Obserwuj
Adrian Dabrowski
Tytuł
Cytowane przez
Cytowane przez
Rok
IMSI-catch me if you can: IMSI-catcher-catchers
A Dabrowski, N Pianta, T Klepp, M Mulazzani, E Weippl
Proceedings of the 30th annual computer security applications Conference …, 2014
1372014
On security research towards future mobile network generations
D Rupprecht, A Dabrowski, T Holz, E Weippl, C Pöpper
IEEE Communications Surveys & Tutorials 20 (3), 2518-2542, 2018
872018
Grid shock: Coordinated load-changing attacks on power grids: The non-smart power grid is vulnerable to cyber attacks as well
A Dabrowski, J Ullrich, ER Weippl
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
632017
Measuring cookies and web privacy in a post-gdpr world
A Dabrowski, G Merzdovnik, J Ullrich, G Sendera, E Weippl
International Conference on Passive and Active Network Measurement, 258-270, 2019
532019
{IPv6} Security: Attacks and Countermeasures in a Nutshell
J Ullrich, K Krombholz, H Hobel, A Dabrowski, E Weippl
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
472014
QR inception: Barcode-in-barcode attacks
A Dabrowski, K Krombholz, J Ullrich, ER Weippl
Proceedings of the 4th ACM workshop on security and privacy in smartphones …, 2014
452014
The messenger shoots back: Network operator based IMSI catcher detection
A Dabrowski, G Petzl, ER Weippl
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
382016
Leveraging competitive gamification for sustainable fun and profit in security education
A Dabrowski, M Kammerstetter, E Thamm, E Weippl, W Kastner
2015 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2015
312015
Hardware malware
C Krieg, A Dabrowski, H Hobel, K Krombholz, E Weippl
Synthesis Lectures on Information Security, Privacy, & Trust 4 (2), 1-115, 2013
25*2013
Framework based on privacy policy hiding for preventing unauthorized face image processing
A Dabrowski, ER Weippl, I Echizen
2013 IEEE International Conference on Systems, Man, and Cybernetics, 455-461, 2013
242013
Browser history stealing with captive Wi-Fi portals
A Dabrowski, G Merzdovnik, N Kommenda, E Weippl
2016 IEEE Security and Privacy Workshops (SPW), 234-240, 2016
202016
Towards a hardware Trojan detection cycle
A Dabrowski, H Hobel, J Ullrich, K Krombholz, E Weippl
2014 Ninth international conference on availability, Reliability and …, 2014
172014
BinRec: dynamic binary lifting and recompilation
A Altinay, J Nash, T Kroes, P Rajasekaran, D Zhou, A Dabrowski, D Gens, ...
Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020
152020
Exploring design directions for wearable privacy
K Krombholz, A Dabrowski, M Smith, E Weippl
152017
Ok glass, leave me alone: towards a systematization of privacy enhancing technologies for wearable computing
K Krombholz, A Dabrowski, M Smith, E Weippl
International Conference on Financial Cryptography and Data Security, 274-280, 2015
152015
A digital interface for imagery and control of a Navico/Lowrance broadband radar
A Dabrowski, S Busch, R Stelzer
Robotic Sailing, 169-181, 2011
112011
Poster: Hardware trojans-detect and react?
A Dabrowski, P Fejes, J Ullrich, K Krombholz, H Hobel, E Weippl
Network and distributed system security (NDSS) symposium, 2014
92014
Proof-of-blackouts? how proof-of-work cryptocurrencies could affect power grids
J Ullrich, N Stifter, A Judmayer, A Dabrowski, E Weippl
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
82018
On the usability of authenticity checks for hardware security tokens
K Pfeffer, A Mai, A Dabrowski, M Gusenbauer, P Schindler, E Weippl, ...
30th USENIX Security Symposium (USENIX Security 21), 37-54, 2021
72021
Historical Overview
C Krieg, A Dabrowski, H Hobel, K Krombholz, E Weippl
Hardware Malware, 65-81, 2013
72013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20