Publications
2025
- K. Kohls
admin/1423: On the Insecurity of Open-Source 5G Core Network Deployments in the Wild
Workshop on Traffic Measurements for Cybersecurity (WTMC'25)
PDF
2024
- T. Heijligenberg, D. Rupprecht, and K. Kohls
The attacks aren’t alright: Large-Scale Simulation of Fake Base Station Attacks and Detections
Cyber Security Experimentation and Test Workshop (CSET'24)
PDF
2023
- B. Karakoc, N. Fürste, D. Rupprecht, and K. Kohls
Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G
Security and Privacy in Wireless and Mobile Networks (WiSec'23)
PDF
- T. Heijligenberg, G. Knips, C. Böhm, D. Rupprecht, and K. Kohls
BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks
Security and Privacy in Wireless and Mobile Networks (WiSec'23)
PDF
- T. Schnitzler, K. Kohls, E. Bitsikas, and C. Pöpper
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers
Network and Distributed System Security Symposium (NDSS'23)
PDF
2022
- T. Heijligenberg, O. Lkhaouni, K. Kohls
Leaky Blinders: Information Leakage in Mobile VPNs
International Workshop on Security in Mobile Technologies (SecMT'22)
PDF
- V. Rimmer, T. Schnitzler, T. Van Goethem, A. R. Romero, W. Joosen, and K. Kohls
Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor
Privacy Enhancing Technologies Symposium (PETS'22)
PDF
- K. Kohls and C. Diaz
VerLoc: Verifiable Localization in Decentralized Systems
USENIX Security Symposium (USENIX'22)
ArXiv, PDF
2021
- T. Stadler, W. Lueks, K. Kohls, and C. Troncoso
Preliminary Analysis of Potential Harms in the Luca Tracing System
March 23 2021
ArXiv
- T. Schnitzler, C. Pöpper, M. Dürmuth, and K. Kohls
We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor
European Symposium on Security and Privacy (Euro S&P'21)
PDF, Presentation, Slides
2020
- R. S. Raman, P. Shenoy, K. Kohls, and R. Ensafi
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
Conference on Computer and Communications Security (CCS'20)
- D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper
Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
USENIX Security Symposium (USENIX’20)
Website, PDF - D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper
IMP4GT: IMPersonation Attacks in 4G NeTworks
Network and Distributed System Security Symposium (NDSS’20)
Website, PDF
2019
- D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper
Breaking LTE on Layer Two
Symposium on Security and Privacy (SP’19)
Website, PDF - K. Kohls and C. Pöpper
Poster: Application-Layer Routing Attacks on Tor
Symposium on Security and Privacy (SP’19)
Poster - K. Kohls, D. Rupprecht, T. Holz, and C. Pöpper
Lost Traffic Encryption: Fingerprinting LTE Traffic on Layer Two
Security and Privacy in Wireless and Mobile Networks (WiSec’19)
PDF - K. Kohls, K. Jansen, D. Rupprecht, T. Holz, and C. Pöpper
On the Challenges of Geographical Avoidance for Tor
Network and Distributed System Security Symposium (NDSS’19)
PDF, Presentation, Slides - L. Schönherr, K. Kohls, S. Zeiler, T. Holz, and D. Kolossa
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Network ad Distributed System Security Symposium (NDSS’19)
Website, PDF
2018
- K. Kohls and C. Pöpper
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
European Symposium on Research in Computer Security (ESORICS’18)
PDF, Slides
2017
- K. Kohls and C. Pöpper
Poster: Traffic Analysis Attacks in Anonymity Networks
Asia Conference on Computer and Communications Security (ASIACCS’17)
Proposal
2016
- K. Kohls, T. Holz, D. Kolossa, and C. Pöpper
Skypeline: Robust Hidden Data Transmission for VoIP
Asia Conference on Computer and Communications Security (ASIACCS’16)
PDF, Technical Report - A. Zarras, K. Kohls, M. Dürmuth, and C. Pöpper
Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
Conference on Data and Application Security and Privacy (CODASPY’16)
Outstanding Paper Award
PDF
Before PhD
- P. Bök, K. Kohls, D. Behnke, and C. Wietfeld
Distributed Flow Permission Inspection for Mission-Critical Communication of Untrusted Autonomous Vehicles
Vehicular Technology Conference (VTC’14) - P. Bök, K. Kohls, S. Dünhapt, and Y. Tüchelmann
Improving the Distributed Fair Congestion Avoidance Protocol for Home Area Networks with Internet Access Links
International Conference on Computer Communications and Networks (ICCCN’12) - P. Bök, K. Kohls, Y. Tüchelmann, and K. Kollorz
I-DWRR — An Insolvency Enabled Scheduling Scheme Extending Deficit Weighted Round Robin
GLOBECOM Workshops (GC Wkshps’11)