Katharina Krombholz
Katharina Krombholz
Faculty, CISPA Helmholtz Center for Information Security
Bestätigte E-Mail-Adresse bei cispa.saarland - Startseite
TitelZitiert vonJahr
Advanced social engineering attacks
K Krombholz, H Hobel, M Huber, E Weippl
Journal of Information Security and Applications 22, 113-122, 2014
2962014
Fake identities in social media: A case study on the sustainability of the facebook business model
K Krombholz, D Merkl, E Weippl
Journal of Service Science Research 4 (2), 175-212, 2012
1022012
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy
K Krombholz, A Judmayer, M Gusenbauer, E Weippl
Financial Cryptography and Data Security 2016, 2016
562016
QR code security: A survey of attacks and challenges for usable security
K Krombholz, P Frühwirt, P Kieseberg, I Kapsalis, M Huber, E Weippl
International Conference on Human Aspects of Information Security, Privacy …, 2014
512014
Social engineering attacks on the knowledge worker
K Krombholz, H Hobel, M Huber, E Weippl
Proceedings of the 6th International Conference on Security of Information …, 2013
422013
Blocks and chains: introduction to bitcoin, cryptocurrencies, and their consensus mechanisms
A Judmayer, N Stifter, K Krombholz, E Weippl
Synthesis Lectures on Information Security, Privacy, & Trust 9 (1), 1-123, 2017
362017
IPv6 Security: Attacks and Countermeasures in a Nutshell
J Ullrich, K Krombholz, H Hobel, A Dabrowski, E Weippl
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
332014
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS
K Krombholz, W Mayer, M Schmiedecker, E Weippl
26th USENIX Security Symposium (USENIX Security 2017), 2017
302017
QR inception: Barcode-in-barcode attacks
A Dabrowski, K Krombholz, J Ullrich, ER Weippl
Proceedings of the 4th ACM workshop on security and privacy in smartphones …, 2014
242014
Use the force: Evaluating force-sensitive authentication for mobile devices
K Krombholz, T Hupperich, T Holz
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 207-219, 2016
232016
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations
P Frühwirt, P Kieseberg, K Krombholz, E Weippl
Digital Investigation, 2014
162014
Investigating Operators’ Perspective on Security Misconfigurations
C Dietrich, K Krombholz, K Borgolte, T Fiebig
The 25th ACM Conference on Computer and Communications Security (CCS'18), 2018
15*2018
Hardware malware
C Krieg, A Dabrowski, H Hobel, K Krombholz, E Weippl
Synthesis Lectures on Information Security, Privacy, & Trust 4 (2), 1-115, 2013
132013
QR Code Security - How Secure and Usable Apps Can Protect Users against Malicious QR Codes
K Krombholz, P Fruhwirt, T Rieder, I Kapsalis, J Ullrich, E Weippl
Availability, Reliability and Security (ARES), 2015 10th International …, 2015
122015
On reconnaissance with IPv6: a pattern-based scanning approach
J Ullrich, P Kieseberg, K Krombholz, E Weippl
2015 10th International Conference on Availability, Reliability and Security …, 2015
112015
Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing
K Krombholz, A Dabrowski, M Smith, E Weippl
112015
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS
K Krombholz, K Busse, K Pfeffer, M Smith, E von Zezschwitz
To appear in the Proceedings of the IEEE Symposium on Security & Privacy …, 2019
102019
A decision framework model for migration into cloud: Business, application, security and privacy perspectives
S Islam, ER Weippl, K Krombholz
Proceedings of the 16th International Conference on Information Integration …, 2014
102014
Towards a Hardware Trojan Detection Cycle
A Dabrowski, H Hobel, J Ullrich, K Krombholz, ER Weippl
Second International Workshop on Emerging Cyberthreats and Countermeasures …, 2014
82014
" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers
A Naiakshina, A Danilova, E Gerlitz, E von Zezschwitz, M Smith
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
72019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20