Floragasse 7 – 5th floor, 1040 Vienna

Adrian Dabrowski

Adrian Dabrowski

was senior researcher at SBA Research

  • adabrowski@sba-research.org
  • +43 (1) 505 36 88
  • -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: GnuPG v1.4.11 (GNU/Linux)
    
    mQINBFA07xYBEACRjNgfXwpNSI0yV5UVvphJ8zJXvpCYc3Yg+XOQP/Q4FN0M5hDB
    6NSa0v/QkoB98BeUC1MPea0jz3Ql687m2ezQxhx6+hrmNWUPu7TGpWBdFrauDHqw
    O9Bxd+HJVVJfMUE2c2tmxh/62t2Ckq19EXSyBmnNrjDkgduGksEk43zmL7ZR8Na0
    v7U3xyOOOKOg2Uoso8aJd3ub5RZ34hn7MqWVShJEJX/RCkW4sW/sCX/Z+0UQFivS
    BOk7MbCXwEcbFdGsAfpaN7mwQsNLaoHW5pLSSLyj8eT8c/IXpjWUptxyi6TBeNr2
    pxmkZy1poLd3zrzmqgT/ZnxvKZsN84UymxUOUK4opDljA/45FHfPn4ijwMVN9xDr
    zJJKVhyrEWCLMlupxFzniSjgLUqhCCfMeId07M7ky8fXGoGlGcTOjZN2tOl+Ulna
    VTg7K7loeI5iz+5TQTFAD0jFIxkBahEXZm7IZnhMb8J6zarmjIIkvxdSNnr6NAIC
    AmtwEKDY5iyoRAsU79LwXO8NNSwwm8UlojMnLcn9ppog6K+gwXNctZUC/9AHCGoI
    J0qDbFzH7qMTIG4/5tv8Ja+vZ8jFD7KhI58WmpG4MsYWB5cQQDbKDxDSqxPuKzq5
    va7+jj6s6bwY5PFNI4wOLdkxgK5MGvk3FssNFN8jDUxfDol8bA8aWy/LZQARAQAB
    tC5BZHJpYW4gRGFicm93c2tpIDxBRGFicm93c2tpQHNiYS1yZXNlYXJjaC5vcmc+
    iQI+BBMBAgAoBQJQNO8WAhsjBQkJZgGABgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIX
    gAAKCRB5WUdP2x5Odgn3D/95GDA1FU7pKqsTRs6jme+nOvo5LKj6Exa4vVaXJKf0
    Tf3307ng1aunpDa1BJ1GFz5xK1TUuu9R69qw/yK0qyEbukzlsYkWWSd8G1xAFI9n
    5PNNb6eVve+NWY2k3BZq8E0ttKX+Yo0Q414hcfxRqVxKutrmExRFTfuDYobnuWp2
    +zAx3+zFZ9yR7A1SLLfqh4s0raDak2189FR61cuq7+uvcS2QYHG4VpM6yYyJpqTu
    5H8x/vt+wA9FAJVEv9QON6zBwyMLL1F6tF6PHM9kEyyPlzwWPsoqcdH+rG1vr6v1
    3in8W3M4AAqg1MBZTBcpgmsyY/xjMvyR+D/FouBMP7oS2WB2lmRCEPWoxQlfTmSc
    FNTxngP90ClWaAiN4fToSTylOC8QkAJ+d1QAhWlxHRSqrwfDAHlhtMHNBoWDFdK9
    vrs4UgJCBD6hBkHpplmizW+VJBe0JGUeYoe19YQxu92GU/xenG4KbVvv2tyeYTLd
    Q5juY/gI2YuU5mxUT6pniDGXY3d0MUY+aqXS72jiq9vKfPaRMS/iVKOcyR4lA71L
    KyXt11kAR27zyAioT/rxeYY/ee9I7yAOlGiJfW0sCsTNSH9RTnSygOv5JPoEJC0b
    KN8scdWFKB6ZKwQ7CN9bcS0WtczBgGaf/yZulVlnWAmzG2iT78ULuNFhssj6f9aw
    D7kCDQRQNO8WARAA1uWIruW0fajE0nrZq5oUMsLtm12I1lEv3KIC/wtPzJ+5mqMo
    y9VUXv0Anwg4fECMUYmKCaqGLQnsxb5HXccC6W2uix34uhv1igNjhzG5YsaGdw9N
    a77rZWdONh/yXmEsEwZm59Nl8Kh7MkrLslXUWBaWnrJpFxDqfI/lL7nbOctDgdMJ
    MeJXwFwhjUA+zyLUnJ7KQtUVAx59LmnzMpaTAeJNdWU6GGZYyabAw5b9ybS2fTNF
    V2hgu0A4pYIt4MliO+8IJYxxdRBoxjP3lEiybWfTXgs5uTaQxsYMCGa3SG1XsXo6
    e+b6+66yYp5jY6940hkZpgNUcYUVFU5pdUBY6vG8E8CwahowzqOVP6lzABMORxfW
    viWBbE8052tbIxdg93nwXqpzCNzg1iXQ7AKXEHFvoHDTZxZLIGYyIbjZwgJdBrWi
    u5HZQvk1Rx6r2RixwPIVZng5G23fkB7hjfgKMWmip7us2JaLevspWQXqSex5kFC6
    TbdMN9ff5gQTgl/DIQCHMGXttsZBWX+hRa+qNOznqdmwz346wG0LWEApBgpk9bc6
    jUGx/MOlsP7ZzNDlhH8J7tUHpijdrNj4uVwtHNIM2ieSIpi16eNMb7JGUwLN5QZx
    H4KoFXZOLqBTRiYY/iH5ynfYHLkBVHndGSOoDFKx2Z3wU8gKq2j7tpoyPp8AEQEA
    AYkCJQQYAQIADwUCUDTvFgIbDAUJCWYBgAAKCRB5WUdP2x5Odm2uD/4y27cVj3BO
    CMBEpm5QjIS6Jmgk1UbMKK8jQpqSYFDtTSVvHy7fm9y4pw+MYmQyYs0w4xuMsNEU
    DXiIihUd5oSR2m5z5TnLHZs2GEXwW8V9Q/v2a47b3+bTyuZuZBZqdz2k62CdWvY9
    DLItjSEAXNC+voVlC0XJkTzLsY7QXVPIxdkpkZ9GNXlMq0QdpYO6gTXpxI9PpQvy
    7TEOTPVTuxLXyfMk31Ogl0rtTYouC8Js4rwdurMiWY8PHbu735iomLIjUp3LYInJ
    6qMSpI/tudhC/PNjUN9g7jUJYDH1cuKLYDBYBLjDkrF1nLKuPIvc0BqpiXKDpHJb
    HoafUvGxNXPMMxgDv7QpuZFjPpcWBhxMsMW/GTvAcHalDYjUfFri4JBh87iyTfLI
    zXUdJSJG8f8FDE0CpvQqXcra3rGj2mTLHJF+nalzFlGejgy1vJoDcfMIj6vNJYff
    bzmIYT2f2Qr9EA9FyFqoXE5qS6e7KEvIW4LwCibo/PUfPF/iOILLE2Kg6hMXbLS0
    G5/kFbUlemAFtIBRQspYxBV2PtJX77+Bz+xc2iROOARxDCushPyHHgs+UkJCJc0h
    RTwSXoaTSMekbwzq6U7HFTGJ6nA7sYfGWFlg85DFhZp3xGqwfz3yKS2sAbLDnREQ
    AFSwTdnp+4LxeSnxyVM9VU9IjOqjp9FWRw==
    =kaaA
    -----END PGP PUBLIC KEY BLOCK-----
  • 43EC 0F2B 8881 E26F 62A5 013F 7959 474F DB1E 4E76

Research Interests

His research interests cover RFID, cyberphysical security, hardware security and privacy enhancing technologies.


Bio

Adrian Dabrowski received his PhD from TU Wien. He participated and later organized the Viennese iCTF team, winning two times. He received the IEEE Austria Diploma Thesis Award and was nominated for the Distinguished Young Alumnus Award of the Faculty of Informatics, UT Vienna. His ACSAC 2014 paper won the Best Student Paper Award.

Before that, he made several media appearances concerning security of systems in public use and taught part-time at a technical high school.

He has been speaker at several Computer Chaos Club (CCC) conferences, as well as SIGINT, B-Sides, PrivacyOS and Forum Alpbach. During his PhD, he visited the Echizen Group at the National Institute of Informatics in Tokyo multiple times.

Further website

See also http://www.seclab.tuwien.ac.at/people/atrox/


Publikationen

Top Publications:

  • Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing (2013)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Edgar R. Weippl and Isao Echizen
    • Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC2013)
    @INPROCEEDINGS{Dabrowski2013Framework,
       author = {Adrian Dabrowski and {Edgar R.} Weippl and Isao Echizen},
       title = {Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing},
       booktitle = {Proceedings of the 2013 IEEE International Conference on Systems,
       Man,
       and Cybernetics (SMC2013)},
       year = {2013},
       month = {10},
    }
  • IMSI-Catch Me If You Can: IMSI-Catcher-Catchers (2014)
    • INPROCEEDINGStruetrue
    • Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and Edgar R. Weippl
    • Annual Computer Security Applications Conference (ACSAC)
    @INPROCEEDINGS{Dabrowski2014IMSICatch,
       author = {Adrian Dabrowski and Nicola Pianta and Thomas Klepp and Martin Schmiedecker and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {IMSI-Catch Me If You Can: IMSI-Catcher-Catchers},
       booktitle = {Annual Computer Security Applications Conference (ACSAC)},
       year = {2014},
       month = {12},
       pdf = {DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf},
       link_source = {http://sourceforge.net/p/icc/},
    }
  • QR - Inception: Barcode in Barcode Attacks (2014)
    • INPROCEEDINGS-true
    • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl
    • 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
    @INPROCEEDINGS{Dabrowski2014Inception,
       author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
       authorhotlist = {true},
       title = {QR - Inception: Barcode in Barcode Attacks},
       booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
       year = {2014},
       month = {11},
       pdf = {qrinception.pdf},
       link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
    }
  • Poster NDSS 2014: Hardware Trojans--Detect and React? (2014)
    • ARTICLE--
    • Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Edgar R. Weippl
    • Network and Distributed System Security (NDSS) Symposium 2014
    @ARTICLE{Dabrowski2014Poster,
       author = {Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and {Edgar R.} Weippl},
       title = {Poster NDSS 2014: Hardware Trojans--Detect and React?},
       journal = {Network and Distributed System Security (NDSS) Symposium 2014},
       year = {2014},
       month = {2},
    }
  • Towards a Hardware Trojan Detection Cycle (2014)
    • INPROCEEDINGStrue-
    • Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and Edgar R. Weippl
    • Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014
    @INPROCEEDINGS{Dabrowski2014Towards,
       author = {Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and {Edgar R.} Weippl},
       sbahotlist = {true},
       title = {Towards a Hardware Trojan Detection Cycle},
       booktitle = {Second International Workshop on Emerging Cyberthreats and Countermeasures,
       ARES ECTCM 2014},
       year = {2014},
       month = {9},
       pdf = {towards a hardware trojan _paper.pdf},
    }
  • Error-Correcting Codes as Source for Decoding Ambiguity (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Isao Echizen and Edgar R. Weippl
    • LangSec Workshop at IEEE Security & Privacy
    @INPROCEEDINGS{Dabrowski2015ErrorCorrecting,
       author = {Adrian Dabrowski and Isao Echizen and {Edgar R.} Weippl},
       title = {Error-Correcting Codes as Source for Decoding Ambiguity},
       booktitle = {LangSec Workshop at IEEE Security & Privacy},
       year = {2015},
       month = {21},
       pdf = {ecc.pdf},
       volume = {10},
    }
  • Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and Edgar R. Weippl and Wolfgang Kastner
    • USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015
    @INPROCEEDINGS{Dabrowski2015Leveraging,
       author = {Adrian Dabrowski and Markus Kammerstetter and Eduard Thamm and {Edgar R.} Weippl and Wolfgang Kastner},
       title = {Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education},
       booktitle = {USENIX Summit on Gaming,
       Games and Gamification in Security Education (3GSE 2015) at USENIX Security Symposiom 2015},
       year = {2015},
       month = {8},
       pdf = {https://www.usenix.org/system/files/conference/3gse15/3gse15-dabrowski.pdf},
    }
  • Smart Privacy Visor: Bridging the Privacy Gap (2015)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Katharina Krombholz and Edgar R. Weippl and Isao Echizen
    • Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)
    @INPROCEEDINGS{Dabrowski2015Smart,
       author = {Adrian Dabrowski and Katharina Krombholz and {Edgar R.} Weippl and Isao Echizen},
       title = {Smart Privacy Visor: Bridging the Privacy Gap},
       booktitle = {Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)},
       year = {2015},
       month = {6},
       pdf = {http://link.springer.com/chapter/10.1007/978-3-319-26762-3_21},
    }
  • Browser History Stealing with Captive Wi-Fi Portals (2016)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Georg Merzdovnik and Nikolaus Kommenda and Edgar R. Weippl
    • Proceedings of Workshops at IEEE Security & Privacy 2016, Mobile Security Technologies (MoST)
    @INPROCEEDINGS{Dabrowski2016Browser,
       author = {Adrian Dabrowski and Georg Merzdovnik and Nikolaus Kommenda and {Edgar R.} Weippl},
       title = {Browser History Stealing with Captive Wi-Fi Portals},
       booktitle = {Proceedings of Workshops at IEEE Security & Privacy 2016,
       Mobile Security Technologies (MoST)},
       year = {2016},
       month = {5},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/Dabrowski2016Browser.pdf},
    }
  • The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection (2016)
    • INPROCEEDINGStruetrue
    • Adrian Dabrowski and Georg Petzl and Edgar R. Weippl
    • 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016)
    @INPROCEEDINGS{Dabrowski2016Messenger,
       author = {Adrian Dabrowski and Georg Petzl and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection},
       booktitle = {19th International Symposium on Research in Attacks,
       Intrusions and Defenses (RAID 2016)},
       year = {2016},
       month = {9},
       pdf = {providerICdetection.pdf},
    }
  • Mobile Phone's Wi-Fi Presence for Continuous Implicit Secondary Deauthentication (2016)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Edgar R. Weippl
    • 11th International Conference on Passwords
    @INPROCEEDINGS{Dabrowski2016Mobile,
       author = {Adrian Dabrowski and {Edgar R.} Weippl},
       title = {Mobile Phone's Wi-Fi Presence for Continuous Implicit Secondary Deauthentication},
       booktitle = {11th International Conference on Passwords},
       year = {2016},
       month = {12},
       pdf = {https://www.sba-research.org/wp-content/uploads/publications/wifipresence.pdf},
       link_video = {https://www.youtube.com/watch?v=6fC58E1XAAw&list=PLdIqs92nsIzT2ao_wAJ2GCRKl_3zaebgb&index=2},
    }
  • Grid Shock: Coordinated Load-Changing Attacks on Power Grids (2017)
    • INPROCEEDINGStruetrue
    • Adrian Dabrowski and Johanna Ullrich and Edgar R. Weippl
    • Annual Computer Security Applications Conference (ACSAC) 2017
    @INPROCEEDINGS{Dabrowski2017Grid,
       author = {Adrian Dabrowski and Johanna Ullrich and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {Grid Shock: Coordinated Load-Changing Attacks on Power Grids},
       booktitle = {Annual Computer Security Applications Conference (ACSAC) 2017},
       year = {2017},
       month = {12},
       pdf = {201712 - ADabrowski - Grid Shock.pdf},
       link_data = {https://www.sba-research.org/wp-content/uploads/publications/Simulink.zip},
    }
  • Botnets causing blackouts: how coordinated load attacks can destabilize the power grid (2018)
    • ARTICLE--
    • Adrian Dabrowski and Johanna Ullrich and Edgar R. Weippl
    • e & i Elektrotechnik und Informationstechnik
    @ARTICLE{Dabrowski2018Botnets,
       author = {Adrian Dabrowski and Johanna Ullrich and {Edgar R.} Weippl},
       title = {Botnets causing blackouts: how coordinated load attacks can destabilize the power grid},
       journal = {e & i Elektrotechnik und Informationstechnik},
       year = {2018},
       month = {6},
       pdf = {201806-Dabrowski-BotnetsCausingBlackoutsHowCoor.pdf},
    }
  • Measuring Cookies and Web Privacy in a Post-GDPR World (2019)
    • INPROCEEDINGS--
    • Adrian Dabrowski and Georg Merzdovnik and Johanna Ullrich and Gerald Sendera and Edgar R. Weippl
    • Passive and Active Measurement Conference 2019
    @INPROCEEDINGS{Dabrowski2019Measuring,
       author = {Adrian Dabrowski and Georg Merzdovnik and Johanna Ullrich and Gerald Sendera and {Edgar R.} Weippl},
       title = {Measuring Cookies and Web Privacy in a Post-GDPR World},
       booktitle = {Passive and Active Measurement Conference 2019},
       year = {2019},
       month = {3},
       pdf = {201903 - ADabrowski - Measuring Cookies.pdf},
    }
  • Tag Detection for Preventing Unauthorized Face Image Processing (2014)
    • INPROCEEDINGS--
    • Alberto Escalada Jimenez and Adrian Dabrowski and Juan M. Montero Martinez and Isao Echizen
    • Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014)
    @INPROCEEDINGS{Jimenez2014Detection,
       author = {{Alberto Escalada} Jimenez and Adrian Dabrowski and {Juan M.} {Montero Martinez} and Isao Echizen},
       title = {Tag Detection for Preventing Unauthorized Face Image Processing},
       booktitle = {Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014)},
       year = {2014},
       month = {10},
       pdf = {judmayer_KNX_wfcs2014.pdf},
    }
  • Hardware Malware (2013)
    • ARTICLE--
    • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl
    • Synthesis Lectures on Information Security, Privacy, and Trust
    @ARTICLE{Krieg2013Hardware,
       author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
       title = {Hardware Malware},
       journal = {Synthesis Lectures on Information Security,
       Privacy,
       and Trust},
       year = {2013},
       month = {11},
       volume = {4},
       pages = {1-115},
    }
  • Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing (2015)
    • INPROCEEDINGS--
    • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl
    • 1st Workshop on Wearable Security and Privacy
    @INPROCEEDINGS{Krombholz2015Glass,
       author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
       title = {Ok Glass,
       Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing},
       booktitle = {1st Workshop on Wearable Security and Privacy},
       year = {2015},
       month = {1},
       pdf = {Ok Glass.pdf},
    }
  • Exploring Design Directions for Wearable Privacy (2017)
    • INPROCEEDINGS--
    • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl
    • Usable Security
    @INPROCEEDINGS{Krombholz2017Exploring,
       author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
       title = {Exploring Design Directions for Wearable Privacy},
       booktitle = {Usable Security},
       year = {2017},
       month = {1},
       pdf = {https://www.internetsociety.org/sites/default/files/usec2017_03_2_Krombholz_paper.pdf},
    }
  • PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks (2017)
    • INPROCEEDINGS--
    • Shimon Machida and Adrian Dabrowski and Edgar R. Weippl and Isao Echizen
    • 16th IFIP Conference on e-Business, e-Services and e-Society (I3E 2017)
    @INPROCEEDINGS{Machida2017PrivacyTag,
       author = {Shimon Machida and Adrian Dabrowski and {Edgar R.} Weippl and Isao Echizen},
       title = {PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks},
       booktitle = {16th IFIP Conference on e-Business,
       e-Services and e-Society (I3E 2017)},
       year = {2017},
       month = {11},
       pdf = {https://link.springer.com/chapter/10.1007/978-3-319-68557-1_24},
    }
  • On security research towards future mobile network generations (2018)
    • ARTICLE--
    • David Rupprecht and Adrian Dabrowski and Thorsten Holz and Edgar R. Weippl and Christina Pöpper
    • IEEE Communications Surveys & Tutorial
    @ARTICLE{Rupprecht2018IEEE,
       author = {David Rupprecht and Adrian Dabrowski and Thorsten Holz and {Edgar R.} Weippl and Christina Pöpper},
       title = {On security research towards future mobile network generations},
       journal = {IEEE Communications Surveys & Tutorial},
       year = {2018},
       month = {3},
       pdf = {2018-03 On security Research towards future mobile Generations.pdf},
    }
  • IPv6 Security: Attacks and Countermeasures in a Nutshell (2014)
    • INPROCEEDINGS-true
    • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl
    • 8th USENIX Workshop on Offensive Technologies (WOOT)
    @INPROCEEDINGS{Ullrich2014IPv6,
       author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
       authorhotlist = {true},
       title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
       booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
       year = {2014},
       month = {8},
       pdf = {Johanna IPv6.pdf},
       link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
    }
  • IPv6 Security: Attacks and Countermeasures in a Nutshell (2015)
    • ARTICLE--
    • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl
    • Magdeburger Journal zur Sicherheitsforschung
    @ARTICLE{Ullrich2015IPv6,
       author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
       title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
       journal = {Magdeburger Journal zur Sicherheitsforschung},
       year = {2015},
       month = {3},
       pdf = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_035_Ullrich_IPv6.pdf},
       volume = {1},
    }
  • Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids (2018)
    • INPROCEEDINGStruetrue
    • Johanna Ullrich and Nicholas Stifter and Aljosha Judmayer and Adrian Dabrowski and Edgar R. Weippl
    • International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
    @INPROCEEDINGS{Ullrich2018ProofofBlackouts,
       author = {Johanna Ullrich and Nicholas Stifter and Aljosha Judmayer and Adrian Dabrowski and {Edgar R.} Weippl},
       authorhotlist = {true},
       sbahotlist = {true},
       title = {Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids},
       booktitle = {International Symposium on Research in Attacks,
       Intrusions and Defenses (RAID)},
       year = {2018},
       month = {9},
       pdf = {https://www.sqi.at/resources/RAID2018.pdf},
    }

This Website uses Cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close