Adrian Dabrowski

Orcid: 0000-0002-0340-6204

According to our database1, Adrian Dabrowski authored at least 28 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon.
Proc. ACM Hum. Comput. Interact., 2023

To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation, Operation, and Security Mindset.
Proceedings of the 32nd USENIX Security Symposium, 2023

Investigating Verification Behavior and Perceptions of Visual Digital Certificates.
Proceedings of the 32nd USENIX Security Symposium, 2023

MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research.
Proceedings of the 32nd USENIX Security Symposium, 2023

Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
PKRU-safe: automatically locking down the heap between safe and unsafe languages.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

2021
On the Usability of Authenticity Checks for Hardware Security Tokens.
Proceedings of the 30th USENIX Security Symposium, 2021

Better Keep Cash in Your Boots - Hardware Wallets are the New Single Point of Failure.
Proceedings of the DeFi '21: Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security, 2021

2020
BinRec: dynamic binary lifting and recompilation.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

2019
Measuring Cookies and Web Privacy in a Post-GDPR World.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

2018
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid.
Elektrotech. Informationstechnik, 2018

On Security Research Towards Future Mobile Network Generations.
IEEE Commun. Surv. Tutorials, 2018

Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2017
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks.
Proceedings of the Digital Nations - Smart Cities, Innovation, and Sustainability, 2017

Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Browser History Stealing with Captive Wi-Fi Portals.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

2015
Error-Correcting Codes as Source for Decoding Ambiguity.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing.
Proceedings of the Financial Cryptography and Data Security, 2015

Smart Privacy Visor: Bridging the Privacy Gap.
Proceedings of the Business Information Systems Workshops, 2015

2014
IPv6 Security: Attacks and Countermeasures in a Nutshell.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

Tag Detection for Preventing Unauthorized Face Image Processing.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

QR Inception: Barcode-in-Barcode Attacks.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

IMSI-catch me if you can: IMSI-catcher-catchers.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Towards a Hardware Trojan Detection Cycle.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Hardware Malware
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02338-5, 2013

Framework Based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing.
Proceedings of the IEEE International Conference on Systems, 2013


  Loading...