Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Pöpper, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.17839  [pdf, other

    cs.CL cs.AI cs.IR

    Global-Liar: Factuality of LLMs over Time and Geographic Regions

    Authors: Shujaat Mirza, Bruno Coelho, Yuyuan Cui, Christina Pöpper, Damon McCoy

    Abstract: The increasing reliance on AI-driven solutions, particularly Large Language Models (LLMs) like the GPT series, for information retrieval highlights the critical need for their factuality and fairness, especially amidst the rampant spread of misinformation and disinformation online. Our study evaluates the factual accuracy, stability, and biases in widely adopted GPT models, including GPT-3.5 and G… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

    Comments: 24 pages, 12 figures, 9 tables

  2. arXiv:2309.05457  [pdf, other

    cs.CR cs.LG

    Unveiling the Sentinels: Assessing AI Performance in Cybersecurity Peer Review

    Authors: Liang Niu, Nian Xue, Christina Pöpper

    Abstract: Peer review is the method employed by the scientific community for evaluating research advancements. In the field of cybersecurity, the practice of double-blind peer review is the de-facto standard. This paper touches on the holy grail of peer reviewing and aims to shed light on the performance of AI in reviewing for academic security conferences. Specifically, we investigate the predictability of… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

  3. arXiv:2306.07695  [pdf, other

    cs.CR

    Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings

    Authors: Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan

    Abstract: Short Message Service (SMS) remains one of the most popular communication channels since its introduction in 2G cellular networks. In this paper, we demonstrate that merely receiving silent SMS messages regularly opens a stealthy side-channel that allows other regular network users to infer the whereabouts of the SMS recipient. The core idea is that receiving an SMS inevitably generates Delivery R… ▽ More

    Submitted 14 June, 2023; v1 submitted 13 June, 2023; originally announced June 2023.

  4. Hope of Delivery: Extracting User Locations From Mobile Instant Messengers

    Authors: Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper

    Abstract: Mobile instant messengers such as WhatsApp use delivery status notifications in order to inform users if a sent message has successfully reached its destination. This is useful and important information for the sender due to the often asynchronous use of the messenger service. However, as we demonstrate in this paper, this standard feature opens up a timing side channel with unexpected consequence… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: 33 pages, 23 figures, 9 tables, NDSS 2023

  5. You have been warned: Abusing 5G's Warning and Emergency Systems

    Authors: Evangelos Bitsikas, Christina Pöpper

    Abstract: The Public Warning System (PWS) is an essential part of cellular networks and a country's civil protection. Warnings can notify users of hazardous events (e.g., floods, earthquakes) and crucial national matters that require immediate attention. PWS attacks disseminating fake warnings or concealing precarious events can have a serious impact, causing fraud, panic, physical harm, or unrest to users… ▽ More

    Submitted 28 October, 2022; v1 submitted 6 July, 2022; originally announced July 2022.

  6. Towards Security-Optimized Placement of ADS-B Sensors

    Authors: Ala' Darabseh, Christina Pöpper

    Abstract: Automatic Dependent Surveillance Broadcast (ADS-B) sensors deployed on the ground are central to observing aerial movements of aircraft. Their unsystematic placement, however, results in over-densification of sensor coverage in some areas and insufficient sensor coverage in other areas. ADS-B sensor coverage has so far been recognized and analyzed as an availability problem; it was tackled by sens… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

    Comments: 12 pages, 12 figures, accepted as a short paper in WiSec 2022. This is a technical report for more details about our accepted paper

    ACM Class: C.2

  7. arXiv:1710.08932  [pdf, other

    cs.CR

    On Security Research Towards Future Mobile Network Generations

    Authors: David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper

    Abstract: Over the last decades, numerous security and privacy issues in all three active mobile network generations have been revealed that threaten users as well as network providers. In view of the newest generation (5G) currently under development, we now have the unique opportunity to identify research directions for the next generation based on existing security and privacy issues as well as already p… ▽ More

    Submitted 6 March, 2018; v1 submitted 24 October, 2017; originally announced October 2017.

    Comments: Survey: 198 citations, 25 pages, 4 tables, 3 figures