Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well A Dabrowski, J Ullrich, ER Weippl Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 72 | 2017 |
Measuring Cookies and Web Privacy in a Post-GDPR World A Dabrowski, G Merzdovnik, J Ullrich, G Sendera, E Weippl International Conference on Passive and Active Network Measurement, 258-270, 2019 | 65 | 2019 |
A Trust-based Resilient Routing Mechanism for the Internet of Things ZA Khan, J Ullrich, AG Voyiatzis, P Herrmann Proceedings of the 12th International Conference on Availability …, 2017 | 51 | 2017 |
From Hack to Elaborate Technique—A Survey on Binary Rewriting M Wenzl, G Merzdovnik, J Ullrich, E Weippl ACM Computing Surveys (CSUR) 52 (3), 49, 2019 | 49 | 2019 |
QR Inception: Barcode-in-Barcode Attacks A Dabrowski, K Krombholz, J Ullrich, ER Weippl Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014 | 49 | 2014 |
IPv6 security: attacks and countermeasures in a nutshell J Ullrich, K Krombholz, H Hobel, A Dabrowski, E Weippl Proceedings of the 8th USENIX conference on Offensive Technologies, 5-5, 2014 | 47 | 2014 |
QR Code Security--How Secure and Usable Apps Can Protect Users Against Malicious QR Codes K Krombholz, P Frühwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 35 | 2015 |
On reconnaissance with IPv6: a pattern-based scanning approach J Ullrich, P Kieseberg, K Krombholz, E Weippl 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 34 | 2015 |
Cloudoscopy: Services discovery and topology mapping A Herzberg, H Shulman, J Ullrich, E Weippl Proceedings of the 2013 ACM workshop on Cloud computing security workshop …, 2013 | 31 | 2013 |
The role and security of firewalls in cyber-physical cloud computing J Ullrich, J Cropper, P Frühwirt, E Weippl EURASIP Journal on Information Security 2016 (1), 18, 2016 | 22 | 2016 |
Network-based secret communication in clouds: a survey J Ullrich, T Zseby, J Fabini, E Weippl IEEE Communications Surveys & Tutorials 19 (2), 1112-1144, 2017 | 18 | 2017 |
Towards a hardware Trojan detection cycle A Dabrowski, H Hobel, J Ullrich, K Krombholz, E Weippl 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 18 | 2014 |
Lightweight address hopping for defending the IPv6 IoT A Judmayer, J Ullrich, G Merzdovnik, AG Voyiatzis, E Weippl Proceedings of the 12th International Conference on Availability …, 2017 | 13 | 2017 |
The Role and Security of Firewalls in IaaS Cloud Computing J Cropper, J Ullrich, P Frühwirt, E Weippl Availability, Reliability and Security (ARES), 2015 10th International …, 2015 | 13 | 2015 |
Secure cyber-physical production systems: Solid steps towards realization J Ullrich, AG Voyiatzis, ER Weippl 2016 1st International Workshop on Cyber-Physical Production Systems (CPPS), 1-4, 2016 | 11 | 2016 |
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018 | 9 | 2018 |
Poster: Hardware trojans-detect and react? A Dabrowski, P Fejes, J Ullrich, K Krombholz, H Hobel, E Weippl Network and Distributed System Security (NDSS) Symposium, 2014 | 9 | 2014 |
Privacy is Not an Option: Attacking the IPv6 Privacy Extension J Ullrich, E Weippl Research in Attacks, Intrusions, and Defenses, 448-468, 2015 | 8 | 2015 |
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid A Dabrowski, J Ullrich, ER Weippl e & i Elektrotechnik und Informationstechnik 135 (3), 250-255, 2018 | 5 | 2018 |
A Performance Assessment of Network Address Shuffling in IoT Systems A Judmayer, G Merzdovnik, J Ullrich, AG Voyiatzis, E Weippl International Conference on Computer Aided Systems Theory, 197-204, 2017 | 5 | 2017 |