Johanna Ullrich

is researcher at SBA Research.Johanna Ullrich

Research Interest

Her research interests include network security and cloud security, and raising awareness for security and privacy in traditional engineering.

Bio

She received a bachelor’s degree in Electrical Engineering and Information Technology and a master’s degree in Automation Engineering, both with distinction from the TU Wien. For her master thesis on Header Compression of IPsec in Powerline Networks, she received the diploma prize of the city of Vienna. During her studies, she spent a semester at the Czech Technical University in Prague. In 2016, she obtained a PhD degree  with a thesis focusing on side channels and their practical exploitation in attacks; therefore, she is entitled for a promotio sub auspiciis praesidentis (with highest distinctions and awarded by the Austrian president). Besides, she studies law at the University of Vienna. Johanna teaches graduate courses on network and cloud security at University of Applied Sciences FH Technikum as well as FH Campus Wien.

Publications

  • Johanna Ullrich and Tanja Szeby and Joachim Fabini and Edgar R. Weippl, "Network-Based Secret Communication in Clouds: A Survey," IEEE Communications Surveys & Tutorials, 2017. BibTeX | PDF
    @ARTICLE{Ullrich2017NetworkBased,
      Author = {Johanna Ullrich and Tanja Szeby and Joachim Fabini and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Network-Based Secret Communication in Clouds: A Survey},
      journal = {IEEE Communications Surveys & Tutorials},
      year = {2017},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/secretCloud_2017.pdf},
      }
  • Johanna Ullrich and Edgar R. Weippl, "The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor," in European Symposium on Research in Computer Security (ESORICS), 2016. BibTeX | PDF
    @INPROCEEDINGS{Ullrich2016Beauty,
      Author = {Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor},
      booktitle = {European Symposium on Research in Computer Security (ESORICS)},
      year = {2016},
      month = {0},
      pdf = {botb paper.pdf},
      }
  • Johanna Ullrich and Edgar R. Weippl, "Privacy is Not an Option: Attacking the IPv6 Privacy Extension," in International Symposium on Recent Advances in Intrusion Detection (RAID), 2015. BibTeX | PDF | Slides
    @INPROCEEDINGS{Ullrich2015Privacy,
      Author = {Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Privacy is Not an Option: Attacking the IPv6 Privacy Extension},
      booktitle = {International Symposium on Recent Advances in Intrusion Detection (RAID)},
      year = {2015},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Ullrich2015Privacy.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/privacy-is-not-an-option-attacking-the-ipv6-privacy-extension},
      }
  • Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl, "Cloudoscopy: Services Discovery and Topology Mapping," in Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013, 2013. BibTeX | PDF
    @INPROCEEDINGS{cv_workshop_229_2013_Cloudoscopy_weippl,
      Author = {Amir Herzberg and Haya Shulman and Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Cloudoscopy: Services Discovery and Topology Mapping },
      booktitle = {Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013},
      year = {2013},
      month = {11},
      pdf = {cloud_final.pdf},
      }

View all publications

  • Johanna Ullrich and Tanja Szeby and Joachim Fabini and Edgar R. Weippl, "Network-Based Secret Communication in Clouds: A Survey," IEEE Communications Surveys & Tutorials, 2017. BibTeX | PDF
    @ARTICLE{Ullrich2017NetworkBased,
      Author = {Johanna Ullrich and Tanja Szeby and Joachim Fabini and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Network-Based Secret Communication in Clouds: A Survey},
      journal = {IEEE Communications Surveys & Tutorials},
      year = {2017},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/secretCloud_2017.pdf},
      }
  • Johanna Ullrich and Artemios G. Voyiatzis and Edgar R. Weippl, "Secure Cyber-Physical Production Systems: Solid Steps towards Realization," in 1st International Workshop on Cyber-Physical Production Systems (CPPS 2016), 2016. BibTeX | PDF
    @INPROCEEDINGS{Ullrich2016Secure,
      Author = {Johanna Ullrich and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
      title = {Secure Cyber-Physical Production Systems: Solid Steps towards Realization},
      booktitle = {1st International Workshop on Cyber-Physical Production Systems (CPPS 2016)},
      year = {2016},
      month = {4},
      pdf = {cpps.pdf},
      }
  • Johanna Ullrich and Jordan Cropper and Peter Fruehwirt and Edgar R. Weippl, "The role and security of firewalls in cyber-physical cloud computing," EURASIP Journal on Information Security, 2016. BibTeX | PDF
    @ARTICLE{Ullrich2016role,
      Author = {Johanna Ullrich and Jordan Cropper and Peter Fruehwirt and {Edgar R.} Weippl},
      title = {The role and security of firewalls in cyber-physical cloud computing},
      journal = {EURASIP Journal on Information Security},
      year = {2016},
      month = {8},
      pdf = {http://jis.eurasipjournals.springeropen.com/articles/10.1186/s13635-016-0042-3},
      }
  • Johanna Ullrich and Artemios G. Voyiatzis and Edgar R. Weippl, "The Quest for Privacy in Consumer IoT," in 1st International Workshop on Consumers and the Internet of Things (ConsIoT 2016), 2016. BibTeX | PDF
    @INPROCEEDINGS{Ullrich2016Quest,
      Author = {Johanna Ullrich and {Artemios G.} Voyiatzis and {Edgar R.} Weippl},
      title = {The Quest for Privacy in Consumer IoT},
      booktitle = {1st International Workshop on Consumers and the Internet of Things (ConsIoT 2016)},
      year = {2016},
      month = {4},
      pdf = {consiot.pdf},
      }
  • Johanna Ullrich and Edgar R. Weippl, "The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor," in European Symposium on Research in Computer Security (ESORICS), 2016. BibTeX | PDF
    @INPROCEEDINGS{Ullrich2016Beauty,
      Author = {Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor},
      booktitle = {European Symposium on Research in Computer Security (ESORICS)},
      year = {2016},
      month = {0},
      pdf = {botb paper.pdf},
      }
  • Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and Edgar R. Weippl, "QR Code Security – How Secure and Usable Apps Can Protect Users Against Malicious QR Codes," in 2015 International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2015Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes},
      booktitle = {2015 International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {http://ieeexplore.ieee.org/document/7299920/},
      }
  • Johanna Ullrich and Edgar R. Weippl, "CyPhySec: Defending Cyber-Physical Systems ," ERCIM News 102, 2015. BibTeX | PDF
    @ARTICLE{Ullrich2015CyPhySec,
      Author = {Johanna Ullrich and {Edgar R.} Weippl},
      title = {CyPhySec: Defending Cyber-Physical Systems },
      journal = {ERCIM News 102},
      year = {2015},
      month = {7},
      pdf = {https://ercim-news.ercim.eu/en102/special/cyphysec-defending-cyber-physical-systems},
      }
  • Johanna Ullrich and Edgar R. Weippl, "Privacy is Not an Option: Attacking the IPv6 Privacy Extension," in International Symposium on Recent Advances in Intrusion Detection (RAID), 2015. BibTeX | PDF | Slides
    @INPROCEEDINGS{Ullrich2015Privacy,
      Author = {Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Privacy is Not an Option: Attacking the IPv6 Privacy Extension},
      booktitle = {International Symposium on Recent Advances in Intrusion Detection (RAID)},
      year = {2015},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Ullrich2015Privacy.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/privacy-is-not-an-option-attacking-the-ipv6-privacy-extension},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," Magdeburger Journal zur Sicherheitsforschung, vol. 1, 2015. BibTeX | PDF
    @ARTICLE{Ullrich2015IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      journal = {Magdeburger Journal zur Sicherheitsforschung},
      year = {2015},
      month = {3},
      pdf = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_035_Ullrich_IPv6.pdf},
      volume = {1},
      }
  • Johanna Ullrich and Edgar R. Weippl, "Protection through Isolation: Virtues and Pitfalls." , 2015. BibTeX | PDF
    @INBOOK{Ullrich2015Protection,
      Author = {Johanna Ullrich and {Edgar R.} Weippl},
      title = {Protection through Isolation: Virtues and Pitfalls},
      booktitle = {The Cloud Security Ecosystem},
      year = {2015},
      month = {5},
      pdf = {https://www.safaribooksonline.com/library/view/the-cloud-security/9780128017807/B9780128015957000069.xhtml},
      }
  • Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl, "On Reconnaissance with IPv6: A Pattern-Based Scanning Approach," in International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Ullrich2015Reconnaissance,
      Author = {Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
      title = {On Reconnaissance with IPv6: A Pattern-Based Scanning Approach},
      booktitle = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {PID3762727.pdf},
      }
  • Jordan Cropper and Johanna Ullrich and Peter Fruehwirt and Edgar R. Weippl, "The Role and Security of Firewall in IaaS Cloud Computing," in Tenth International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Cropper2015Role,
      Author = {Jordan Cropper and Johanna Ullrich and Peter Fruehwirt and {Edgar R.} Weippl},
      title = {The Role and Security of Firewall in IaaS Cloud Computing},
      booktitle = {Tenth International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {PID3762737.pdf},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," in 8th USENIX Workshop on Offensive Technologies (WOOT), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Ullrich2014IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
      year = {2014},
      month = {8},
      pdf = {Johanna IPv6.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
      }
  • Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and Edgar R. Weippl, "Towards a Hardware Trojan Detection Cycle," in Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2014Towards,
      Author = {Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Towards a Hardware Trojan Detection Cycle},
      booktitle = {Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014},
      year = {2014},
      month = {9},
      pdf = {towards a hardware trojan _paper.pdf},
      }
  • Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Edgar R. Weippl, "Poster NDSS 2014: Hardware Trojans–Detect and React?," Network and Distributed System Security (NDSS) Symposium 2014, 2014. BibTeX
    @ARTICLE{Dabrowski2014Poster,
      Author = {Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and {Edgar R.} Weippl},
      title = {Poster NDSS 2014: Hardware Trojans--Detect and React?},
      journal = {Network and Distributed System Security (NDSS) Symposium 2014},
      year = {2014},
      month = {2},
      }
  • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl, "QR – Inception: Barcode in Barcode Attacks," in 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Dabrowski2014Inception,
      Author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR - Inception: Barcode in Barcode Attacks},
      booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
      year = {2014},
      month = {11},
      pdf = {qrinception.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
      }
  • Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl, "Cloudoscopy: Services Discovery and Topology Mapping," in Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013, 2013. BibTeX | PDF
    @INPROCEEDINGS{cv_workshop_229_2013_Cloudoscopy_weippl,
      Author = {Amir Herzberg and Haya Shulman and Johanna Ullrich and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Cloudoscopy: Services Discovery and Topology Mapping },
      booktitle = {Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013},
      year = {2013},
      month = {11},
      pdf = {cloud_final.pdf},
      }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close