Exit from Hell? Reducing the Impact of {Amplification}{DDoS} Attacks M Kührer, T Hupperich, C Rossow, T Holz 23rd USENIX Security Symposium (USENIX Security 14), 111-125, 2014 | 220 | 2014 |
Going wild: Large-scale classification of open DNS resolvers M Kührer, T Hupperich, J Bushart, C Rossow, T Holz Proceedings of the 2015 Internet Measurement Conference, 355-368, 2015 | 115 | 2015 |
Hell of a Handshake: Abusing {TCP} for Reflective Amplification {DDoS} Attacks M Kührer, T Hupperich, C Rossow, T Holz 8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014 | 82 | 2014 |
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms? T Hupperich, D Maiorca, M Kührer, T Holz, G Giacinto Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 63 | 2015 |
Use the Force: Evaluating {Force-Sensitive} Authentication for Mobile Devices K Krombholz, T Hupperich, T Holz Twelfth symposium on usable privacy and security (SOUPS 2016), 207-219, 2016 | 43 | 2016 |
Flexible patient-controlled security for electronic health records T Hupperich, H Löhr, AR Sadeghi, M Winandy Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012 | 43 | 2012 |
An empirical study on online price differentiation T Hupperich, D Tatang, N Wilkop, T Holz Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 28 | 2018 |
Leveraging sensor fingerprinting for mobile device authentication T Hupperich, H Hosseini, T Holz International Conference on Detection of Intrusions and Malware, and …, 2016 | 19 | 2016 |
May the force be with you: The future of force-sensitive authentication K Krombholz, T Hupperich, T Holz IEEE Internet Computing 21 (3), 64-69, 2017 | 11 | 2017 |
Sensor captchas: On the usability of instrumenting hardware sensors to prove liveliness T Hupperich, K Krombholz, T Holz International Conference on Trust and Trustworthy Computing, 40-59, 2016 | 10 | 2016 |
Headprint: detecting anomalous communications through header-based application fingerprinting R Bortolameotti, T Van Ede, A Continella, T Hupperich, MH Everts, ... Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1696-1705, 2020 | 6 | 2020 |
Tactile one-time pad: Leakage-resilient authentication for smartphones S Uellenbeck, T Hupperich, C Wolf, T Holz International Conference on Financial Cryptography and Data Security, 237-253, 2015 | 5 | 2015 |
Tactile one-time pad: smartphone authentication resilient against shoulder surfing S Uellenbeck, T Hupperich, C Wolf, T Holz Tech. rep., Horst Görtz Institute for IT-Security (HGI), HGI-2014–003;, 2014 | 4 | 2014 |
Secure and privacy-preserving structure in opportunistic networks S Rashidibajgan, T Hupperich, R Doss, A Förster Computers & Security 104, 102208, 2021 | 3 | 2021 |
An Empirical Study on Price Differentiation Based on System Fingerprints T Hupperich, D Tatang, N Wilkop, T Holz arXiv preprint arXiv:1712.03031, 2017 | 2 | 2017 |
On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern Security T Hupperich, K Dassel 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 1 | 2020 |
On the feasibility and impact of digital fingerprinting for system recognition T Hupperich Ruhr University Bochum, Germany, 2017 | 1 | 2017 |
Mobile Device Fingerprinting T Hupperich 9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 10, 0 | 1 | |
Unifying Privacy Policy Detection H Hosseini, M Degeling, C Utz, T Hupperich Proceedings on Privacy Enhancing Technologies 2021 (4), 480-499, 2021 | | 2021 |
Opportunistic Tracking in Cyber-Physical Systems S Rashidibajgan, T Hupperich, R Doss, L Pan 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | | 2020 |