Johanna Ullrich
Johanna Ullrich
Bestätigte E-Mail-Adresse bei sba-research.org - Startseite
TitelZitiert vonJahr
IPv6 security: attacks and countermeasures in a nutshell
J Ullrich, K Krombholz, H Hobel, A Dabrowski, E Weippl
Proceedings of the 8th USENIX conference on Offensive Technologies, 5-5, 2014
332014
Cloudoscopy: Services discovery and topology mapping
A Herzberg, H Shulman, J Ullrich, E Weippl
Proceedings of the 2013 ACM workshop on Cloud computing security workshop …, 2013
262013
QR Inception: Barcode-in-Barcode Attacks
A Dabrowski, K Krombholz, J Ullrich, ER Weippl
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
192014
On reconnaissance with IPv6: a pattern-based scanning approach
J Ullrich, P Kieseberg, K Krombholz, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
102015
The Role and Security of Firewalls in IaaS Cloud Computing
J Cropper, J Ullrich, P Frühwirt, E Weippl
Availability, Reliability and Security (ARES), 2015 10th International …, 2015
102015
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well
A Dabrowski, J Ullrich, ER Weippl
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
9*2017
A Trust-based Resilient Routing Mechanism for the Internet of Things
ZA Khan, J Ullrich, AG Voyiatzis, P Herrmann
Proceedings of the 12th International Conference on Availability …, 2017
92017
The role and security of firewalls in cyber-physical cloud computing
J Ullrich, J Cropper, P Frühwirt, E Weippl
EURASIP Journal on Information Security 2016 (1), 18, 2016
72016
QR Code Security--How Secure and Usable Apps Can Protect Users Against Malicious QR Codes
K Krombholz, P Frühwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
72015
Network-based secret communication in clouds: a survey
J Ullrich, T Zseby, J Fabini, E Weippl
IEEE Communications Surveys & Tutorials 19 (2), 1112-1144, 2017
62017
Secure cyber-physical production systems: Solid steps towards realization
J Ullrich, AG Voyiatzis, ER Weippl
2016 1st International Workshop on Cyber-Physical Production Systems (CPPS), 1-4, 2016
62016
Towards a hardware Trojan detection cycle
A Dabrowski, H Hobel, J Ullrich, K Krombholz, E Weippl
2014 Ninth International Conference on Availability, Reliability and …, 2014
52014
Privacy is Not an Option: Attacking the IPv6 Privacy Extension
J Ullrich, E Weippl
Research in Attacks, Intrusions, and Defenses, 448-468, 2015
42015
Poster: Hardware trojans-detect and react?
A Dabrowski, P Fejes, J Ullrich, K Krombholz, H Hobel, E Weippl
Network and Distributed System Security (NDSS) Symposium, 2014
22014
Measuring Cookies and Web Privacy in a Post-GDPR World
A Dabrowski, G Merzdovnik, J Ullrich, G Sendera, E Weippl
International Conference on Passive and Active Network Measurement, 258-270, 2019
12019
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid
A Dabrowski, J Ullrich, ER Weippl
e & i Elektrotechnik und Informationstechnik 135 (3), 250-255, 2018
12018
Lightweight address hopping for defending the IPv6 IoT
A Judmayer, J Ullrich, G Merzdovnik, AG Voyiatzis, E Weippl
Proceedings of the 12th International Conference on Availability …, 2017
12017
A Performance Assessment of Network Address Shuffling in IoT Systems
A Judmayer, G Merzdovnik, J Ullrich, AG Voyiatzis, E Weippl
International Conference on Computer Aided Systems Theory, 197-204, 2017
12017
From Hack to Elaborate Technique—A Survey on Binary Rewriting
M Wenzl, G Merzdovnik, J Ullrich, E Weippl
ACM Computing Surveys (CSUR) 52 (3), 49, 2019
2019
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids
J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20