Head of System Security Chair Ruhr University Bochum
Publications
2024
T. Heijligenberg, D. Rupprecht, and K. Kohls The attacks aren’t alright: Large-Scale Simulation of Fake Base Station Attacks and Detections
Cyber Security Experimentation and Test Workshop (CSET'24)
2023
B. Karakoc, N. Fürste, D. Rupprecht, and K. Kohls Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G
Security and Privacy in Wireless and Mobile Networks (WiSec'23)
PDF
T. Heijligenberg, G. Knips, C. Böhm, D. Rupprecht, and K. Kohls BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks
Security and Privacy in Wireless and Mobile Networks (WiSec'23)
PDF
T. Schnitzler, K. Kohls, E. Bitsikas, and C. Pöpper Hope of Delivery: Extracting User Locations From Mobile Instant Messengers
Network and Distributed System Security Symposium (NDSS'23) PDF
2022
T. Heijligenberg, O. Lkhaouni, K. Kohls Leaky Blinders: Information Leakage in Mobile VPNs
International Workshop on Security in Mobile Technologies (SecMT'22)
PDF
V. Rimmer, T. Schnitzler, T. Van Goethem, A. R. Romero, W. Joosen, and K. Kohls Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor
Privacy Enhancing Technologies Symposium (PETS'22) PDF
K. Kohls and C. Diaz VerLoc: Verifiable Localization in Decentralized Systems
USENIX Security Symposium (USENIX'22) ArXiv, PDF
2021
T. Stadler, W. Lueks, K. Kohls, and C. Troncoso Preliminary Analysis of Potential Harms in the Luca Tracing System
March 23 2021 ArXiv
T. Schnitzler, C. Pöpper, M. Dürmuth, and K. Kohls We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor
European Symposium on Security and Privacy (Euro S&P'21) PDF, Presentation, Slides
2020
R. S. Raman, P. Shenoy, K. Kohls, and R. Ensafi Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
Conference on Computer and Communications Security (CCS'20)
D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
USENIX Security Symposium (USENIX’20) Website, PDF
D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper IMP4GT: IMPersonation Attacks in 4G NeTworks
Network and Distributed System Security Symposium (NDSS’20) Website, PDF
2019
D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper Breaking LTE on Layer Two
Symposium on Security and Privacy (SP’19) Website, PDF
K. Kohls and C. Pöpper Poster: Application-Layer Routing Attacks on Tor
Symposium on Security and Privacy (SP’19) Poster
K. Kohls, D. Rupprecht, T. Holz, and C. Pöpper Lost Traffic Encryption: Fingerprinting LTE Traffic on Layer Two
Security and Privacy in Wireless and Mobile Networks (WiSec’19) PDF
K. Kohls, K. Jansen, D. Rupprecht, T. Holz, and C. Pöpper On the Challenges of Geographical Avoidance for Tor
Network and Distributed System Security Symposium (NDSS’19) PDF, Presentation, Slides
L. Schönherr, K. Kohls, S. Zeiler, T. Holz, and D. Kolossa Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Network ad Distributed System Security Symposium (NDSS’19) Website, PDF
2018
K. Kohls and C. Pöpper DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
European Symposium on Research in Computer Security (ESORICS’18) PDF, Slides
2017
K. Kohls and C. Pöpper Poster: Traffic Analysis Attacks in Anonymity Networks
Asia Conference on Computer and Communications Security (ASIACCS’17) Proposal
2016
K. Kohls, T. Holz, D. Kolossa, and C. Pöpper Skypeline: Robust Hidden Data Transmission for VoIP
Asia Conference on Computer and Communications Security (ASIACCS’16) PDF, Technical Report
A. Zarras, K. Kohls, M. Dürmuth, and C. Pöpper Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
Conference on Data and Application Security and Privacy (CODASPY’16) Outstanding Paper Award PDF
Before PhD
P. Bök, K. Kohls, D. Behnke, and C. Wietfeld Distributed Flow Permission Inspection for Mission-Critical Communication of Untrusted Autonomous Vehicles
Vehicular Technology Conference (VTC’14)
P. Bök, K. Kohls, S. Dünhapt, and Y. Tüchelmann Improving the Distributed Fair Congestion Avoidance Protocol for Home Area Networks with Internet Access
Links
International Conference on Computer Communications and Networks (ICCCN’12)
P. Bök, K. Kohls, Y. Tüchelmann, and K. Kollorz I-DWRR — An Insolvency Enabled Scheduling Scheme Extending Deficit Weighted Round Robin
GLOBECOM Workshops (GC Wkshps’11)