default search action
Yasemin Acar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, Mindy Tran, Yasemin Acar, Veelasha Moonsamy, Alena Naiakshina:
"Those things are written by lawyers, and programmers are reading that." Mapping the Communication Gap Between Software Developers and Privacy Experts. Proc. Priv. Enhancing Technol. 2024(1): 151-170 (2024) - [j7]Eric Bodden, Yasemin Acar, Michael Felderer, Wilhelm Hasselbring, Paula Herber, Bernhard Rumpe:
Ernst Denert Preis 2023. Softwaretechnik-Trends 44(2): 55 (2024) - [c66]Juliane Schmüser, Harshini Sri Ramulu, Noah Wöhler, Christian Stransky, Felix Bensmann, Dimitar Dimitrov, Sebastian Schellhammer, Dominik Wermke, Stefan Dietze, Yasemin Acar, Sascha Fahl:
Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter. CHI 2024: 574:1-574:16 - [c65]Lina Boughton, Courtney Miller, Yasemin Acar, Dominik Wermke, Christian Kästner:
Decomposing and Measuring Trust in Open-Source Software Supply Chains. NIER@ICSE 2024: 57-61 - [c64]Dominik Wermke, Jan H. Klemmer, Noah Wöhler, Juliane Schmüser, Harshini Sri Ramulu, Yasemin Acar, Sascha Fahl:
Always Contribute Back: A Qualitative Study on Security Challenges of the Open Source Supply Chain. Software Engineering 2024: 139-140 - [c63]Dominik Wermke, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, Sascha Fahl:
Committed to Trust: A Qualitative Study on Security and Trust in Open Source Software Projects. Software Engineering 2024: 141-142 - [c62]Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar:
They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks. Software Engineering 2024: 143-144 - [c61]Mindy Tran, Collins W. Munyendo, Harshini Sri Ramulu, Rachel Gonzalez Rodriguez, Luisa Ball Schnell, Cora Sula, Lucy Simko, Yasemin Acar:
Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. SP 2024: 617-634 - [c60]Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse:
Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups. SP 2024: 697-716 - [c59]Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, M. Angela Sasse:
The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts. USENIX Security Symposium 2024 - [c58]Marcel Fourné, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar:
"These results must be false": A usability evaluation of constant-time analysis tools. USENIX Security Symposium 2024 - [c57]Sandra Höltervennhoff, Noah Wöhler, Arne Möhle, Marten Oltrogge, Yasemin Acar, Oliver Wiese, Sascha Fahl:
A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service. USENIX Security Symposium 2024 - [c56]Nicolas Huaman, Jacques Suray, Jan H. Klemmer, Marcel Fourné, Sabrina Amft, Ivana Trummová, Yasemin Acar, Sascha Fahl:
"You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic Standards. USENIX Security Symposium 2024 - [c55]Anastassija Kostan, Sara Olschar, Lucy Simko, Yasemin Acar:
Exploring digital security and privacy in relative poverty in Germany through qualitative interviews. USENIX Security Symposium 2024 - [c54]Kabir Panahi, Shawn Robertson, Yasemin Acar, Alexandru G. Bardas, Tadayoshi Kohno, Lucy Simko:
"But they have overlooked a few things in Afghanistan: " An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections. USENIX Security Symposium 2024 - [c53]Harshini Sri Ramulu, Helen Schmitt, Dominik Wermke, Yasemin Acar:
Security and Privacy Software Creators' Perspectives on Unintended Consequences. USENIX Security Symposium 2024 - [i18]Greg Tystahl, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, Laurie A. Williams:
S3C2 Summit 2024-03: Industry Secure Supply Chain Summit. CoRR abs/2405.08762 (2024) - [i17]Nusrat Zahan, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, Laurie A. Williams:
S3C2 Summit 2023-11: Industry Secure Supply Chain Summit. CoRR abs/2408.16529 (2024) - [i16]Mahzabin Tamanna, Sivana Hamer, Mindy Tran, Sascha Fahl, Yasemin Acar, Laurie A. Williams:
Unraveling Challenges with Supply-Chain Levels for Software Artifacts (SLSA) for Securing the Software Supply Chain. CoRR abs/2409.05014 (2024) - 2023
- [j6]Marcel Fourné, Dominik Wermke, Sascha Fahl, Yasemin Acar:
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. IEEE Secur. Priv. 21(6): 59-63 (2023) - [j5]Elijah Robert Bouma-Sims, Yasemin Acar:
Beyond the Boolean: How Programmers Ask About, Use, and Discuss Gender. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-31 (2023) - [j4]Mannat Kaur, Harshini Sri Ramulu, Yasemin Acar, Tobias Fiebig:
"Oh yes! over-preparing for meetings is my jam :)": The Gendered Experiences of System Administrators. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-38 (2023) - [j3]Lucy Simko, Harshini Sri Ramulu, Tadayoshi Kohno, Yasemin Acar:
The Use and Non-Use of Technology During Hurricanes. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-54 (2023) - [c52]Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. CCS 2023: 2740-2754 - [c51]Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl:
"We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. CCS 2023: 3138-3152 - [c50]Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CHI 2023: 582:1-582:23 - [c49]Jens Pottebaum, Jost Rossel, Juraj Somorovsky, Yasemin Acar, René Fahr, Patricia Arias Cabarcos, Eric Bodden, Iris Gräßler:
Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth. EuroS&P Workshops 2023: 379-385 - [c48]Stefan Krüger, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, Sascha Fahl:
Securing Your Crypto-API Usage Through Tool Support - A Usability Study. SecDev 2023: 14-25 - [c47]Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, Sascha Fahl:
"Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup. SOUPS 2023: 171-190 - [c46]Lorenzo Neil, Harshini Sri Ramulu, Yasemin Acar, Bradley Reaves:
Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. SOUPS 2023: 283-299 - [c45]Collins W. Munyendo, Yasemin Acar, Adam J. Aviv:
"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya. SP 2023: 570-587 - [c44]Marcel Fourné, Dominik Wermke, William Enck, Sascha Fahl, Yasemin Acar:
It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. SP 2023: 1527-1544 - [c43]Dominik Wermke, Jan H. Klemmer, Noah Wöhler, Juliane Schmüser, Harshini Sri Ramulu, Yasemin Acar, Sascha Fahl:
"Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain. SP 2023: 1545-1560 - [c42]Dilara Keküllüoglu, Yasemin Acar:
"We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups. SP 2023: 2015-2031 - [c41]Sandra Höltervennhoff, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, Sascha Fahl:
"I wouldn't want my unsafe code to run my pacemaker": An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. USENIX Security Symposium 2023: 2509-2525 - [c40]Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl:
Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories. USENIX Security Symposium 2023: 2527-2544 - [c39]Jaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar:
"Security is not my field, I'm a stats guy": A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. USENIX Security Symposium 2023: 3763-3780 - [c38]Tadayoshi Kohno, Yasemin Acar, Wulf Loh:
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. USENIX Security Symposium 2023: 5145-5162 - [i15]Elijah Robert Bouma-Sims, Yasemin Acar:
Beyond the Boolean: How Programmers Ask About, Use, and Discuss Gender. CoRR abs/2302.05351 (2023) - [i14]Tadayoshi Kohno, Yasemin Acar, Wulf Loh:
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. CoRR abs/2302.14326 (2023) - [i13]Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl:
Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. CoRR abs/2306.09708 (2023) - [i12]Mindy Tran, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. CoRR abs/2307.15642 (2023) - [i11]Trevor Dunlap, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. CoRR abs/2307.16557 (2023) - [i10]William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2023-06: Government Secure Supply Chain Summit. CoRR abs/2308.06850 (2023) - [i9]Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. CoRR abs/2309.00744 (2023) - 2022
- [j2]Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl:
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web. IEEE Secur. Priv. 20(2): 49-60 (2022) - [c37]Nicolas Huaman, Alexander Krause, Dominik Wermke, Jan H. Klemmer, Christian Stransky, Yasemin Acar, Sascha Fahl:
If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. SOUPS @ USENIX Security Symposium 2022: 313-330 - [c36]Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar:
"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks. SP 2022: 632-649 - [c35]Christian Stransky, Oliver Wiese, Volker Roth, Yasemin Acar, Sascha Fahl:
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University. SP 2022: 860-875 - [c34]Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study. SP 2022: 893-910 - [c33]Dominik Wermke, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, Sascha Fahl:
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. SP 2022: 1880-1896 - [c32]Collins W. Munyendo, Yasemin Acar, Adam J. Aviv:
"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya. SP 2022: 2304-2319 - [c31]Harjot Kaur, Sabrina Amft, Daniel Votipka, Yasemin Acar, Sascha Fahl:
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples. USENIX Security Symposium 2022: 4041-4058 - [i8]Juliane Schmüser, Noah Wöhler, Harshini Sri Ramulu, Christian Stransky, Dominik Wermke, Sascha Fahl, Yasemin Acar:
"Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine. CoRR abs/2208.11581 (2022) - [i7]Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl:
Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories. CoRR abs/2211.06213 (2022) - [i6]Dilara Keküllüoglu, Yasemin Acar:
"We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups. CoRR abs/2212.08396 (2022) - [i5]Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth:
A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. CoRR abs/2212.10382 (2022) - [i4]Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Leonie Schaewitz, Jennifer Friedauer, Yasemin Acar, Markus Dürmuth, M. Angela Sasse:
Talking to the Overlooked: A Nationwide Telephone Survey with Four Groups Under-represented in Privacy and Security Studies. CoRR abs/2212.12964 (2022) - 2021
- [b1]Yasemin Acar:
Human Factors in Secure Software Development. University of Marburg, Germany, 2021 - [c30]Maximilian Häring, Eva Gerlitz, Christian Tiefenau, Matthew Smith, Dominik Wermke, Sascha Fahl, Yasemin Acar:
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany. SOUPS @ USENIX Security Symposium 2021: 77-98 - [c29]Lorenzo Neil, Elijah Robert Bouma-Sims, Evan Lafontaine, Yasemin Acar, Bradley Reaves:
Investigating Web Service Account Remediation Advice. SOUPS @ USENIX Security Symposium 2021: 359-376 - [c28]Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, Sascha Fahl:
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. SOUPS @ USENIX Security Symposium 2021: 437-454 - [c27]Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl:
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites. SP 2021: 1367-1381 - [c26]Julie M. Haney, Yasemin Acar, Susanne Furman:
"It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and Security. USENIX Security Symposium 2021: 411-428 - [c25]Nicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, Sascha Fahl:
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. USENIX Security Symposium 2021: 1235-1252 - [c24]Marten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, Sascha Fahl:
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. USENIX Security Symposium 2021: 4347-4364 - [i3]Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar:
âTheyâre not that hard to mitigateâ: What Cryptographic Library Developers Think About Timing Attacks. IACR Cryptol. ePrint Arch. 2021: 1650 (2021) - 2020
- [c23]Peter Leo Gorski, Yasemin Acar, Luigi Lo Iacono, Sascha Fahl:
Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs. CHI 2020: 1-13 - [c22]Julie M. Haney, Susanne M. Furman, Yasemin Acar:
Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. HCI (30) 2020: 393-411 - [c21]Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, Sascha Fahl:
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites. SOUPS @ USENIX Security Symposium 2020: 359-377
2010 – 2019
- 2018
- [c20]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. ACSAC 2018: 222-235 - [c19]Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl:
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. SOUPS @ USENIX Security Symposium 2018: 265-281 - [c18]Julie M. Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman:
"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products. SOUPS @ USENIX Security Symposium 2018: 357-373 - [c17]Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes:
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. IEEE Symposium on Security and Privacy 2018: 634-647 - [c16]Yuxi Wu, Panya Gupta, Miranda Wei, Yasemin Acar, Sascha Fahl, Blase Ur:
Your Secrets Are Safe: How Browsers' Explanations Impact Misconceptions About Private Browsing Mode. WWW 2018: 217-226 - [i2]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. CoRR abs/1801.02742 (2018) - 2017
- [j1]Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
How Internet Resources Might Be Helping You Develop Faster but Less Securely. IEEE Secur. Priv. 15(2): 50-60 (2017) - [c15]Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl:
A Stitch in Time: Supporting Android Developers in WritingSecure Code. CCS 2017: 1065-1077 - [c14]Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes:
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. CCS 2017: 2187-2200 - [c13]Yasemin Acar, Christian Stransky, Dominik Wermke, Charles Weir, Michelle L. Mazurek, Sascha Fahl:
Developers Need Support, Too: A Survey of Security Advice for Software Developers. SecDev 2017: 22-26 - [c12]Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl:
Security Developer Studies with GitHub Users: Exploring a Convenience Sample. SOUPS 2017: 81-95 - [c11]Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl:
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. IEEE Symposium on Security and Privacy 2017: 121-136 - [c10]Yasemin Acar, Michael Backes, Sascha Fahl, Simson L. Garfinkel, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
Comparing the Usability of Cryptographic APIs. IEEE Symposium on Security and Privacy 2017: 154-171 - [c9]Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, Sascha Fahl:
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. CSET @ USENIX Security Symposium 2017 - [i1]Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl:
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. CoRR abs/1710.03135 (2017) - 2016
- [c8]Yasemin Acar, Sascha Fahl, Michelle L. Mazurek:
You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. SecDev 2016: 3-8 - [c7]Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
You Get Where You're Looking for: The Impact of Information Sources on Code Security. IEEE Symposium on Security and Privacy 2016: 289-305 - [c6]Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D. McDaniel, Matthew Smith:
SoK: Lessons Learned from Android Security Research for Appified Software Platforms. IEEE Symposium on Security and Privacy 2016: 433-451 - [c5]Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, Matthew Smith:
An Empirical Study of Textual Key-Fingerprint Representations. USENIX Security Symposium 2016: 193-208 - 2015
- [c4]Henning Perl, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar:
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. CCS 2015: 426-437 - [c3]Marten Oltrogge, Yasemin Acar, Sergej Dechand, Matthew Smith, Sascha Fahl:
To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. USENIX Security Symposium 2015: 239-254 - 2014
- [c2]Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith:
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. AsiaCCS 2014: 507-512 - 2013
- [c1]Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith:
On the ecological validity of a password study. SOUPS 2013: 13:1-13:13
Coauthor Index
aka: Nicolas Huaman
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint