What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Johanna Ullrich
Google Scholar
ORCID:
0000-0003-0297-9614
7
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/esorics
Zero-Click SnailLoad: From Minimal to No User Interaction.
Stefan Gast
Nora Puntigam
Simone Franza
Sudheendra Raghav Neela
Daniel Gruss
Johanna Ullrich
2024
journals/compsec
Fostering security research in the energy sector: A validation of open source intelligence for power grid model data.
Anja Klauzer
Markus Maier
Lore Abart-Heriszt
Johanna Ullrich
2023
journals/compsec
An extended view on measuring tor AS-level adversaries.
Gabriel K. Gegenhuber
Markus Maier
Florian Holzbauer
Wilfried Mayer
Georg Merzdovnik
Edgar R. Weippl
Johanna Ullrich
2017
conf/acsac
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well.
Adrian Dabrowski
Johanna Ullrich
Edgar R. Weippl
2016
conf/esorics
The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor.
Johanna Ullrich
Edgar R. Weippl
2014
conf/ccs
QR Inception: Barcode-in-Barcode Attacks.
Adrian Dabrowski
Katharina Krombholz
Johanna Ullrich
Edgar R. Weippl
2013
conf/ccs
Cloudoscopy: services discovery and topology mapping.
Amir Herzberg
Haya Schulmann
Johanna Ullrich
Edgar R. Weippl
Coauthors
Adrian Dabrowski
(2)
Amir Herzberg
(1)
Anja Klauzer
(1)
Daniel Gruss
(1)
Edgar R. Weippl
(5)
Florian Holzbauer
(1)
Gabriel K. Gegenhuber
(1)
Georg Merzdovnik
(1)
Haya Schulmann
(1)
Johanna Ullrich
(7)
Katharina Krombholz
(1)
Lore Abart-Heriszt
(1)
Markus Maier
(2)
Nora Puntigam
(1)
Simone Franza
(1)
Stefan Gast
(1)
Sudheendra Raghav Neela
(1)
Wilfried Mayer
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to