2022

 

Forschungsartikel in Sammelband (Konferenz)

Arora, S., Hosseini, H., Utz, C., Bannihatti, K. V. D., Tristan, , Ravichander, A., Story, P., Mangat, J., Chen, R., Degeling, M., Norton, T., Hupperich, T., Wilson, S., & Sadeh, N. (2022). A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus. In European, L. R. A. (. (Ed.), Proceedings of the 13th Conference on Language Resources and Evaluation (pp. 5460–5472). France: European Language Resources Association.
Mehr Details BibTeX Gesamter Text DOI

Gunkel, T., & Hupperich, T. (2022). Discovering Vulnerabilities and Patches for Open Source Security. In SciTePress, (Ed.), Proceedings of the 17th International Conference on Software Technologies (pp. 0–0). Lisbon, Portugal: SciTePress.
Mehr Details BibTeX

Hosseini, H., Rengstorf, J., & Hupperich, T. (2022). Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?. In SciTePress, (Ed.), Proceedings of the 17th International Conference on Software Technologies (pp. 649–656). Lisbon, Portugal: SciTePress.
Mehr Details BibTeX DOI

 

Forschungsartikel (Zeitschrift)

Kluss, B., Rashidibajgan, S., & Hupperich, T. (2022). Blossom: Cluster-Based Routing for Preserving Privacy in Opportunistic Networks. Journal of Sensor and Actuator Networks (JSAN), 11(4).
Mehr Details BibTeX DOI

Rashidibajgan, S., & Hupperich, T. (2022). Improving the Performance of Opportunistic Networks in Real World Applications Using Machine Learning Techniques. Journal of Sensor and Actuator Networks (JSAN), 11 (4), 61–90.
Mehr Details BibTeX DOI

2021

 

Forschungsartikel in Sammelband (Konferenz)

Hosseini, H., Degeling, M., Utz, C., & Hupperich, T. (2021). Unifying Privacy Policy Detection. In Johnson, A., & Kerschbaum, F. (Eds.), Proceedings on Privacy Enhancing Technologies (pp. 480–499). Online: Sciendo — De Gruyter.
Mehr Details BibTeX Gesamter Text DOI

 

Forschungsartikel (Zeitschrift)

Rashidibajgan, S., Hupperich, T., Doss, R., & Förster, A. (2021). Secure and privacy preserving structure in Opportunistic Networks. Computers & Security, 103.
Mehr Details BibTeX

 

Arbeitspapier / Working Paper

Becker, J., Distel, B., Grundmann, M., Hupperich, T., Kersting, N., Löschel, A., Parreira, d. A. M., & Scholta, H. (2021). Challenges and Potentials of Digitalisation for Small and Mid-sized Towns: Proposition of a Transdisciplinary Research Agenda. In Becker, J., Dugas, M., Gieseke, F., Hellingrath, B., Hoeren, T., Klein, S., Kuchen, H., Trautmann, H., & Vossen, G. (Eds.), Working Papers: Vol. 36. Münster: European Research Center for Information Systems.
Mehr Details BibTeX Gesamter Text

2020

 

Forschungsartikel in Sammelband (Konferenz)

Hupperich, T., & Dassel, K. (2020). On the Usefulness of User Nudging and Strength Indication concerning Unlock Pattern Security. In Proceedings of the IEEE International Conference On Trust, Security And Privacy In Computing And Communications, Guangzhou.
Mehr Details BibTeX

Rashidibajgan, S., Hupperich, T., Doss, R., & Pan, L. (2020). Opportunistic Tracking in Cyber-Physical Systems. In Proceedings of the IEEE International Conference On Trust, Security And Privacy In Computing And Communications, Guangzhou.
Mehr Details BibTeX

 

Forschungsartikel (Zeitschrift)

Rashidibajgan, S., & Hupperich, T. (2020). A Secure and Reliable Structure in Opportunistic Networks. Journal of Information System Security, 2020.
Mehr Details BibTeX

2019

 

Forschungsartikel (Zeitschrift)

Degeling, M. U., Christine;, L., Christopher;, H., Henry;, S., Florian;, H., & Thorsten, (2019). We Value Your Privacy ... Now Take Some Cookies — Measuring the GDPR's Impact on Web Privacy. Inform. Spektrum, 42(5), 345–346.
Mehr Details BibTeX Gesamter Text DOI

Rashidibajgan, S., & Doss, R. (2019). Privacy-preserving history-based routing in Opportunistic Networks. Computers & Security, 84, 244–255.
Mehr Details BibTeX DOI

 

Forschungsartikel in Online-Sammlung (Konferenz)

Degeling, M., Utz, C., Lentzsch, C., Hosseini, H., Schaub, F., & Holz, T. (2019). We Value Your Privacy… Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy.
Mehr Details Gesamter Text DOI

2018

 

Forschungsartikel in Sammelband (Konferenz)

Bortolameotti, R., van Ede, T., Continella, A., Hupperich, T., Everts, M., Rafati, R., Jonker, W., Hartel, P., & Peter, A. (2018). HeadPrint: Detecting Anomalous Communications through Header-based Application Fingerprinting. In Proceedings of the ACM Symposium on Applied Computing, Brno, Czech Republic.
Mehr Details BibTeX

Hupperich, T., Tatang, D., Wilkop, N., & Holz, T. (2018). An Empirical Study on Online Price Differentiation. In Proceedings of the ACM Con­fe­rence on Data and Ap­p­li­ca­ti­ons Se­cu­ri­ty and Pri­va­cy (CO­DAS­PY 2018), Tempe, Arizona, USA, 76–83.
Mehr Details BibTeX

Rashidibajgan, S., & Doss, R. (2018). A New Method for Sharing the Public Keys in Opportunistic Networks. In Proceedings of the International Conference on Future Network Systems and Security, Paris, France, 147–161. (online first)
Mehr Details BibTeX

 

Forschungsartikel in Online-Sammlung (Konferenz)

Golla, M., Hahn, B., Zu, S. K. M., Hosseini, H., & Dürmuth, M. (2018). Bars, Badges, and High Scores: On the Impact of Password Strength Visualizations.
Mehr Details Gesamter Text

2017

 

Forschungsartikel in Sammelband (Konferenz)

Rashidibajgan., S. (2017). A Solution for Prevention of Selective Dropping and Selfish Attacks in Opportunistic Networks. In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017), Barcelona, Spain, 30–35.
Mehr Details BibTeX DOI

 

Forschungsartikel (Zeitschrift)

Hupperich, T., Tatang, D., Wilkop, N., & Holz, T. (2017). An Empirical Study on Price Differentiation Based on System Fingerprints. arXiv preprint arXiv:1712.03031, 2017.
Mehr Details BibTeX

Krombholz, K., Hupperich, T., & Holz, T. (2017). May the Force Be with You: The Future of Force-Sensitive Authentication. IEEE Internet Computing, 21(3), 64–69.
Mehr Details BibTeX DOI

 

Qualifikationsschrift (Dissertation, Habilitationsschrift)

Hupperich, T. (2017). On the feasibility and impact of digital fingerprinting for system recognition. at the Ruhr-Universität Bochum, Germany.
Mehr Details BibTeX

2016

 

Forschungsartikel in Sammelband (Konferenz)

Hupperich, T., Krombholz, K., & Holz, T. (2016). Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness. In Proceedings of the 9th In­ter­na­tio­nal Con­fe­rence on Trust & Trust­wor­thy Com­pu­ting (TRUST), Vienna, Austria, 40–59.
Mehr Details BibTeX DOI

Hupperich, T., Hosseini, H., & Holz, T. (2016). Leveraging Sensor Fingerprinting for Mobile Device Authentication. In Caballero, J., Zurutuza, U., & Rodríguez, R. J. (Eds.), DIMVA 2016: Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 377–396). Spain: Springer.
Mehr Details BibTeX DOI

Krombholz, K., Hupperich, T., & Holz, T. (2016). Use the force: Evaluating force-sensitive authentication for mobile devices. In Proceedings of the w­elfth Sym­po­si­um on Usa­ble Pri­va­cy and Se­cu­ri­ty (SOUPS 2016), Denver, USA, 207–219.
Mehr Details BibTeX

Rashidibajgan, S. (2016). A trust structure for detection of sybil attacks in opportunistic networks. In Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITST), Porto, Portugal, 347–351.
Mehr Details BibTeX DOI

2015

 

Forschungsartikel in Sammelband (Konferenz)

Hupperich, T., Maiorca, D., Kührer, M., Holz, T., & Giacinto, G. (2015). On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms?. In Proceedings of the 31th An­nual Com­pu­ter Se­cu­ri­ty Ap­p­li­ca­ti­ons Con­fe­rence (ACSAC), Los Angeles, California, USA, 191–200.
Mehr Details BibTeX

Kührer, M., Hupperich, T., Bushart, J., Rossow, C., & Holz, T. (2015). Going wild: Large-scale classification of open DNS resolvers. In Proceedings of the 15th ACM In­ter­net Me­a­su­re­ment Con­fe­rence (IMC), Tokyo, Japan, 355–368.
Mehr Details BibTeX

Uellenbeck, S., Hupperich, T., Wolf, C., & Holz, T. (2015). Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones. In Proceedings of the Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty, San Juan, Puerto Rico, 237–253.
Mehr Details BibTeX DOI

 

Forschungsartikel (Zeitschrift)

Hupperich, T., Maiorca, D., Kührer, M., Holz, T., & Giacinto, G. (2015). On the Effectiveness of Fingerprinting Mobile Devices Investigating Modern Web-Tracking Mechanisms. Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), 2015.
Mehr Details BibTeX

 

Sonstige wissenschaftliche Veröffentlichung

Hupperich, T. (2015). Mobile Device Fingerprinting.
Mehr Details BibTeX

2014

 

Forschungsartikel in Sammelband (Konferenz)

Kührer, M., Hupperich, T., Rossow, C., & Holz, T. (2014). Exit from Hell? Reducing the Impact of Amplification DDoS Attacks. In Proceedings of the 23rd USE­NIX Se­cu­ri­ty Sym­po­si­um, San Diego, California, USA, 111–125.
Mehr Details BibTeX

Kührer, M., Hupperich, T., Rossow, C., & Holz, T. (2014). Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. In Proceedings of the 8th USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT), San Diego, California, USA.
Mehr Details BibTeX

 

Forschungsartikel (Zeitschrift)

Uellenbeck, S., Hupperich, T., Wolf, C., & Holz, T. (2014). Tactile one-time pad: smartphone authentication resilient against shoulder surfing. Tech. rep., Horst Görtz Institute for IT-Security (HGI), HGI-2014–003;, 2014.
Mehr Details BibTeX

 

Sonstige wissenschaftliche Veröffentlichung

Kührer, M., Hupperich, T., Rossow, C., & Holz, T. (2014). Amplification DDoS Attacks.
Mehr Details BibTeX

2012

 

Forschungsartikel in Sammelband (Konferenz)

Hupperich, T., Löhr, H., Sadeghi, A., & Winandy, M. (2012). Flexible patient-controlled security for electronic health records. In Proceedings of the ACM SIG­HIT In­ter­na­tio­nal Sym­po­si­um on Health In­for­ma­tics (IHI), Miami, Florida, USA, 727–732.
Mehr Details BibTeX