default search action
Katharina Krombholz
Person information
- affiliation: CISPA Helmholtz Center for Information Security, Saarland, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2017
- [b2]Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar R. Weippl:
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01224-2 - 2013
- [b1]Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, Edgar R. Weippl:
Hardware Malware. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 9781627052511, pp. 1-115
Journal Articles
- 2023
- [j8]Matthias Fassl, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz:
Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-26 (2023) - [j7]Kathrin Grosse, Lukas Bieringer, Tarek R. Besold, Battista Biggio, Katharina Krombholz:
Machine Learning Security in Industry: A Quantitative Survey. IEEE Trans. Inf. Forensics Secur. 18: 1749-1762 (2023) - 2021
- [j6]Verena Distler, Matthias Fassl, Hana Habib, Katharina Krombholz, Gabriele Lenzini, Carine Lallemand, Lorrie Faith Cranor, Vincent Koenig:
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research. ACM Trans. Comput. Hum. Interact. 28(6): 43:1-43:50 (2021) - 2017
- [j5]Katharina Krombholz, Thomas Hupperich, Thorsten Holz:
May the Force Be with You: The Future of Force-Sensitive Authentication. IEEE Internet Comput. 21(3): 64-69 (2017) - [j4]Wilfried Mayer, Katharina Krombholz, Martin Schmiedecker, Edgar R. Weippl:
Securing the Internet, One HTTP 200 OK at a Time. login Usenix Mag. 42(4) (2017) - 2015
- [j3]Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar R. Weippl:
Advanced social engineering attacks. J. Inf. Secur. Appl. 22: 113-122 (2015) - 2014
- [j2]Peter Frühwirt, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl:
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digit. Investig. 11(4): 336-348 (2014) - 2012
- [j1]Katharina Krombholz, Dieter Merkl, Edgar R. Weippl:
Fake identities in social media: A case study on the sustainability of the Facebook business model. J. Serv. Sci. Res. 4(2): 175-212 (2012)
Conference and Workshop Papers
- 2024
- [c54]H. T. M. A. Riyadh, Divyanshu Bhardwaj, Adrian Dabrowski, Katharina Krombholz:
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures. ACNS (3) 2024: 412-431 - [c53]Divyanshu Bhardwaj, Alexander Ponticello, Shreya Tomar, Adrian Dabrowski, Katharina Krombholz:
In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera Glasses. CHI 2024: 577:1-577:18 - [c52]Divyanshu Bhardwaj, Carolyn Guthoff, Adrian Dabrowski, Sascha Fahl, Katharina Krombholz:
Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with Experts. CHI 2024: 833:1-833:24 - [c51]Lea Gröber, Waleed Arshad, Shanza, Angelica Goetzen, Elissa M. Redmiles, Maryam Mustafa, Katharina Krombholz:
"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators. USENIX Security Symposium 2024 - [c50]Lea Gröber, Simon Lenau, Rebecca Weil, Elena Groben, Michael Schilling, Katharina Krombholz:
Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics. USENIX Security Symposium 2024 - [c49]Sebastian Roth, Lea Gröber, Philipp Baus, Katharina Krombholz, Ben Stock:
Trust Me If You Can - How Usable Is Trusted Types In Practice? USENIX Security Symposium 2024 - 2023
- [c48]Maryam Mustafa, Abdul Moeed Asad, Shehrbano Hassan, Urooj Haider, Zainab Durrani, Katharina Krombholz:
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space. CCS 2023: 195-209 - [c47]Matthias Fassl, Katharina Krombholz:
Why I Can't Authenticate - Understanding the Low Adoption of Authentication Ceremonies with Autoethnography. CHI 2023: 72:1-72:15 - [c46]Rakibul Hasan, Rebecca Weil, Rudolf Siegel, Katharina Krombholz:
A Psychometric Scale to Measure Individuals' Value of Other People's Privacy (VOPP). CHI 2023: 581:1-581:14 - [c45]Anna-Marie Ortloff, Matthias Fassl, Alexander Ponticello, Florin Martius, Anne Mertens, Katharina Krombholz, Matthew Smith:
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice. CHI 2023: 864:1-864:21 - [c44]Carolyn Guthoff, Simon Anell, Johann Hainzinger, Adrian Dabrowski, Katharina Krombholz:
Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals. SP 2023: 588-605 - [c43]Lea Gröber, Rafael Mrowczynski, Nimisha Vijay, Daphne A. Muller, Adrian Dabrowski, Katharina Krombholz:
To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation, Operation, and Security Mindset. USENIX Security Symposium 2023: 2491-2508 - [c42]Dañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz:
Investigating Verification Behavior and Perceptions of Visual Digital Certificates. USENIX Security Symposium 2023: 3565-3582 - 2022
- [c41]Alexandra Mai, Leonard Guelmino, Katharina Pfeffer, Edgar R. Weippl, Katharina Krombholz:
Mental Models of the Internet and Its Online Risks: Children and Their Parent(s). HCI (32) 2022: 42-61 - [c40]Alexandra Mai, Oliver Schedler, Edgar R. Weippl, Katharina Krombholz:
Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS Configurations. HCI (32) 2022: 173-193 - [c39]Katharina Pfeffer, Alexandra Mai, Edgar R. Weippl, Emilee Rader, Katharina Krombholz:
Replication: Stories as Informal Lessons about Security. SOUPS @ USENIX Security Symposium 2022: 1-18 - [c38]Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz:
Industrial practitioners' mental models of adversarial machine learning. SOUPS @ USENIX Security Symposium 2022: 97-116 - [c37]Matthias Fassl, Simon Anell, Sabine Houy, Martina Lindorfer, Katharina Krombholz:
Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality. SOUPS @ USENIX Security Symposium 2022: 135-154 - [c36]Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets:
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context. USENIX Security Symposium 2022: 3433-3450 - 2021
- [c35]Sebastian Roth, Lea Gröber, Michael Backes, Katharina Krombholz, Ben Stock:
12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP. CCS 2021: 3085-3103 - [c34]Matthias Fassl, Lea Theresa Gröber, Katharina Krombholz:
Stop the Consent Theater. CHI Extended Abstracts 2021: 35:1-35:7 - [c33]Matthias Fassl, Lea Theresa Gröber, Katharina Krombholz:
Exploring User-Centered Security Design for Usable Authentication Ceremonies. CHI 2021: 694:1-694:15 - [c32]Lea Theresa Gröber, Matthias Fassl, Abhilash Gupta, Katharina Krombholz:
Investigating Car Drivers' Information Demand after Safety and Security Critical Incidents. CHI 2021: 696:1-696:17 - [c31]Matthias Fassl, Michaela Neumayr, Oliver Schedler, Katharina Krombholz:
Transferring Update Behavior from Smartphones to Smart Consumer Devices. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 357-383 - [c30]Alexander Ponticello, Matthias Fassl, Katharina Krombholz:
Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants. SOUPS @ USENIX Security Symposium 2021: 475-492 - [c29]Katharina Pfeffer, Alexandra Mai, Adrian Dabrowski, Matthias Gusenbauer, Philipp Schindler, Edgar R. Weippl, Michael Franz, Katharina Krombholz:
On the Usability of Authenticity Checks for Hardware Security Tokens. USENIX Security Symposium 2021: 37-54 - 2020
- [c28]Sahar Abdelnabi, Katharina Krombholz, Mario Fritz:
VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity. CCS 2020: 1681-1698 - [c27]Hosnieh Sattar, Katharina Krombholz, Gerard Pons-Moll, Mario Fritz:
Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction. ECCV Workshops (5) 2020: 411-428 - [c26]Karoline Busse, Mohammad Tahaei, Katharina Krombholz, Emanuel von Zezschwitz, Matthew Smith, Jing Tian, Wenyuan Xu:
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries. EuroS&P Workshops 2020: 200-209 - [c25]Simon Anell, Lea Gröber, Katharina Krombholz:
End User and Expert Perceptions of Threats and Potential Countermeasures. EuroS&P Workshops 2020: 230-239 - [c24]Christian Tiefenau, Maximilian Häring, Katharina Krombholz, Emanuel von Zezschwitz:
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators. SOUPS @ USENIX Security Symposium 2020: 239-258 - [c23]Alexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar R. Weippl, Katharina Krombholz:
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. SOUPS @ USENIX Security Symposium 2020: 341-358 - 2019
- [c22]Christian Tiefenau, Emanuel von Zezschwitz, Maximilian Häring, Katharina Krombholz, Matthew Smith:
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right. CCS 2019: 1971-1988 - [c21]Aftab Alam, Katharina Krombholz, Sven Bugiel:
Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On. CCS 2019: 2669-2671 - [c20]Katharina Krombholz, Karoline Busse, Katharina Pfeffer, Matthew Smith, Emanuel von Zezschwitz:
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS. IEEE Symposium on Security and Privacy 2019: 246-263 - 2018
- [c19]Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig:
Investigating System Operators' Perspective on Security Misconfigurations. CCS 2018: 1272-1289 - 2017
- [c18]Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, Edgar R. Weippl:
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS. USENIX Security Symposium 2017: 1339-1356 - 2016
- [c17]Fuensanta Torres Garcia, Katharina Krombholz, Rudolf Mayer, Edgar R. Weippl:
Hand Dynamics for Behavioral User Authentication. ARES 2016: 389-398 - [c16]Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy. Financial Cryptography 2016: 555-580 - [c15]Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin. Sicherheit 2016: 137-148 - [c14]Sven Dietrich, Michael Brenner, Katharina Krombholz:
Who Are You Now? Fading to Multiple Personas. WAY@SOUPS 2016 - [c13]Katharina Krombholz, Thomas Hupperich, Thorsten Holz:
Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices. SOUPS 2016: 207-219 - [c12]Thomas Hupperich, Katharina Krombholz, Thorsten Holz:
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness. TRUST 2016: 40-59 - 2015
- [c11]Johanna Ullrich, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl:
On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. ARES 2015: 186-192 - [c10]Katharina Krombholz, Peter Frühwirt, Thomas Rieder, Ioannis Kapsalis, Johanna Ullrich, Edgar R. Weippl:
QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. ARES 2015: 230-237 - [c9]Adrian Dabrowski, Katharina Krombholz, Edgar R. Weippl, Isao Echizen:
Smart Privacy Visor: Bridging the Privacy Gap. BIS (Workshops) 2015: 235-247 - [c8]Katharina Krombholz, Adrian Dabrowski, Matthew Smith, Edgar R. Weippl:
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. Financial Cryptography Workshops 2015: 274-280 - 2014
- [c7]Adrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar R. Weippl:
Towards a Hardware Trojan Detection Cycle. ARES 2014: 287-294 - [c6]Adrian Dabrowski, Katharina Krombholz, Johanna Ullrich, Edgar R. Weippl:
QR Inception: Barcode-in-Barcode Attacks. SPSM@CCS 2014: 3-10 - [c5]Katharina Krombholz, Peter Frühwirt, Peter Kieseberg, Ioannis Kapsalis, Markus Huber, Edgar R. Weippl:
QR Code Security: A Survey of Attacks and Challenges for Usable Security. HCI (24) 2014: 79-90 - [c4]Aleksandar Hudic, Katharina Krombholz, Thomas Otterbein, Christian Platzer, Edgar R. Weippl:
Automated Analysis of Underground Marketplaces. IFIP Int. Conf. Digital Forensics 2014: 31-42 - [c3]Shareeful Islam, Edgar R. Weippl, Katharina Krombholz:
A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives. iiWAS 2014: 185-189 - [c2]Johanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski, Edgar R. Weippl:
IPv6 Security: Attacks and Countermeasures in a Nutshell. WOOT 2014 - 2013
- [c1]Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar R. Weippl:
Social engineering attacks on the knowledge worker. SIN 2013: 28-35
Informal and Other Publications
- 2022
- [i5]Kathrin Grosse, Lukas Bieringer, Tarek Richard Besold, Battista Biggio, Katharina Krombholz:
"Why do so?" - A Practical Perspective on Machine Learning Security. CoRR abs/2207.05164 (2022) - 2021
- [i4]Lukas Bieringer, Kathrin Grosse, Michael Backes, Katharina Krombholz:
Mental Models of Adversarial Machine Learning. CoRR abs/2105.03726 (2021) - 2020
- [i3]Christian Tiefenau, Maximilian Häring, Katharina Krombholz, Emanuel von Zezschwitz:
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators. CoRR abs/2007.08875 (2020) - 2019
- [i2]Hosnieh Sattar, Katharina Krombholz, Gerard Pons-Moll, Mario Fritz:
Shape Evasion: Preventing Body Shape Inference of Multi-Stage Approaches. CoRR abs/1905.11503 (2019) - [i1]Sahar Abdelnabi, Katharina Krombholz, Mario Fritz:
WhiteNet: Phishing Website Detection by Visual Whitelists. CoRR abs/1909.00300 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint