• 2022

    Conference Paper

    Arora, S., Hosseini, H., Utz, C., Kumar, V., Dhellemmes, T., Ravichander, A., Story, P., Mangat, J., Chen, R., Degeling, M., Norton, T., Hupperich, T., Wilson, S., & Sadeh, N. (2022). A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus. In Proceedings of the LREC, Marseille, France. (Accepted)
    More details BibTeX

  • 2021

    Article in Journal

    Rashidibajgan, S., Hupperich, T., Doss, R., & Förster, A. (2021). Secure and privacy preserving structure in Opportunistic Networks. Computers & Security, 103.
    More details BibTeX

    Conference Paper

    Hosseini, H., Utz, C., Degeling, M., & Hupperich, T. (2021). Unifying Privacy Policy Detection. In Proceedings of the Privacy Enhancing Technologies Symposium, The Internet, 480–499.
    More details BibTeX Full text DOI

    Report

    Becker, J., Distel, B., Grundmann, M., Hupperich, T., Kersting, N., Löschel, A., Parreira, d. A. M., & Scholta, H. (2021). Challenges and Potentials of Digitalisation for Small and Mid-sized Towns: Proposition of a Transdisciplinary Research Agenda. In Becker, J., Dugas, M., Gieseke, F., Hellingrath, B., Hoeren, T., Klein, S., Kuchen, H., Trautmann, H., & Vossen, G. (Eds.), ERCIS Working Papers: Vol. 36. Münster: European Research Center for Information Systems.
    More details BibTeX Full text

  • 2020

    Article in Journal

    Rashidibajgan, S., & Hupperich, T. (2020). A Secure and Reliable Structure in Opportunistic Networks. Journal of Information System Security, 2020.
    More details BibTeX

    Conference Paper

    Hupperich, T., & Dassel, K. (2020). On the Usefulness of User Nudging and Strength Indication concerning Unlock Pattern Security. In Proceedings of the IEEE International Conference On Trust, Security And Privacy In Computing And Communications, Guangzhou.
    More details BibTeX

    Rashidibajgan, S., Hupperich, T., Doss, R., & Pan, L. (2020). Opportunistic Tracking in Cyber-Physical Systems. In Proceedings of the IEEE International Conference On Trust, Security And Privacy In Computing And Communications, Guangzhou.
    More details BibTeX

  • 2018

    Conference Paper

    Bortolameotti, R., van Ede, T., Continella, A., Hupperich, T., Everts, M., Rafati, R., Jonker, W., Hartel, P., & Peter, A. (2018). HeadPrint: Detecting Anomalous Communications through Header-based Application Fingerprinting. In Proceedings of the ACM Symposium on Applied Computing, Brno, Czech Republic.
    More details BibTeX

    Hupperich, T., Tatang, D., Wilkop, N., & Holz, T. (2018). An Empirical Study on Online Price Differentiation. In Proceedings of the ACM Con­fe­rence on Data and Ap­p­li­ca­ti­ons Se­cu­ri­ty and Pri­va­cy (CO­DAS­PY 2018), Tempe, Arizona, USA, 76–83.
    More details BibTeX

  • 2017

    Article in Journal

    Hupperich, T., Tatang, D., Wilkop, N., & Holz, T. (2017). An Empirical Study on Price Differentiation Based on System Fingerprints. arXiv preprint arXiv:1712.03031, 2017.
    More details BibTeX

    Krombholz, K., Hupperich, T., & Holz, T. (2017). May the Force Be with You: The Future of Force-Sensitive Authentication. IEEE Internet Computing, 21(3), 64–69.
    More details BibTeX DOI

    Thesis

    Hupperich, T. (2017). On the feasibility and impact of digital fingerprinting for system recognition. Dissertation at the Ruhr-Universität Bochum, Germany.
    More details BibTeX

  • 2016

    Conference Paper

    Hupperich, T., Hosseini, H., & Holz, T. (2016). Leveraging Sensor Fingerprinting for Mobile Device Authentication. In Proceedings of the 13th Con­fe­rence on De­tec­tion of In­tru­si­ons and Mal­wa­re & Vul­nerabi­li­ty As­sess­ment (DIMVA), Do­nos­tia-San Se­bas­tián, Spain, 377–396.
    More details BibTeX DOI

    Hupperich, T., Krombholz, K., & Holz, T. (2016). Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness. In Proceedings of the 9th In­ter­na­tio­nal Con­fe­rence on Trust & Trust­wor­thy Com­pu­ting (TRUST), Vienna, Austria, 40–59.
    More details BibTeX DOI

    Krombholz, K., Hupperich, T., & Holz, T. (2016). Use the force: Evaluating force-sensitive authentication for mobile devices. In Proceedings of the w­elfth Sym­po­si­um on Usa­ble Pri­va­cy and Se­cu­ri­ty (SOUPS 2016), Denver, USA, 207–219.
    More details BibTeX

  • 2015

    Article in Journal

    Hupperich, T., Maiorca, D., Kührer, M., Holz, T., & Giacinto, G. (2015). On the Effectiveness of Fingerprinting Mobile Devices Investigating Modern Web-Tracking Mechanisms. Horst Görtz In­sti­tut für IT-Si­cher­heit (HGI), 2015.
    More details BibTeX

    Conference Paper

    Hupperich, T., Maiorca, D., Kührer, M., Holz, T., & Giacinto, G. (2015). On the robustness of mobile device fingerprinting: Can mobile users escape modern web-tracking mechanisms?. In Proceedings of the 31th An­nual Com­pu­ter Se­cu­ri­ty Ap­p­li­ca­ti­ons Con­fe­rence (ACSAC), Los Angeles, California, USA, 191–200.
    More details BibTeX

    Kührer, M., Hupperich, T., Bushart, J., Rossow, C., & Holz, T. (2015). Going wild: Large-scale classification of open DNS resolvers. In Proceedings of the 15th ACM In­ter­net Me­a­su­re­ment Con­fe­rence (IMC), Tokyo, Japan, 355–368.
    More details BibTeX

    Uellenbeck, S., Hupperich, T., Wolf, C., & Holz, T. (2015). Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones. In Proceedings of the Fi­nan­ci­al Cryp­to­gra­phy and Data Se­cu­ri­ty, San Juan, Puerto Rico, 237–253.
    More details BibTeX DOI

    Other

    Hupperich, T. (2015). Mobile Device Fingerprinting.
    More details BibTeX

  • 2014

    Article in Journal

    Uellenbeck, S., Hupperich, T., Wolf, C., & Holz, T. (2014). Tactile one-time pad: smartphone authentication resilient against shoulder surfing. Tech. rep., Horst Görtz Institute for IT-Security (HGI), HGI-2014–003;, 2014.
    More details BibTeX

    Conference Paper

    Kührer, M., Hupperich, T., Rossow, C., & Holz, T. (2014). Exit from Hell? Reducing the Impact of Amplification DDoS Attacks. In Proceedings of the 23rd USE­NIX Se­cu­ri­ty Sym­po­si­um, San Diego, California, USA, 111–125.
    More details BibTeX

    Kührer, M., Hupperich, T., Rossow, C., & Holz, T. (2014). Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. In Proceedings of the 8th USE­NIX Work­shop on Of­fen­si­ve Tech­no­lo­gies (WOOT), San Diego, California, USA.
    More details BibTeX

    Other

    Kührer, M., Hupperich, T., Rossow, C., & Holz, T. (2014). Amplification DDoS Attacks.
    More details BibTeX

  • 2012

    Conference Paper

    Hupperich, T., Löhr, H., Sadeghi, A., & Winandy, M. (2012). Flexible patient-controlled security for electronic health records. In Proceedings of the ACM SIG­HIT In­ter­na­tio­nal Sym­po­si­um on Health In­for­ma­tics (IHI), Miami, Florida, USA, 727–732.
    More details BibTeX