Publications
Gegenhuber G., Maier, M., Holzbauer, F., Mayer, W., Merzdovnik, G., Weippl, E., Ullrich, J.
An Extended View on Measuring Tor AS-level adversaries
Computers & Security, 2023.
Maier, M., Ullrich, J.
In the loop: A measurement study of persistent routing loops on the IPv4/IPv6 Internet
Computer Networks, 2023.
Nowak, V., Ullrich, J., Weippl, E.
Cybersecurity is more than a Technological Matter - Towards Considering Critical Infrastructures as Socio-Technical Systems
Applied Cybersecurity & Internet Governance, 2022.
Casas, P., Vaneria, J., Ullrich, J., Findrik, M., Barlet-Ros, P.
GRAPHSEC - Advancing the Application of AI/ML to Network Security through Graph Neural Networks
International Conference on Machine Learning for Networking (MLN), 2022.
Holzbauer, F., Ullrich, J., Lindorfer, M., Fiebig, T.
Not that Simple: Email Delivery in the 21st Century
USENIX Annual Technical Conference (ATC), 2022.
Wenzl, M., Merzdovnik, G., Ullrich, J., Weippl, E.
From hack to elaborate technique - A survey on binary rewriting
ACM Computing Surveys, 2019.
Dabrowski, A., Merzdovnik, G., Ullrich, J., Sendera, G., Weippl, E.
Measuring Cookies and Web Privacy in a Post-GDPR World
Passive and Active Measurement Conference (PAM), 2019.
Ullrich, J., Stifter, N., Judmayer, A., Dabrowski, A., Weippl, E.
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids
International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2018.
Dabrowski, A., Ullrich, J., Weippl, E.
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid
e&i Elektrotechnik und Informationstechnik, 2018.
Dabrowski, A., Ullrich, J., Weippl, E.
Grid Shock: Coordinated Load-Change Attacks on Power Grids
Annual Computer Security Applications Conference (ACSAC), 2017.
Ullrich, J., Zseby, T., Fabini,T., Weippl, E.
Network-Based Secret Communication in Clouds: A Survey
IEEE Communications Surveys & Tutorials, 2017.
Khan, Z., Ullrich, J., Voyiatzis, A., Herrmann, P.
A Trust-based Resilient Routing Mechanism for the Internet of Things
International Conference on Availability, Reliability and Security (ARES), 2017.
Judmayer, A., Ullrich, J., Merzdovnik, G., Voyiatzis, A., Weippl, E.
Lightweight Address Hopping for Defending the IPv6 IoT
International Conference on Availability, Reliability and Security (ARES), 2017.
Ullrich, J., Weippl, E.
The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor
European Symposium on Research in Computer Security (ESORICS), 2016.
Ullrich, J., Cropper, J., Frühwirt, P., Weippl, E.
The Role and Security of Firewalls in Cyber-Physical Cloud Computing
EURASIP Journal on Information Security, 2016.
Ullrich, J., Voyiatzis, A., Weippl, E.
Secure Cyber-Physical Production Systems: Solid Steps towards Realization
International Workshop on Cyber-Physical Production Systems (CPPS), 2016.
Ullrich, J., Voyiatzis, A., Weippl, E.
The Quest for Privacy in Consumer IoT
International Workshop on Consumers and the Internet of Things (ConsIoT), 2016.
Ullrich, J., Weippl, E.
Privacy Is Not an Option: Attacking the IPv6 Privacy Extension
International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2015.
Cropper, J., Ullrich, J., Frühwirt, P., Weippl, E.
The Role and Security of Firewalls in IaaS Cloud Computing
International Conference on Availability, Reliability and Security (ARES), 2015.
Ullrich, J., Kieseberg, P., Krombholz, K., Weippl, E.
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach
International Conference on Availability, Reliability and Security (ARES), 2015.
Krombholz, K., Frühwirt, P., Rieder, T., Kapsalis, I., Ullrich, J., Weippl, E.
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes
International Conference on Availability, Reliability and Security (ARES), 2015.
Dabrowski A., Krombholz K., Ullrich J., Weippl, E.
QR Inception: Barcode-in-Barcode Attacks
ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, 2014.
Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A., Weippl, E.
IPv6 Security: Attacks and Countermeasures in a Nutshell
USENIX Workshop on Offensive Technologies (WOOT), 2014.
Herzberg, A., Shulman, H., Ullrich, J., Weippl, E.
Cloudoscopy: Services Discovery and Topology Mapping
ACM Workshop on Cloud Computing Security (CCSW), 2013.