default search action
Adrian Dabrowski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]H. T. M. A. Riyadh, Divyanshu Bhardwaj, Adrian Dabrowski, Katharina Krombholz:
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures. ACNS (3) 2024: 412-431 - [c26]Divyanshu Bhardwaj, Alexander Ponticello, Shreya Tomar, Adrian Dabrowski, Katharina Krombholz:
In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera Glasses. CHI 2024: 577:1-577:18 - [c25]Divyanshu Bhardwaj, Carolyn Guthoff, Adrian Dabrowski, Sascha Fahl, Katharina Krombholz:
Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with Experts. CHI 2024: 833:1-833:24 - [c24]Gabriel Karl Gegenhuber, Florian Holzbauer, Philipp É. Frenzel, Edgar R. Weippl, Adrian Dabrowski:
Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments. USENIX Security Symposium 2024 - [i3]Gabriel Karl Gegenhuber, Wilfried Mayer, Edgar R. Weippl, Adrian Dabrowski:
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research. CoRR abs/2403.08507 (2024) - [i2]Gabriel Karl Gegenhuber, Florian Holzbauer, Philipp É. Frenzel, Edgar R. Weippl, Adrian Dabrowski:
Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments. CoRR abs/2407.19556 (2024) - 2023
- [j3]Matthias Fassl, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz:
Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-26 (2023) - [c23]Carolyn Guthoff, Simon Anell, Johann Hainzinger, Adrian Dabrowski, Katharina Krombholz:
Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals. SP 2023: 588-605 - [c22]Lea Gröber, Rafael Mrowczynski, Nimisha Vijay, Daphne A. Muller, Adrian Dabrowski, Katharina Krombholz:
To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation, Operation, and Security Mindset. USENIX Security Symposium 2023: 2491-2508 - [c21]Gabriel K. Gegenhuber, Wilfried Mayer, Edgar R. Weippl, Adrian Dabrowski:
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research. USENIX Security Symposium 2023: 3493-3510 - [c20]Dañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz:
Investigating Verification Behavior and Perceptions of Visual Digital Certificates. USENIX Security Symposium 2023: 3565-3582 - 2022
- [c19]Paul Kirth, Mitchel Dickerson, Stephen Crane, Per Larsen, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz:
PKRU-safe: automatically locking down the heap between safe and unsafe languages. EuroSys 2022: 132-148 - 2021
- [c18]Adrian Dabrowski, Katharina Pfeffer, Markus Reichel, Alexandra Mai, Edgar R. Weippl, Michael Franz:
Better Keep Cash in Your Boots - Hardware Wallets are the New Single Point of Failure. DeFi@CCS 2021: 1-8 - [c17]Katharina Pfeffer, Alexandra Mai, Adrian Dabrowski, Matthias Gusenbauer, Philipp Schindler, Edgar R. Weippl, Michael Franz, Katharina Krombholz:
On the Usability of Authenticity Checks for Hardware Security Tokens. USENIX Security Symposium 2021: 37-54 - 2020
- [c16]Anil Altinay, Joseph Nash, Taddeus Kroes, Prabhu Rajasekaran, Dixin Zhou, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, Cristiano Giuffrida, Herbert Bos, Michael Franz:
BinRec: dynamic binary lifting and recompilation. EuroSys 2020: 36:1-36:16
2010 – 2019
- 2019
- [c15]Adrian Dabrowski, Georg Merzdovnik, Johanna Ullrich, Gerald Sendera, Edgar R. Weippl:
Measuring Cookies and Web Privacy in a Post-GDPR World. PAM 2019: 258-270 - 2018
- [j2]David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar R. Weippl, Christina Pöpper:
On Security Research Towards Future Mobile Network Generations. IEEE Commun. Surv. Tutorials 20(3): 2518-2542 (2018) - [j1]Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl:
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid. Elektrotech. Informationstechnik 135(3): 250-255 (2018) - [c14]Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar R. Weippl:
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. RAID 2018: 184-203 - 2017
- [c13]Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl:
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. ACSAC 2017: 303-314 - [c12]Shimon Machida, Adrian Dabrowski, Edgar R. Weippl, Isao Echizen:
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. I3E 2017: 261-275 - [i1]David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar R. Weippl, Christina Pöpper:
On Security Research towards Future Mobile Network Generations. CoRR abs/1710.08932 (2017) - 2016
- [c11]Adrian Dabrowski, Georg Petzl, Edgar R. Weippl:
The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. RAID 2016: 279-302 - [c10]Adrian Dabrowski, Georg Merzdovnik, Nikolaus Kommenda, Edgar R. Weippl:
Browser History Stealing with Captive Wi-Fi Portals. IEEE Symposium on Security and Privacy Workshops 2016: 234-240 - 2015
- [c9]Adrian Dabrowski, Katharina Krombholz, Edgar R. Weippl, Isao Echizen:
Smart Privacy Visor: Bridging the Privacy Gap. BIS (Workshops) 2015: 235-247 - [c8]Katharina Krombholz, Adrian Dabrowski, Matthew Smith, Edgar R. Weippl:
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. Financial Cryptography Workshops 2015: 274-280 - [c7]Adrian Dabrowski, Isao Echizen, Edgar R. Weippl:
Error-Correcting Codes as Source for Decoding Ambiguity. IEEE Symposium on Security and Privacy Workshops 2015: 99-105 - 2014
- [c6]Adrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar R. Weippl:
Towards a Hardware Trojan Detection Cycle. ARES 2014: 287-294 - [c5]Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar R. Weippl:
IMSI-catch me if you can: IMSI-catcher-catchers. ACSAC 2014: 246-255 - [c4]Adrian Dabrowski, Katharina Krombholz, Johanna Ullrich, Edgar R. Weippl:
QR Inception: Barcode-in-Barcode Attacks. SPSM@CCS 2014: 3-10 - [c3]Alberto Escalada Jimenez, Adrian Dabrowski, Noboru Sonehara, Juan Manuel Montero-Martínez, Isao Echizen:
Tag Detection for Preventing Unauthorized Face Image Processing. IWDW 2014: 513-524 - [c2]Johanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski, Edgar R. Weippl:
IPv6 Security: Attacks and Countermeasures in a Nutshell. WOOT 2014 - 2013
- [b1]Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, Edgar R. Weippl:
Hardware Malware. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 9781627052511, pp. 1-115 - [c1]Adrian Dabrowski, Edgar R. Weippl, Isao Echizen:
Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing. SMC 2013: 455-461
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint