Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well A Dabrowski, J Ullrich, ER Weippl Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 114 | 2017 |
Measuring Cookies and Web Privacy in a Post-GDPR World A Dabrowski, G Merzdovnik, J Ullrich, G Sendera, E Weippl International Conference on Passive and Active Network Measurement, 258-270, 2019 | 107 | 2019 |
From Hack to Elaborate Technique—A Survey on Binary Rewriting M Wenzl, G Merzdovnik, J Ullrich, E Weippl ACM Computing Surveys (CSUR) 52 (3), 49, 2019 | 87 | 2019 |
A Trust-based Resilient Routing Mechanism for the Internet of Things ZA Khan, J Ullrich, AG Voyiatzis, P Herrmann Proceedings of the 12th International Conference on Availability …, 2017 | 67 | 2017 |
QR Inception: Barcode-in-Barcode Attacks A Dabrowski, K Krombholz, J Ullrich, ER Weippl Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014 | 54 | 2014 |
IPv6 security: attacks and countermeasures in a nutshell J Ullrich, K Krombholz, H Hobel, A Dabrowski, E Weippl Proceedings of the 8th USENIX conference on Offensive Technologies, 5-5, 2014 | 52 | 2014 |
On reconnaissance with IPv6: a pattern-based scanning approach J Ullrich, P Kieseberg, K Krombholz, E Weippl 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 50 | 2015 |
QR Code Security--How Secure and Usable Apps Can Protect Users Against Malicious QR Codes K Krombholz, P Frühwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 43 | 2015 |
The role and security of firewalls in cyber-physical cloud computing J Ullrich, J Cropper, P Frühwirt, E Weippl EURASIP Journal on Information Security 2016 (1), 18, 2016 | 36 | 2016 |
Cloudoscopy: Services discovery and topology mapping A Herzberg, H Shulman, J Ullrich, E Weippl Proceedings of the 2013 ACM workshop on Cloud computing security workshop …, 2013 | 34 | 2013 |
Network-based secret communication in clouds: a survey J Ullrich, T Zseby, J Fabini, E Weippl IEEE Communications Surveys & Tutorials 19 (2), 1112-1144, 2017 | 21 | 2017 |
Towards a hardware Trojan detection cycle A Dabrowski, H Hobel, J Ullrich, K Krombholz, E Weippl 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 20 | 2014 |
Lightweight address hopping for defending the IPv6 IoT A Judmayer, J Ullrich, G Merzdovnik, AG Voyiatzis, E Weippl Proceedings of the 12th International Conference on Availability …, 2017 | 18 | 2017 |
The Role and Security of Firewalls in IaaS Cloud Computing J Cropper, J Ullrich, P Frühwirt, E Weippl Availability, Reliability and Security (ARES), 2015 10th International …, 2015 | 16 | 2015 |
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018 | 15 | 2018 |
Secure cyber-physical production systems: Solid steps towards realization J Ullrich, AG Voyiatzis, ER Weippl 2016 1st International Workshop on Cyber-Physical Production Systems (CPPS), 1-4, 2016 | 11 | 2016 |
Not that Simple: Email Delivery in the 21st Century F Holzbauer, J Ullrich, M Lindorfer, T Fiebig 2022 USENIX Annual Technical Conference (USENIX ATC 22), 295-308, 2022 | 9 | 2022 |
Privacy is Not an Option: Attacking the IPv6 Privacy Extension J Ullrich, E Weippl Research in Attacks, Intrusions, and Defenses, 448-468, 2015 | 9 | 2015 |
Poster: Hardware trojans-detect and react? A Dabrowski, P Fejes, J Ullrich, K Krombholz, H Hobel, E Weippl Network and Distributed System Security (NDSS) Symposium, 2014 | 9 | 2014 |
A Performance Assessment of Network Address Shuffling in IoT Systems A Judmayer, G Merzdovnik, J Ullrich, AG Voyiatzis, E Weippl International Conference on Computer Aided Systems Theory, 197-204, 2017 | 6 | 2017 |