Katharina Krombholz

Orcid: 0000-0003-2425-3013

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarland, Germany


According to our database1, Katharina Krombholz authored at least 69 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Trust Me If You Can - How Usable Is Trusted Types In Practice?
Proceedings of the 33rd USENIX Security Symposium, 2024

Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics.
Proceedings of the 33rd USENIX Security Symposium, 2024

"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators.
Proceedings of the 33rd USENIX Security Symposium, 2024

Let me quickly share it - Time Pressure when Sharing on Social Media.
Proceedings of the International Conference on Mobile and Ubiquitous Multimedia, 2024

In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera Glasses.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with Experts.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Machine Learning Security in Industry: A Quantitative Survey.
IEEE Trans. Inf. Forensics Secur., 2023

Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon.
Proc. ACM Hum. Comput. Interact., 2023

To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation, Operation, and Security Mindset.
Proceedings of the 32nd USENIX Security Symposium, 2023

Investigating Verification Behavior and Perceptions of Visual Digital Certificates.
Proceedings of the 32nd USENIX Security Symposium, 2023

Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

A Psychometric Scale to Measure Individuals' Value of Other People's Privacy (VOPP).
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Why I Can't Authenticate - Understanding the Low Adoption of Authentication Ceremonies with Autoethnography.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
"Why do so?" - A Practical Perspective on Machine Learning Security.
CoRR, 2022

Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
Proceedings of the 31st USENIX Security Symposium, 2022

Replication: Stories as Informal Lessons about Security.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Industrial practitioners' mental models of adversarial machine learning.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS Configurations.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

Mental Models of the Internet and Its Online Risks: Children and Their Parent(s).
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

2021
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research.
ACM Trans. Comput. Hum. Interact., 2021

Mental Models of Adversarial Machine Learning.
CoRR, 2021

On the Usability of Authenticity Checks for Hardware Security Tokens.
Proceedings of the 30th USENIX Security Symposium, 2021

Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Transferring Update Behavior from Smartphones to Smart Consumer Devices.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

Investigating Car Drivers' Information Demand after Safety and Security Critical Incidents.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Stop the Consent Theater.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Exploring User-Centered Security Design for Usable Authentication Ceremonies.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

End User and Expert Perceptions of Threats and Potential Countermeasures.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction.
Proceedings of the Computer Vision - ECCV 2020 Workshops, 2020

VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
WhiteNet: Phishing Website Detection by Visual Whitelists.
CoRR, 2019

Shape Evasion: Preventing Body Shape Inference of Multi-Stage Approaches.
CoRR, 2019

"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Investigating System Operators' Perspective on Security Misconfigurations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02352-1, 2017

Securing the Internet, One HTTP 200 OK at a Time.
login Usenix Mag., 2017

May the Force Be with You: The Future of Force-Sensitive Authentication.
IEEE Internet Comput., 2017

"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016

Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Who Are You Now? Fading to Multiple Personas.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy.
Proceedings of the Financial Cryptography and Data Security, 2016

Hand Dynamics for Behavioral User Authentication.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Advanced social engineering attacks.
J. Inf. Secur. Appl., 2015

Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing.
Proceedings of the Financial Cryptography and Data Security, 2015

Smart Privacy Visor: Bridging the Privacy Gap.
Proceedings of the Business Information Systems Workshops, 2015

On Reconnaissance with IPv6: A Pattern-Based Scanning Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations.
Digit. Investig., 2014

IPv6 Security: Attacks and Countermeasures in a Nutshell.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

Automated Analysis of Underground Marketplaces.
Proceedings of the Advances in Digital Forensics X, 2014

QR Code Security: A Survey of Attacks and Challenges for Usable Security.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

QR Inception: Barcode-in-Barcode Attacks.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

Towards a Hardware Trojan Detection Cycle.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Hardware Malware
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02338-5, 2013

Social engineering attacks on the knowledge worker.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2012
Fake identities in social media: A case study on the sustainability of the Facebook business model.
J. Serv. Sci. Res., 2012


  Loading...