Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding L Schönherr, K Kohls, S Zeiler, T Holz, D Kolossa Network and Distributed System Security Symposium (NDSS), 2019 | 326 | 2019 |
Breaking LTE on Layer Two D Rupprecht, K Kohls, T Holz, C Pöpper IEEE Symposium on Security and Privacy, 0, 2019 | 214 | 2019 |
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory R Sundara Raman, P Shenoy, K Kohls, R Ensafi Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 90 | 2020 |
IMP4GT: IMPersonation Attacks in 4G NeTworks D Rupprecht, K Kohls, T Holz, C Pöpper Symposium on Network and Distributed System Security (NDSS). ISOC, 2020 | 68 | 2020 |
Lost Traffic Encryption: Fingerprinting LTE/4G Traffic on Layer Two K Kohls, D Rupprecht, T Holz, C Pöpper Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 56 | 2019 |
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. D Rupprecht, K Kohls, T Holz, C Pöpper USENIX Security Symposium, 73-88, 2020 | 51 | 2020 |
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data A Zarras, K Kohls, M Dürmuth, C Pöpper Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 30 | 2016 |
On the Challenges of Geographical Avoidance for Tor K Kohls, K Jansen, D Rupprecht, T Holz, C Pöpper Network and Distributed System Security Symposium (NDSS), 2019 | 26 | 2019 |
Skypeline: Robust hidden data transmission for VoIP K Kohls, T Holz, D Kolossa, C Pöpper Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 25 | 2016 |
{VerLoc}: Verifiable Localization in Decentralized Systems K Kohls, C Diaz 31st USENIX Security Symposium (USENIX Security 22), 2637-2654, 2022 | 12 | 2022 |
Preliminary Analysis of Potential Harms in the Luca Tracing System T Stadler, W Lueks, K Kohls, C Troncoso arXiv preprint arXiv:2103.11958, 2021 | 12 | 2021 |
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor V Rimmer, T Schnitzler, T Van Goethem, AR Romero, W Joosen, K Kohls Proceedings on Privacy Enhancing Technologies 3, 314-335, 2022 | 10 | 2022 |
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor K Kohls, C Pöpper Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 9 | 2018 |
I-DWRR—An insolvency enabled scheduling scheme extending Deficit Weighted Round Robin PB Bök, K Kohls, Y Tüchelmann, K Kollorz 2011 IEEE GLOBECOM Workshops (GC Wkshps), 695-700, 2011 | 9 | 2011 |
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor T Schnitzler, C Pöpper, M Dürmuth, K Kohls European Symposium on Security and Privacy, 2021 | 5 | 2021 |
POSTER: Traffic Analysis Attacks in Anonymity Networks KS Kohls, C Pöpper Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 5 | 2017 |
Distributed flow permission inspection for mission-critical communication of untrusted autonomous vehicles PB Bok, KS Kohls, D Behnke, C Wietfeld 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 1-6, 2014 | 4 | 2014 |
BIM-basierte Bauablaufsimulation von Hochbauten K Kohls, M Block, A Marx, M Hamm Forum Bauinformatik, 145-152, 2010 | 4 | 2010 |
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G B Karakoc, N Fürste, D Rupprecht, K Kohls | 3 | 2023 |
Validating the accuracy of the MaxMind GeoLite2 City database M Schopman, HPE Vranken, K Kohls Technical report, Radboud University, 2021 | 2 | 2021 |