IMSI-catch me if you can: IMSI-catcher-catchers A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl Proceedings of the 30th annual computer security applications Conference …, 2014 | 165 | 2014 |
On security research towards future mobile network generations D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper IEEE Communications Surveys & Tutorials 20 (3), 2518-2542, 2018 | 121 | 2018 |
Grid shock: Coordinated load-changing attacks on power grids: The non-smart power grid is vulnerable to cyber attacks as well A Dabrowski, J Ullrich, ER Weippl Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 107 | 2017 |
Measuring cookies and web privacy in a post-gdpr world A Dabrowski, G Merzdovnik, J Ullrich, G Sendera, E Weippl Passive and Active Measurement: 20th International Conference, PAM 2019 …, 2019 | 100 | 2019 |
The messenger shoots back: Network operator based IMSI catcher detection A Dabrowski, G Petzl, ER Weippl Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 54 | 2016 |
QR inception: Barcode-in-barcode attacks A Dabrowski, K Krombholz, J Ullrich, ER Weippl Proceedings of the 4th ACM workshop on security and privacy in smartphones …, 2014 | 53 | 2014 |
BinRec: dynamic binary lifting and recompilation A Altinay, J Nash, T Kroes, P Rajasekaran, D Zhou, A Dabrowski, D Gens, ... Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020 | 52 | 2020 |
{IPv6} security: Attacks and countermeasures in a nutshell J Ullrich, K Krombholz, H Hobel, A Dabrowski, E Weippl 8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014 | 52 | 2014 |
PKRU-Safe: Automatically locking down the heap between safe and unsafe languages P Kirth, M Dickerson, S Crane, P Larsen, A Dabrowski, D Gens, Y Na, ... Proceedings of the Seventeenth European Conference on Computer Systems, 132-148, 2022 | 47 | 2022 |
Leveraging competitive gamification for sustainable fun and profit in security education A Dabrowski, M Kammerstetter, E Thamm, E Weippl, W Kastner 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015 | 38 | 2015 |
Framework based on privacy policy hiding for preventing unauthorized face image processing A Dabrowski, ER Weippl, I Echizen 2013 IEEE International Conference on Systems, Man, and Cybernetics, 455-461, 2013 | 27 | 2013 |
Hardware malware C Krieg, A Dabrowski, H Hobel, K Krombholz, ER Weippl Morgan & Claypool, 2013 | 27* | 2013 |
Browser history stealing with captive Wi-Fi portals A Dabrowski, G Merzdovnik, N Kommenda, E Weippl 2016 IEEE Security and Privacy Workshops (SPW), 234-240, 2016 | 23 | 2016 |
Ok glass, leave me alone: towards a systematization of privacy enhancing technologies for wearable computing K Krombholz, A Dabrowski, M Smith, E Weippl Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015 | 21 | 2015 |
Towards a hardware Trojan detection cycle A Dabrowski, H Hobel, J Ullrich, K Krombholz, E Weippl 2014 Ninth international conference on availability, Reliability and …, 2014 | 20 | 2014 |
Exploring design directions for wearable privacy K Krombholz, A Dabrowski, M Smith, E Weippl | 19 | 2017 |
On the usability of authenticity checks for hardware security tokens K Pfeffer, A Mai, A Dabrowski, M Gusenbauer, P Schindler, E Weippl, ... 30th USENIX Security Symposium (USENIX Security 21), 37-54, 2021 | 15 | 2021 |
A digital interface for imagery and control of a Navico/Lowrance broadband radar A Dabrowski, S Busch, R Stelzer Robotic Sailing: Proceedings of the 4th International Robotic Sailing …, 2011 | 15 | 2011 |
Proof-of-blackouts? how proof-of-work cryptocurrencies could affect power grids J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 13 | 2018 |
Tag detection for preventing unauthorized face image processing A Escalada Jiménez, A Dabrowski, N Sonehara, JM Montero Martínez, ... Telecomunicacion, 2014 | 9* | 2014 |