USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 6 results:
Filters: Author is Christina Pöpper [Clear All Filters]
Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables. 32nd USENIX Security Symposium (USENIX Security 23). :5719--5736.
.
2023. CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot. 32nd USENIX Security Symposium (USENIX Security 23). :2133--2150.
.
2023. Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings. 32nd USENIX Security Symposium (USENIX Security 23). :2151--2168.
.
2023. Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE. 29th USENIX Security Symposium (USENIX Security 20). :73--88.
.
2020. Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. 29th USENIX Security Symposium (USENIX Security 20). :1985--2002.
.
2020. Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness. 10th USENIX Workshop on Offensive Technologies (WOOT 16).
.
2016.