Exit from hell? Reducing the impact of amplification DDoS attacks M Kührer, T Hupperich, C Rossow, T Holz 23rd {USENIX} Security Symposium ({USENIX} Security 14), 111-125, 2014 | 239 | 2014 |
Going wild: Large-scale classification of open DNS resolvers M Kührer, T Hupperich, J Bushart, C Rossow, T Holz Proceedings of the 2015 Internet Measurement Conference, 355-368, 2015 | 133 | 2015 |
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. M Kührer, T Hupperich, C Rossow, T Holz WOOT, 2014 | 85 | 2014 |
On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms? T Hupperich, D Maiorca, M Kührer, T Holz, G Giacinto Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 68 | 2015 |
Use the force: Evaluating force-sensitive authentication for mobile devices K Krombholz, T Hupperich, T Holz | 49 | 2016 |
Flexible patient-controlled security for electronic health records T Hupperich, H Löhr, AR Sadeghi, M Winandy Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012 | 47 | 2012 |
An empirical study on online price differentiation T Hupperich, D Tatang, N Wilkop, T Holz Proceedings of the eighth ACM conference on data and application security …, 2018 | 29 | 2018 |
Leveraging sensor fingerprinting for mobile device authentication T Hupperich, H Hosseini, T Holz Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016 | 19 | 2016 |
May the force be with you: The future of force-sensitive authentication K Krombholz, T Hupperich, T Holz IEEE Internet Computing 21 (3), 64-69, 2017 | 15 | 2017 |
Sensor captchas: On the usability of instrumenting hardware sensors to prove liveliness T Hupperich, K Krombholz, T Holz Trust and Trustworthy Computing: 9th International Conference, TRUST 2016 …, 2016 | 13 | 2016 |
Secure and privacy-preserving structure in opportunistic networks S Rashidibajgan, T Hupperich, R Doss, A Förster Computers & Security 104, 102208, 2021 | 10 | 2021 |
Headprint: detecting anomalous communications through header-based application fingerprinting R Bortolameotti, T Van Ede, A Continella, T Hupperich, MH Everts, ... Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1696-1705, 2020 | 7 | 2020 |
Tactile one-time pad: Leakage-resilient authentication for smartphones S Uellenbeck, T Hupperich, C Wolf, T Holz Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 6 | 2015 |
Tactile one-time pad: smartphone authentication resilient against shoulder surfing S Uellenbeck, T Hupperich, C Wolf, T Holz Tech. rep., Horst Görtz Institute for IT-Security (HGI), HGI-2014–003;, 2014 | 4 | 2014 |
An Empirical Study on Price Differentiation Based on System Fingerprints T Hupperich, D Tatang, N Wilkop, T Holz arXiv preprint arXiv:1712.03031, 2017 | 3 | 2017 |
Unifying Privacy Policy Detection. H Hosseini, M Degeling, C Utz, T Hupperich Proc. Priv. Enhancing Technol. 2021 (4), 480-499, 2021 | 2 | 2021 |
Opportunistic Tracking in Cyber-Physical Systems S Rashidibajgan, T Hupperich, R Doss, L Pan 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 1 | 2020 |
On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern Security T Hupperich, K Dassel 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 1 | 2020 |
On the feasibility and impact of digital fingerprinting for system recognition T Hupperich Ruhr University Bochum, Germany, 2017 | 1 | 2017 |
Mobile Device Fingerprinting T Hupperich 9. GI FG SIDAR Graduierten-Workshop über Reaktive Sicherheit, 10, 0 | 1 | |