Katharina Krombholz

is senior researcher at SBA Research.Katharina Krombholz

  • E-Mail
  • Phone: +43 (1) 505 36 88
  • Fax: +43 (1) 505 88 88
  • PGP: 0xC0444D5B
  • PGP Fingerprint: 5E3A 8094 0C15 15BA A415 4A2A B1A5 8EF6 C044 4D5B
  • Google Scholar

Research Interests

Her research focuses on usable security, privacy and digital forensics.

Bio

She completed her Ph.D in November 2016 with distinction. She also received a master’s degree in Media Informatics from the TU Wien in 2012.

During her master’s studies, she spent a semester at the University of Coimbra in Portugal. In 2013, she spent a semester as research intern at the National Institute of Informatics in Tokyo, Japan. In 2015, Katharina spent two months as a research intern at the Ruhr-University in Bochum and worked together with Thorsten Holz. Besides her research activities at SBA Research, she is currently teaching graduate courses on digital forensics TU Wien and the University of Applied Sciences FH Campus Wien and cloud security at the University of Applied Sciences FH Technikum Wien.

Katharina is Vice-Chair of the ACM SIGSAC Vienna Chapter.

Program Committees

Publications

  • Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and Edgar R. Weippl, ""I Have No Idea What I’m Doing" – On the Usability of Deploying HTTPS," in 26th USENIX Security Symposium (USENIX Security 2017), 2017. BibTeX
    @INPROCEEDINGS{Krombholz2017Have,
      Author = {Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS},
      booktitle = {26th USENIX Security Symposium (USENIX Security 2017)},
      year = {2017},
      month = {8},
      }
  • Katharina Krombholz and Thomas Hupperich and Thorsten Holz, "May the Force be with You: The Future of Force-Sensitive Authentication," Journal of Internet Computing, Special Issue of Usable Security and privacy, 2017. BibTeX
    @ARTICLE{Krombholz2017Force,
      Author = {Katharina Krombholz and Thomas Hupperich and Thorsten Holz},
      sbahotlist = {true},
      title = {May the Force be with You: The Future of Force-Sensitive Authentication},
      journal = {Journal of Internet Computing, Special Issue of Usable Security and privacy},
      year = {2017},
      month = {0},
      }
  • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl, "Exploring Design Directions for Wearable Privacy," in Usable Security, 2017. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2017Exploring,
      Author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
      title = {Exploring Design Directions for Wearable Privacy},
      booktitle = {Usable Security},
      year = {2017},
      month = {0},
      pdf = {https://www.internetsociety.org/sites/default/files/usec2017_03_2_Krombholz_paper.pdf},
      }
  • Katharina Krombholz and Thomas Hupperich and Thorsten Holz, "Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices," in Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016. BibTeX | PDF | Slides
    @INPROCEEDINGS{Krombholz2016Force,
      Author = {Katharina Krombholz and Thomas Hupperich and Thorsten Holz},
      sbahotlist = {true},
      title = {Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices},
      booktitle = {Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Krombholz2016Force.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/use-the-force-evaluating-forcesensitive-authentication-for-mobile-devices},
      }
  • Sven Dietrich and Michael Brenner and Katharina Krombholz, "Who are you now? Fading to multiple personas," in Who are you?! Adventures in Authentication (SOUPS Workshop), 2016. BibTeX | PDF
    @INPROCEEDINGS{Dietrich2016now,
      Author = {Sven Dietrich and Michael Brenner and Katharina Krombholz},
      title = {Who are you now? Fading to multiple personas},
      booktitle = {Who are you?! Adventures in Authentication (SOUPS Workshop)},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Dietrich2016now.pdf},
      }
  • Fuensanta Torres Garcia and Katharina Krombholz and Rudolf Mayer and Edgar R. Weippl, "Hand Dynamics for Behavioral User Authentication," in 5th International Workshop on Security of Mobile Applications (IWSMA 2016), 2016. BibTeX | PDF
    @INPROCEEDINGS{TorresGarcia2016Hand,
      Author = {Fuensanta {Torres Garcia} and Katharina Krombholz and Rudolf Mayer and {Edgar R.} Weippl},
      title = {Hand Dynamics for Behavioral User Authentication},
      booktitle = {5th International Workshop on Security of Mobile Applications (IWSMA 2016)},
      year = {2016},
      month = {9},
      pdf = {ARES_2016_paper_19 (2).pdf},
      }
  • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl, "The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy," in International Conference on Financial Cryptography and Data Security (FC), 2016. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2016Other,
      Author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy},
      booktitle = {International Conference on Financial Cryptography and Data Security (FC)},
      year = {2016},
      month = {2},
      pdf = {TheOtherSideOfTheCoin_FC16preConf.pdf},
      }
  • Thomas Hupperich and Katharina Krombholz and Thorsten Holz, "Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness," in 9th International Conference on Trust and Trustworthy Computing, 2016. BibTeX | PDF
    @INPROCEEDINGS{Hupperich2016Sensor,
      Author = {Thomas Hupperich and Katharina Krombholz and Thorsten Holz},
      title = {Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness},
      booktitle = {9th International Conference on Trust and Trustworthy Computing},
      year = {2016},
      month = {8},
      pdf = {sensorcaptchas.pdf},
      }
  • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl, "Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin," in Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., 2016. BibTeX
    @INPROCEEDINGS{Krombholz2016bare,
      Author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
      title = {Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin},
      booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.},
      year = {2016},
      month = {4},
      }
  • Adrian Dabrowski and Katharina Krombholz and Edgar R. Weippl and Isao Echizen, "Smart Privacy Visor: Bridging the Privacy Gap," in Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015), 2015. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2015Smart,
      Author = {Adrian Dabrowski and Katharina Krombholz and {Edgar R.} Weippl and Isao Echizen},
      title = {Smart Privacy Visor: Bridging the Privacy Gap},
      booktitle = {Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)},
      year = {2015},
      month = {6},
      pdf = {http://link.springer.com/chapter/10.1007/978-3-319-26762-3_21},
      }
  • Katharina Krombholz and Christopher Frauenberger and Edgar R. Weippl, "Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology," in Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015, 2015. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2015Privacy,
      Author = {Katharina Krombholz and Christopher Frauenberger and {Edgar R.} Weippl},
      title = {Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology},
      booktitle = {Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015},
      year = {2015},
      month = {7},
      pdf = {https://www.ifs.tuwien.ac.at/node/17062},
      }
  • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl, "Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing," in 1st Workshop on Wearable Security and Privacy, 2015. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2015Glass,
      Author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
      title = {Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing},
      booktitle = {1st Workshop on Wearable Security and Privacy},
      year = {2015},
      month = {1},
      pdf = {Ok Glass.pdf},
      }
  • Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and Edgar R. Weippl, "QR Code Security – How Secure and Usable Apps Can Protect Users Against Malicious QR Codes," in 2015 International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2015Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes},
      booktitle = {2015 International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {http://ieeexplore.ieee.org/document/7299920/},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," Magdeburger Journal zur Sicherheitsforschung, vol. 1, 2015. BibTeX | PDF
    @ARTICLE{Ullrich2015IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      journal = {Magdeburger Journal zur Sicherheitsforschung},
      year = {2015},
      month = {3},
      pdf = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_035_Ullrich_IPv6.pdf},
      volume = {1},
      }
  • Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl, "On Reconnaissance with IPv6: A Pattern-Based Scanning Approach," in International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Ullrich2015Reconnaissance,
      Author = {Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
      title = {On Reconnaissance with IPv6: A Pattern-Based Scanning Approach},
      booktitle = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {PID3762727.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl, "Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations," Digital Investigation, vol. 11, pp. 336-348, 2014. BibTeX | PDF
    @ARTICLE{Fruehwirt2014Towards,
      Author = {Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations},
      journal = {Digital Investigation},
      year = {2014},
      month = {0},
      pdf = {towards a forensic aware_paper.pdf},
      volume = {11},
      pages = {336-348},
      }
  • Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and Edgar R. Weippl, "Automated Analysis of Underground Marketplaces," in Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Hudic2014Automated,
      Author = {Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and {Edgar R.} Weippl},
      title = {Automated Analysis of Underground Marketplaces},
      booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2014},
      month = {1},
      pdf = {undergroundmarketplaces.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/automated-analysis-of-underground-marketplaces-42099600},
      }
  • Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and Edgar R. Weippl, "Towards a Hardware Trojan Detection Cycle," in Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2014Towards,
      Author = {Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Towards a Hardware Trojan Detection Cycle},
      booktitle = {Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014},
      year = {2014},
      month = {9},
      pdf = {towards a hardware trojan _paper.pdf},
      }
  • Shareeful Islam and Edgar R. Weippl and Katharina Krombholz, "A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives," in IIWAS 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Islam2014Decision,
      Author = {Shareeful Islam and {Edgar R.} Weippl and Katharina Krombholz},
      title = {A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives},
      booktitle = {IIWAS 2014},
      year = {2014},
      month = {12},
      pdf = {09_iiwas_46.pdf},
      }
  • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl, "QR – Inception: Barcode in Barcode Attacks," in 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Dabrowski2014Inception,
      Author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR - Inception: Barcode in Barcode Attacks},
      booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
      year = {2014},
      month = {11},
      pdf = {qrinception.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Advanced social engineering attacks," Journal of Information Security and Applications, 2014. BibTeX | PDF
    @ARTICLE{Krombholz2014Advanced,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Advanced social engineering attacks},
      journal = {Journal of Information Security and Applications},
      year = {2014},
      month = {0},
      pdf = {jisa_revised.pdf},
      }
  • Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and Edgar R. Weippl, "QR Code Security: A Survey of Attacks and Challenges for Usable Security." Springer, 2014, pp. 79-90. BibTeX | PDF | Slides
    @INBOOK{Krombholz2014Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and {Edgar R.} Weippl},
      title = {QR Code Security: A Survey of Attacks and Challenges for Usable Security},
      booktitle = {Human Aspects of Information Security, Privacy, and Trust},
      year = {2014},
      month = {0},
      pdf = {llncs.pdf},
      pages = {79--90},
      publisher = {Springer},
      link_slides = {http://de.slideshare.net/SBAResearch/qr-code-security-a-survey-of-attacks-and-challenges-for-usable-security},
      }
  • Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Edgar R. Weippl, "Poster NDSS 2014: Hardware Trojans–Detect and React?," Network and Distributed System Security (NDSS) Symposium 2014, 2014. BibTeX
    @ARTICLE{Dabrowski2014Poster,
      Author = {Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and {Edgar R.} Weippl},
      title = {Poster NDSS 2014: Hardware Trojans--Detect and React?},
      journal = {Network and Distributed System Security (NDSS) Symposium 2014},
      year = {2014},
      month = {2},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," in 8th USENIX Workshop on Offensive Technologies (WOOT), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Ullrich2014IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
      year = {2014},
      month = {8},
      pdf = {Johanna IPv6.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Social engineering attacks on the knowledge worker," in Proceedings of the 6th International Conference on Security of Information and Networks, 2013, pp. 28-35. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2013Social,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Social engineering attacks on the knowledge worker},
      booktitle = {Proceedings of the 6th International Conference on Security of Information and Networks},
      year = {2013},
      month = {11},
      pdf = {sig-alternate.pdf},
      pages = {28--35},
      publisher = {ACM},
      }
  • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl, "Hardware Malware," Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, pp. 1-115, 2013. BibTeX
    @ARTICLE{Krieg2013Hardware,
      Author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Hardware Malware},
      journal = {Synthesis Lectures on Information Security, Privacy, and Trust},
      year = {2013},
      month = {11},
      volume = {4},
      pages = {1-115},
      }
  • Katharina Krombholz and Dieter Merkl and Edgar R. Weippl, "Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model," Journal of Service Science Research, 2012. BibTeX | PDF
    @ARTICLE{_Fake_Identities_in_Social_Medi_2012,
      Author = {Katharina Krombholz and Dieter Merkl and {Edgar R.} Weippl},
      title = {Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model},
      journal = {Journal of Service Science Research},
      year = {2012},
      month = {12},
      pdf = {krombholzetal2012.pdf},
      }

View all publications

  • Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and Edgar R. Weippl, ""I Have No Idea What I’m Doing" – On the Usability of Deploying HTTPS," in 26th USENIX Security Symposium (USENIX Security 2017), 2017. BibTeX
    @INPROCEEDINGS{Krombholz2017Have,
      Author = {Katharina Krombholz and Wilfried Mayer and Martin Schmiedecker and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS},
      booktitle = {26th USENIX Security Symposium (USENIX Security 2017)},
      year = {2017},
      month = {8},
      }
  • Katharina Krombholz and Thomas Hupperich and Thorsten Holz, "May the Force be with You: The Future of Force-Sensitive Authentication," Journal of Internet Computing, Special Issue of Usable Security and privacy, 2017. BibTeX
    @ARTICLE{Krombholz2017Force,
      Author = {Katharina Krombholz and Thomas Hupperich and Thorsten Holz},
      sbahotlist = {true},
      title = {May the Force be with You: The Future of Force-Sensitive Authentication},
      journal = {Journal of Internet Computing, Special Issue of Usable Security and privacy},
      year = {2017},
      month = {0},
      }
  • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl, "Exploring Design Directions for Wearable Privacy," in Usable Security, 2017. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2017Exploring,
      Author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
      title = {Exploring Design Directions for Wearable Privacy},
      booktitle = {Usable Security},
      year = {2017},
      month = {0},
      pdf = {https://www.internetsociety.org/sites/default/files/usec2017_03_2_Krombholz_paper.pdf},
      }
  • Katharina Krombholz and Thomas Hupperich and Thorsten Holz, "Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices," in Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016. BibTeX | PDF | Slides
    @INPROCEEDINGS{Krombholz2016Force,
      Author = {Katharina Krombholz and Thomas Hupperich and Thorsten Holz},
      sbahotlist = {true},
      title = {Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices},
      booktitle = {Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Krombholz2016Force.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/use-the-force-evaluating-forcesensitive-authentication-for-mobile-devices},
      }
  • Sven Dietrich and Michael Brenner and Katharina Krombholz, "Who are you now? Fading to multiple personas," in Who are you?! Adventures in Authentication (SOUPS Workshop), 2016. BibTeX | PDF
    @INPROCEEDINGS{Dietrich2016now,
      Author = {Sven Dietrich and Michael Brenner and Katharina Krombholz},
      title = {Who are you now? Fading to multiple personas},
      booktitle = {Who are you?! Adventures in Authentication (SOUPS Workshop)},
      year = {2016},
      month = {0},
      pdf = {https://www.sba-research.org/wp-content/uploads/publications/Dietrich2016now.pdf},
      }
  • Fuensanta Torres Garcia and Katharina Krombholz and Rudolf Mayer and Edgar R. Weippl, "Hand Dynamics for Behavioral User Authentication," in 5th International Workshop on Security of Mobile Applications (IWSMA 2016), 2016. BibTeX | PDF
    @INPROCEEDINGS{TorresGarcia2016Hand,
      Author = {Fuensanta {Torres Garcia} and Katharina Krombholz and Rudolf Mayer and {Edgar R.} Weippl},
      title = {Hand Dynamics for Behavioral User Authentication},
      booktitle = {5th International Workshop on Security of Mobile Applications (IWSMA 2016)},
      year = {2016},
      month = {9},
      pdf = {ARES_2016_paper_19 (2).pdf},
      }
  • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl, "The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy," in International Conference on Financial Cryptography and Data Security (FC), 2016. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2016Other,
      Author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy},
      booktitle = {International Conference on Financial Cryptography and Data Security (FC)},
      year = {2016},
      month = {2},
      pdf = {TheOtherSideOfTheCoin_FC16preConf.pdf},
      }
  • Thomas Hupperich and Katharina Krombholz and Thorsten Holz, "Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness," in 9th International Conference on Trust and Trustworthy Computing, 2016. BibTeX | PDF
    @INPROCEEDINGS{Hupperich2016Sensor,
      Author = {Thomas Hupperich and Katharina Krombholz and Thorsten Holz},
      title = {Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness},
      booktitle = {9th International Conference on Trust and Trustworthy Computing},
      year = {2016},
      month = {8},
      pdf = {sensorcaptchas.pdf},
      }
  • Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl, "Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin," in Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V., 2016. BibTeX
    @INPROCEEDINGS{Krombholz2016bare,
      Author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and {Edgar R.} Weippl},
      title = {Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin},
      booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V.},
      year = {2016},
      month = {4},
      }
  • Adrian Dabrowski and Katharina Krombholz and Edgar R. Weippl and Isao Echizen, "Smart Privacy Visor: Bridging the Privacy Gap," in Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015), 2015. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2015Smart,
      Author = {Adrian Dabrowski and Katharina Krombholz and {Edgar R.} Weippl and Isao Echizen},
      title = {Smart Privacy Visor: Bridging the Privacy Gap},
      booktitle = {Workshop on Privacy by Transparency in Data-Centric Services (BIS 2015)},
      year = {2015},
      month = {6},
      pdf = {http://link.springer.com/chapter/10.1007/978-3-319-26762-3_21},
      }
  • Katharina Krombholz and Christopher Frauenberger and Edgar R. Weippl, "Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology," in Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015, 2015. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2015Privacy,
      Author = {Katharina Krombholz and Christopher Frauenberger and {Edgar R.} Weippl},
      title = {Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology},
      booktitle = {Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015},
      year = {2015},
      month = {7},
      pdf = {https://www.ifs.tuwien.ac.at/node/17062},
      }
  • Katharina Krombholz and Adrian Dabrowski and Matthew Smith and Edgar R. Weippl, "Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing," in 1st Workshop on Wearable Security and Privacy, 2015. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2015Glass,
      Author = {Katharina Krombholz and Adrian Dabrowski and Matthew Smith and {Edgar R.} Weippl},
      title = {Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing},
      booktitle = {1st Workshop on Wearable Security and Privacy},
      year = {2015},
      month = {1},
      pdf = {Ok Glass.pdf},
      }
  • Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and Edgar R. Weippl, "QR Code Security – How Secure and Usable Apps Can Protect Users Against Malicious QR Codes," in 2015 International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2015Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Thomas Rieder and Ioannis Kapsalis and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes},
      booktitle = {2015 International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {http://ieeexplore.ieee.org/document/7299920/},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," Magdeburger Journal zur Sicherheitsforschung, vol. 1, 2015. BibTeX | PDF
    @ARTICLE{Ullrich2015IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      journal = {Magdeburger Journal zur Sicherheitsforschung},
      year = {2015},
      month = {3},
      pdf = {http://www.sicherheitsforschung-magdeburg.de/uploads/journal/MJS_035_Ullrich_IPv6.pdf},
      volume = {1},
      }
  • Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl, "On Reconnaissance with IPv6: A Pattern-Based Scanning Approach," in International Conference on Availability, Reliability and Security (ARES), 2015. BibTeX | PDF
    @INPROCEEDINGS{Ullrich2015Reconnaissance,
      Author = {Johanna Ullrich and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
      title = {On Reconnaissance with IPv6: A Pattern-Based Scanning Approach},
      booktitle = {International Conference on Availability, Reliability and Security (ARES)},
      year = {2015},
      month = {8},
      pdf = {PID3762727.pdf},
      }
  • Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl, "Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations," Digital Investigation, vol. 11, pp. 336-348, 2014. BibTeX | PDF
    @ARTICLE{Fruehwirt2014Towards,
      Author = {Peter Fruehwirt and Peter Kieseberg and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations},
      journal = {Digital Investigation},
      year = {2014},
      month = {0},
      pdf = {towards a forensic aware_paper.pdf},
      volume = {11},
      pages = {336-348},
      }
  • Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and Edgar R. Weippl, "Automated Analysis of Underground Marketplaces," in Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Hudic2014Automated,
      Author = {Aleksandar Hudic and Katharina Krombholz and Thomas Otterbein and Christian Platzer and {Edgar R.} Weippl},
      title = {Automated Analysis of Underground Marketplaces},
      booktitle = {Tenth Annual IFIP WG 11.9 International Conference on Digital Forensics},
      year = {2014},
      month = {1},
      pdf = {undergroundmarketplaces.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/automated-analysis-of-underground-marketplaces-42099600},
      }
  • Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and Edgar R. Weippl, "Towards a Hardware Trojan Detection Cycle," in Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Dabrowski2014Towards,
      Author = {Adrian Dabrowski and Heidelinde Hobel and Johanna Ullrich and Katharina Krombholz and {Edgar R.} Weippl},
      sbahotlist = {true},
      title = {Towards a Hardware Trojan Detection Cycle},
      booktitle = {Second International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014},
      year = {2014},
      month = {9},
      pdf = {towards a hardware trojan _paper.pdf},
      }
  • Shareeful Islam and Edgar R. Weippl and Katharina Krombholz, "A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives," in IIWAS 2014, 2014. BibTeX | PDF
    @INPROCEEDINGS{Islam2014Decision,
      Author = {Shareeful Islam and {Edgar R.} Weippl and Katharina Krombholz},
      title = {A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives},
      booktitle = {IIWAS 2014},
      year = {2014},
      month = {12},
      pdf = {09_iiwas_46.pdf},
      }
  • Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and Edgar R. Weippl, "QR – Inception: Barcode in Barcode Attacks," in 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Dabrowski2014Inception,
      Author = {Adrian Dabrowski and Katharina Krombholz and Johanna Ullrich and {Edgar R.} Weippl},
      title = {QR - Inception: Barcode in Barcode Attacks},
      booktitle = {4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)},
      year = {2014},
      month = {11},
      pdf = {qrinception.pdf},
      link_slides = {http://www.slideshare.net/SBAResearch/qrinception-barcode-in-barcode-attacks},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Advanced social engineering attacks," Journal of Information Security and Applications, 2014. BibTeX | PDF
    @ARTICLE{Krombholz2014Advanced,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Advanced social engineering attacks},
      journal = {Journal of Information Security and Applications},
      year = {2014},
      month = {0},
      pdf = {jisa_revised.pdf},
      }
  • Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and Edgar R. Weippl, "QR Code Security: A Survey of Attacks and Challenges for Usable Security." Springer, 2014, pp. 79-90. BibTeX | PDF | Slides
    @INBOOK{Krombholz2014Code,
      Author = {Katharina Krombholz and Peter Fruehwirt and Peter Kieseberg and Ioannis Kapsalis and Markus Huber and {Edgar R.} Weippl},
      title = {QR Code Security: A Survey of Attacks and Challenges for Usable Security},
      booktitle = {Human Aspects of Information Security, Privacy, and Trust},
      year = {2014},
      month = {0},
      pdf = {llncs.pdf},
      pages = {79--90},
      publisher = {Springer},
      link_slides = {http://de.slideshare.net/SBAResearch/qr-code-security-a-survey-of-attacks-and-challenges-for-usable-security},
      }
  • Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Edgar R. Weippl, "Poster NDSS 2014: Hardware Trojans–Detect and React?," Network and Distributed System Security (NDSS) Symposium 2014, 2014. BibTeX
    @ARTICLE{Dabrowski2014Poster,
      Author = {Adrian Dabrowski and Peter Fejes and Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and {Edgar R.} Weippl},
      title = {Poster NDSS 2014: Hardware Trojans--Detect and React?},
      journal = {Network and Distributed System Security (NDSS) Symposium 2014},
      year = {2014},
      month = {2},
      }
  • Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and Edgar R. Weippl, "IPv6 Security: Attacks and Countermeasures in a Nutshell," in 8th USENIX Workshop on Offensive Technologies (WOOT), 2014. BibTeX | PDF | Slides
    @INPROCEEDINGS{Ullrich2014IPv6,
      Author = {Johanna Ullrich and Katharina Krombholz and Heidelinde Hobel and Adrian Dabrowski and {Edgar R.} Weippl},
      title = {IPv6 Security: Attacks and Countermeasures in a Nutshell},
      booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT)},
      year = {2014},
      month = {8},
      pdf = {Johanna IPv6.pdf},
      link_slides = {http://de.slideshare.net/SBAResearch/ipv6-security-attacks-and-countermeasures-in-a-nutshell},
      }
  • Katharina Krombholz and Heidelinde Hobel and Markus Huber and Edgar R. Weippl, "Social engineering attacks on the knowledge worker," in Proceedings of the 6th International Conference on Security of Information and Networks, 2013, pp. 28-35. BibTeX | PDF
    @INPROCEEDINGS{Krombholz2013Social,
      Author = {Katharina Krombholz and Heidelinde Hobel and Markus Huber and {Edgar R.} Weippl},
      title = {Social engineering attacks on the knowledge worker},
      booktitle = {Proceedings of the 6th International Conference on Security of Information and Networks},
      year = {2013},
      month = {11},
      pdf = {sig-alternate.pdf},
      pages = {28--35},
      publisher = {ACM},
      }
  • Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and Edgar R. Weippl, "Hardware Malware," Synthesis Lectures on Information Security, Privacy, and Trust, vol. 4, pp. 1-115, 2013. BibTeX
    @ARTICLE{Krieg2013Hardware,
      Author = {Christian Krieg and Adrian Dabrowski and Heidelinde Hobel and Katharina Krombholz and {Edgar R.} Weippl},
      title = {Hardware Malware},
      journal = {Synthesis Lectures on Information Security, Privacy, and Trust},
      year = {2013},
      month = {11},
      volume = {4},
      pages = {1-115},
      }
  • Katharina Krombholz and Dieter Merkl and Edgar R. Weippl, "Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model," Journal of Service Science Research, 2012. BibTeX | PDF
    @ARTICLE{_Fake_Identities_in_Social_Medi_2012,
      Author = {Katharina Krombholz and Dieter Merkl and {Edgar R.} Weippl},
      title = {Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business Model},
      journal = {Journal of Service Science Research},
      year = {2012},
      month = {12},
      pdf = {krombholzetal2012.pdf},
      }

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close