Katharina Kohls

Head of System Security Chair
Ruhr University Bochum


Publications



2024

  • T. Heijligenberg, D. Rupprecht, and K. Kohls
    The attacks aren’t alright: Large-Scale Simulation of Fake Base Station Attacks and Detections
    Cyber Security Experimentation and Test Workshop (CSET'24)

2023

  • B. Karakoc, N. Fürste, D. Rupprecht, and K. Kohls
    Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G
    Security and Privacy in Wireless and Mobile Networks (WiSec'23)
    PDF
  • T. Heijligenberg, G. Knips, C. Böhm, D. Rupprecht, and K. Kohls
    BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks
    Security and Privacy in Wireless and Mobile Networks (WiSec'23)
    PDF
  • T. Schnitzler, K. Kohls, E. Bitsikas, and C. Pöpper
    Hope of Delivery: Extracting User Locations From Mobile Instant Messengers
    Network and Distributed System Security Symposium (NDSS'23)
    PDF

2022

  • T. Heijligenberg, O. Lkhaouni, K. Kohls
    Leaky Blinders: Information Leakage in Mobile VPNs
    International Workshop on Security in Mobile Technologies (SecMT'22)
    PDF
  • V. Rimmer, T. Schnitzler, T. Van Goethem, A. R. Romero, W. Joosen, and K. Kohls
    Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor
    Privacy Enhancing Technologies Symposium (PETS'22)
    PDF
  • K. Kohls and C. Diaz
    VerLoc: Verifiable Localization in Decentralized Systems
    USENIX Security Symposium (USENIX'22)
    ArXiv, PDF

2021

  • T. Stadler, W. Lueks, K. Kohls, and C. Troncoso
    Preliminary Analysis of Potential Harms in the Luca Tracing System
    March 23 2021
    ArXiv
  • T. Schnitzler, C. Pöpper, M. Dürmuth, and K. Kohls
    We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor
    European Symposium on Security and Privacy (Euro S&P'21)
    PDF, Presentation, Slides

2020

  • R. S. Raman, P. Shenoy, K. Kohls, and R. Ensafi
    Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
    Conference on Computer and Communications Security (CCS'20)
  • D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper
    Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
    USENIX Security Symposium (USENIX’20)
    Website, PDF
  • D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper
    IMP4GT: IMPersonation Attacks in 4G NeTworks
    Network and Distributed System Security Symposium (NDSS’20)
    Website, PDF

2019

  • D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper
    Breaking LTE on Layer Two
    Symposium on Security and Privacy (SP’19)
    Website, PDF
  • K. Kohls and C. Pöpper
    Poster: Application-Layer Routing Attacks on Tor
    Symposium on Security and Privacy (SP’19)
    Poster
  • K. Kohls, D. Rupprecht, T. Holz, and C. Pöpper
    Lost Traffic Encryption: Fingerprinting LTE Traffic on Layer Two
    Security and Privacy in Wireless and Mobile Networks (WiSec’19)
    PDF
  • K. Kohls, K. Jansen, D. Rupprecht, T. Holz, and C. Pöpper
    On the Challenges of Geographical Avoidance for Tor
    Network and Distributed System Security Symposium (NDSS’19)
    PDF, Presentation, Slides
  • L. Schönherr, K. Kohls, S. Zeiler, T. Holz, and D. Kolossa
    Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
    Network ad Distributed System Security Symposium (NDSS’19)
    Website, PDF

2018

  • K. Kohls and C. Pöpper
    DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
    European Symposium on Research in Computer Security (ESORICS’18)
    PDF, Slides

2017

  • K. Kohls and C. Pöpper
    Poster: Traffic Analysis Attacks in Anonymity Networks
    Asia Conference on Computer and Communications Security (ASIACCS’17)
    Proposal

2016

  • K. Kohls, T. Holz, D. Kolossa, and C. Pöpper
    Skypeline: Robust Hidden Data Transmission for VoIP
    Asia Conference on Computer and Communications Security (ASIACCS’16)
    PDF, Technical Report
  • A. Zarras, K. Kohls, M. Dürmuth, and C. Pöpper
    Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
    Conference on Data and Application Security and Privacy (CODASPY’16)
    Outstanding Paper Award
    PDF

Before PhD

  • P. Bök, K. Kohls, D. Behnke, and C. Wietfeld
    Distributed Flow Permission Inspection for Mission-Critical Communication of Untrusted Autonomous Vehicles
    Vehicular Technology Conference (VTC’14)
  • P. Bök, K. Kohls, S. Dünhapt, and Y. Tüchelmann
    Improving the Distributed Fair Congestion Avoidance Protocol for Home Area Networks with Internet Access Links
    International Conference on Computer Communications and Networks (ICCCN’12)
  • P. Bök, K. Kohls, Y. Tüchelmann, and K. Kollorz
    I-DWRR — An Insolvency Enabled Scheduling Scheme Extending Deficit Weighted Round Robin
    GLOBECOM Workshops (GC Wkshps’11)