Katharina Krombholz
Katharina Krombholz
Faculty, CISPA Helmholtz Center for Information Security
Bestätigte E-Mail-Adresse bei cispa.saarland - Startseite
TitelZitiert vonJahr
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and Applications 22, 113-122, 2014
1942014
Fake identities in social media: A case study on the sustainability of the facebook business model
K Krombholz, D Merkl, E Weippl
Journal of Service Science Research 4 (2), 175-212, 2012
742012
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
352014
Social engineering attacks on the knowledge worker
K Krombholz, H Hobel, M Huber, E Weippl
Proceedings of the 6th International Conference on Security of Information …, 2013
322013
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
K Krombholz, A Judmayer, M Gusenbauer, E Weippl
Financial Cryptography and Data Security 2016, 2016
292016
IPv6 Security: Attacks and Countermeasures in a Nutshell
J Ullrich, K Krombholz, H Hobel, A Dabrowski, E Weippl
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
292014
Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms
A Judmayer, N Stifter, K Krombholz, E Weippl
Synthesis Lectures on Information Security, Privacy, & Trust 9 (1), 1-123, 2017
222017
Use the force: Evaluating force-sensitive authentication for mobile devices
K Krombholz, T Hupperich, T Holz
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 207-219, 2016
192016
QR inception: Barcode-in-barcode attacks
A Dabrowski, K Krombholz, J Ullrich, ER Weippl
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
182014
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS
K Krombholz, W Mayer, M Schmiedecker, E Weippl
26th USENIX Security Symposium (USENIX Security 2017), 2017
172017
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations
P Frühwirt, P Kieseberg, K Krombholz, E Weippl
Digital Investigation, 2014
122014
Hardware malware
C Krieg, A Dabrowski, H Hobel, K Krombholz, E Weippl
Synthesis Lectures on Information Security, Privacy, & Trust 4 (2), 1-115, 2013
102013
Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing
K Krombholz, A Dabrowski, M Smith, E Weippl
92015
A decision framework model for migration into cloud: Business, application, security and privacy perspectives
S Islam, ER Weippl, K Krombholz
Proceedings of the 16th International Conference on Information Integration …, 2014
92014
On reconnaissance with IPv6: a pattern-based scanning approach
J Ullrich, P Kieseberg, K Krombholz, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
82015
Exploring Design Directions for Wearable Privacy
K Krombholz, A Dabrowski, M Smith, E Weippl
Usable Security Mini Conference (USEC), co-located with NDSS, 2017
52017
Towards a Hardware Trojan Detection Cycle
A Dabrowski, H Hobel, J Ullrich, K Krombholz, ER Weippl
Second International Workshop on Emerging Cyberthreats and Countermeasures …, 2014
52014
Investigating Operators’ Perspective on Security Misconfigurations
C Dietrich, K Krombholz, K Borgolte, T Fiebig
The 25th ACM Conference on Computer and Communications Security (CCS'18), 2018
4*2018
May the Force be with You: The Future of Force-Sensitive Authentication
K Krombholz, T Hupperich, T Holz
IEEE Internet Computing, 2017
32017
QR Code Security - How Secure and Usable Apps Can Protect Users against Malicious QR Codes
K Krombholz, P Fruhwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl
Availability, Reliability and Security (ARES), 2015 10th International …, 2015
32015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20