Breaking LTE on Layer Two D Rupprecht, K Kohls, T Holz, C Pöpper IEEE Symposium on Security & Privacy (SP), 2019 | 239 | 2019 |
On Security Research towards Future Mobile Network Generations D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper IEEE Communications Surveys & Tutorials, 2018 | 132 | 2018 |
IMP4GT: IMPersonation Attacks in 4G NeTworks D Rupprecht, K Kohls, T Holz, C Pöpper Network and Distributed System Security Symposium (NDSS), 2020 | 78 | 2020 |
LTE Security Disabled: Misconfiguration in Commercial Networks M Chlosta, D Rupprecht, T Holz, C Pöpper Conference on Security and Privacy in Wireless and Mobile Networks, 261-266, 2019 | 76 | 2019 |
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness D Rupprecht, K Jansen, C Pöpper 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 69 | 2016 |
Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two K Kohls, D Rupprecht, T Holz, C Pöpper Conference on Security and Privacy in Wireless and Mobile Networks, 249-260, 2019 | 68 | 2019 |
5G SUCI-Catchers: Still catching them all? M Chlosta, D Rupprecht, C Pöpper, T Holz Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 59 | 2021 |
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE D Rupprecht, K Kohls, T Holz, C Pöpper USENIX Security Symposium 2020, 2020 | 59 | 2020 |
Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 C Beierle, P Derbez, G Leander, G Leurent, H Raddum, Y Rotella, ... Annual International Conference on the Theory and Applications of …, 2021 | 33 | 2021 |
On the Challenges of Geographical Avoidance for Tor. K Kohls, K Jansen, D Rupprecht, T Holz, C Pöpper Network and Distributed System Security Symposium (NDSS), 2019 | 29 | 2019 |
On the challenges of automata reconstruction in lte networks M Chlosta, D Rupprecht, T Holz Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 13 | 2021 |
Never let me down again: Bidding-down attacks and mitigations in 5g and 4g B Karakoc, N Fürste, D Rupprecht, K Kohls Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023 | 11 | 2023 |
Instructions unclear: Undefined behaviour in cellular network specifications D Klischies, M Schloegel, T Scharnowski, M Bogodukhov, D Rupprecht, ... 32nd USENIX Security Symposium (USENIX Security 23), 3475-3492, 2023 | 5 | 2023 |
Bigmac: Performance overhead of user plane integrity protection in 5g networks T Heijligenberg, G Knips, C Böhm, D Rupprecht, K Kohls Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023 | 4 | 2023 |
Enhancing the security of 4G and 5G mobile networks on protocol layer two D Rupprecht Dissertation, Bochum, Ruhr-Universität Bochum, 2020, 2021 | 2 | 2021 |
Poster: Developing an O-RAN Security Test Lab S Michaelides, D Rupprecht, K Kohls arXiv preprint arXiv:2409.01107, 2024 | | 2024 |
The attacks aren’t alright: Large-Scale Simulation of Fake Base Station Attacks and Detections T Heijligenberg, D Rupprecht, K Kohls Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 54-64, 2024 | | 2024 |
Intrusion Detection System for 5G Core Systems T Hammouchi, D Rupprecht, KS Kohls | | 2023 |
Security analysis of a TETRA Base J Jagt, CMM Blue, WBM Blue, E Poll, D Rupprecht | | 2023 |