Seuraa
Johanna Ullrich
Johanna Ullrich
Vahvistettu sähköpostiosoite verkkotunnuksessa sba-research.org - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well
A Dabrowski, J Ullrich, ER Weippl
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
982017
Measuring Cookies and Web Privacy in a Post-GDPR World
A Dabrowski, G Merzdovnik, J Ullrich, G Sendera, E Weippl
International Conference on Passive and Active Network Measurement, 258-270, 2019
972019
From Hack to Elaborate Technique—A Survey on Binary Rewriting
M Wenzl, G Merzdovnik, J Ullrich, E Weippl
ACM Computing Surveys (CSUR) 52 (3), 49, 2019
782019
A Trust-based Resilient Routing Mechanism for the Internet of Things
ZA Khan, J Ullrich, AG Voyiatzis, P Herrmann
Proceedings of the 12th International Conference on Availability …, 2017
622017
QR Inception: Barcode-in-Barcode Attacks
A Dabrowski, K Krombholz, J Ullrich, ER Weippl
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
542014
IPv6 security: attacks and countermeasures in a nutshell
J Ullrich, K Krombholz, H Hobel, A Dabrowski, E Weippl
Proceedings of the 8th USENIX conference on Offensive Technologies, 5-5, 2014
502014
On reconnaissance with IPv6: a pattern-based scanning approach
J Ullrich, P Kieseberg, K Krombholz, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
432015
QR Code Security--How Secure and Usable Apps Can Protect Users Against Malicious QR Codes
K Krombholz, P Frühwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
412015
The role and security of firewalls in cyber-physical cloud computing
J Ullrich, J Cropper, P Frühwirt, E Weippl
EURASIP Journal on Information Security 2016 (1), 18, 2016
332016
Cloudoscopy: Services discovery and topology mapping
A Herzberg, H Shulman, J Ullrich, E Weippl
Proceedings of the 2013 ACM workshop on Cloud computing security workshop …, 2013
332013
Network-based secret communication in clouds: a survey
J Ullrich, T Zseby, J Fabini, E Weippl
IEEE Communications Surveys & Tutorials 19 (2), 1112-1144, 2017
192017
Towards a hardware Trojan detection cycle
A Dabrowski, H Hobel, J Ullrich, K Krombholz, E Weippl
2014 Ninth International Conference on Availability, Reliability and …, 2014
192014
Lightweight address hopping for defending the IPv6 IoT
A Judmayer, J Ullrich, G Merzdovnik, AG Voyiatzis, E Weippl
Proceedings of the 12th International Conference on Availability …, 2017
162017
The Role and Security of Firewalls in IaaS Cloud Computing
J Cropper, J Ullrich, P Frühwirt, E Weippl
Availability, Reliability and Security (ARES), 2015 10th International …, 2015
152015
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids
J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
112018
Secure cyber-physical production systems: Solid steps towards realization
J Ullrich, AG Voyiatzis, ER Weippl
2016 1st International Workshop on Cyber-Physical Production Systems (CPPS), 1-4, 2016
112016
Not that Simple: Email Delivery in the 21st Century
F Holzbauer, J Ullrich, M Lindorfer, T Fiebig
2022 USENIX Annual Technical Conference (USENIX ATC 22), 295-308, 2022
92022
Poster: Hardware trojans-detect and react?
A Dabrowski, P Fejes, J Ullrich, K Krombholz, H Hobel, E Weippl
Network and Distributed System Security (NDSS) Symposium, 2014
92014
Privacy is Not an Option: Attacking the IPv6 Privacy Extension
J Ullrich, E Weippl
Research in Attacks, Intrusions, and Defenses, 448-468, 2015
82015
A Performance Assessment of Network Address Shuffling in IoT Systems
A Judmayer, G Merzdovnik, J Ullrich, AG Voyiatzis, E Weippl
International Conference on Computer Aided Systems Theory, 197-204, 2017
62017
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20