupprecht, K Jansen, C Pöpper 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 73 | 2016 |
5G SUCI-Catchers: Still catching them all? M Chlosta, D Rupprecht, C Pöpper, T Holz Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 70 | 2021 |
Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two K Kohls, D Rupprecht, T Holz, C Pöpper Conference on Security and Privacy in Wireless and Mobile Networks, 249-260, 2019 | 68 | 2019 |
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE D Rupprecht, K Kohls, T Holz, C Pöpper USENIX Security Symposium 2020, 2020 | 66 | 2020 |
Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 C Beierle, P Derbez, G Leander, G Leurent, H Raddum, Y Rotella, ... Annual International Conference on the Theory and Applications of …, 2021 | 36 | 2021 |
On the Challenges of Geographical Avoidance for Tor. K Kohls, K Jansen, D Rupprecht, T Holz, C Pöpper Network and Distributed System Security Symposium (NDSS), 2019 | 31 | 2019 |
Never let me down again: Bidding-down attacks and mitigations in 5g and 4g B Karakoc, N Fürste, D Rupprecht, K Kohls Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023 | 20 | 2023 |
On the challenges of automata reconstruction in lte networks M Chlosta, D Rupprecht, T Holz Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 16 | 2021 |
Instructions unclear: undefined behaviour in cellular network specifications D Klischies, M Schloegel, T Scharnowski, M Bogodukhov, D Rupprecht, ... 32nd USENIX Security Symposium (USENIX Security 23), 3475-3492, 2023 | 10 | 2023 |
BigMac: Performance overhead of user plane integrity protection in 5g networks T Heijligenberg, G Knips, C Böhm, D Rupprecht, K Kohls Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023 | 4 | 2023 |
Enhancing the security of 4G and 5G mobile networks on protocol layer two D Rupprecht Dissertation, Bochum, Ruhr-Universität Bochum, 2020, 2021 | 3 | 2021 |
The attacks aren’t alright: Large-Scale Simulation of Fake Base Station Attacks and Detections T Heijligenberg, D Rupprecht, K Kohls Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 54-64, 2024 | 2 | 2024 |
Intrusion detection system for 5g core systems T Hammouchi, D Rupprecht, K Kohls Ph. D. dissertation, 2023 | 1 | 2023 |
Poster: Developing an O-RAN Security Test Lab S Michaelides, D Rupprecht, K Kohls arXiv preprint arXiv:2409.01107, 2024 | | 2024 |
Never let me down again B Karakoc, N Fürste, D Rupprecht, K Kohls | | 2023 |
Security analysis of a TETRA Base J Jagt, CMM Blue, WBM Blue, E Poll, D Rupprecht | | 2023 |