[{"type":"conference","publication":"Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023","editor":[{"last_name":"Schmidt","full_name":"Schmidt, Albrecht","first_name":"Albrecht"},{"first_name":"Kaisa","full_name":"Väänänen, Kaisa","last_name":"Väänänen"},{"first_name":"Tesh","full_name":"Goyal, Tesh","last_name":"Goyal"},{"full_name":"Kristensson, Per Ola","last_name":"Kristensson","first_name":"Per Ola"},{"last_name":"Peters","full_name":"Peters, Anicia","first_name":"Anicia"},{"first_name":"Stefanie","full_name":"Mueller, Stefanie","last_name":"Mueller"},{"first_name":"Julie R.","last_name":"Williamson","full_name":"Williamson, Julie R."},{"full_name":"Wilson, Max L.","last_name":"Wilson","first_name":"Max L."}],"status":"public","_id":"47306","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"year":"2023","citation":{"chicago":"Herbert, Franziska, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, and Markus Dürmuth. “A World Full of Privacy and Security (Mis)Conceptions? Findings of a Representative Survey in 12 Countries.” In <i>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i>, edited by Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters, Stefanie Mueller, Julie R. Williamson, and Max L. Wilson, 582:1–582:23. ACM, 2023. <a href=\"https://doi.org/10.1145/3544548.3581410\">https://doi.org/10.1145/3544548.3581410</a>.","ieee":"F. Herbert <i>et al.</i>, “A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries,” in <i>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i>, 2023, p. 582:1–582:23, doi: <a href=\"https://doi.org/10.1145/3544548.3581410\">10.1145/3544548.3581410</a>.","bibtex":"@inproceedings{Herbert_Becker_Schaewitz_Hielscher_Kowalewski_Sasse_Acar_Dürmuth_2023, title={A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries}, DOI={<a href=\"https://doi.org/10.1145/3544548.3581410\">10.1145/3544548.3581410</a>}, booktitle={Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023}, publisher={ACM}, author={Herbert, Franziska and Becker, Steffen and Schaewitz, Leonie and Hielscher, Jonas and Kowalewski, Marvin and Sasse, M. Angela and Acar, Yasemin and Dürmuth, Markus}, editor={Schmidt, Albrecht and Väänänen, Kaisa and Goyal, Tesh and Kristensson, Per Ola and Peters, Anicia and Mueller, Stefanie and Williamson, Julie R. and Wilson, Max L.}, year={2023}, pages={582:1–582:23} }","short":"F. Herbert, S. Becker, L. Schaewitz, J. Hielscher, M. Kowalewski, M.A. Sasse, Y. Acar, M. Dürmuth, in: A. Schmidt, K. Väänänen, T. Goyal, P.O. Kristensson, A. Peters, S. Mueller, J.R. Williamson, M.L. Wilson (Eds.), Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023, ACM, 2023, p. 582:1–582:23.","mla":"Herbert, Franziska, et al. “A World Full of Privacy and Security (Mis)Conceptions? Findings of a Representative Survey in 12 Countries.” <i>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i>, edited by Albrecht Schmidt et al., ACM, 2023, p. 582:1–582:23, doi:<a href=\"https://doi.org/10.1145/3544548.3581410\">10.1145/3544548.3581410</a>.","ama":"Herbert F, Becker S, Schaewitz L, et al. A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. In: Schmidt A, Väänänen K, Goyal T, et al., eds. <i>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i>. ACM; 2023:582:1–582:23. doi:<a href=\"https://doi.org/10.1145/3544548.3581410\">10.1145/3544548.3581410</a>","apa":"Herbert, F., Becker, S., Schaewitz, L., Hielscher, J., Kowalewski, M., Sasse, M. A., Acar, Y., &#38; Dürmuth, M. (2023). A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. In A. Schmidt, K. Väänänen, T. Goyal, P. O. Kristensson, A. Peters, S. Mueller, J. R. Williamson, &#38; M. L. Wilson (Eds.), <i>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i> (p. 582:1–582:23). ACM. <a href=\"https://doi.org/10.1145/3544548.3581410\">https://doi.org/10.1145/3544548.3581410</a>"},"page":"582:1–582:23","publisher":"ACM","date_updated":"2024-06-05T12:40:15Z","author":[{"last_name":"Herbert","full_name":"Herbert, Franziska","first_name":"Franziska"},{"first_name":"Steffen","last_name":"Becker","full_name":"Becker, Steffen"},{"last_name":"Schaewitz","full_name":"Schaewitz, Leonie","first_name":"Leonie"},{"last_name":"Hielscher","full_name":"Hielscher, Jonas","first_name":"Jonas"},{"last_name":"Kowalewski","full_name":"Kowalewski, Marvin","first_name":"Marvin"},{"first_name":"M. Angela","full_name":"Sasse, M. Angela","last_name":"Sasse"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Dürmuth, Markus","last_name":"Dürmuth","first_name":"Markus"}],"date_created":"2023-09-22T13:30:58Z","title":"A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries","doi":"10.1145/3544548.3581410"},{"year":"2023","page":"1545–1560","citation":{"apa":"Wermke, D., Klemmer, J. H., Wöhler, N., Schmüser, J., Sri Ramulu, H., Acar, Y., &#38; Fahl, S. (2023). “Always Contribute Back”: A Qualitative Study on Security Challenges of the Open Source Supply Chain. <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1545–1560. <a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">https://doi.org/10.1109/SP46215.2023.10179378</a>","ama":"Wermke D, Klemmer JH, Wöhler N, et al. “Always Contribute Back”: A Qualitative Study on Security Challenges of the Open Source Supply Chain. In: <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>. IEEE; 2023:1545–1560. doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">10.1109/SP46215.2023.10179378</a>","mla":"Wermke, Dominik, et al. “‘Always Contribute Back’: A Qualitative Study on Security Challenges of the Open Source Supply Chain.” <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, IEEE, 2023, pp. 1545–1560, doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">10.1109/SP46215.2023.10179378</a>.","short":"D. Wermke, J.H. Klemmer, N. Wöhler, J. Schmüser, H. Sri Ramulu, Y. Acar, S. Fahl, in: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE, 2023, pp. 1545–1560.","bibtex":"@inproceedings{Wermke_Klemmer_Wöhler_Schmüser_Sri Ramulu_Acar_Fahl_2023, title={“Always Contribute Back”: A Qualitative Study on Security Challenges of the Open Source Supply Chain}, DOI={<a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">10.1109/SP46215.2023.10179378</a>}, booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Wermke, Dominik and Klemmer, Jan H. and Wöhler, Noah and Schmüser, Juliane and Sri Ramulu, Harshini and Acar, Yasemin and Fahl, Sascha}, year={2023}, pages={1545–1560} }","ieee":"D. Wermke <i>et al.</i>, “‘Always Contribute Back’: A Qualitative Study on Security Challenges of the Open Source Supply Chain,” in <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2023, pp. 1545–1560, doi: <a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">10.1109/SP46215.2023.10179378</a>.","chicago":"Wermke, Dominik, Jan H. Klemmer, Noah Wöhler, Juliane Schmüser, Harshini Sri Ramulu, Yasemin Acar, and Sascha Fahl. “‘Always Contribute Back’: A Qualitative Study on Security Challenges of the Open Source Supply Chain.” In <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1545–1560. IEEE, 2023. <a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">https://doi.org/10.1109/SP46215.2023.10179378</a>."},"title":"\"Always Contribute Back\": A Qualitative Study on Security Challenges of the Open Source Supply Chain","doi":"10.1109/SP46215.2023.10179378","date_updated":"2024-06-05T12:37:40Z","publisher":"IEEE","date_created":"2023-09-22T13:28:42Z","author":[{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"Jan H.","full_name":"Klemmer, Jan H.","last_name":"Klemmer"},{"first_name":"Noah","full_name":"Wöhler, Noah","last_name":"Wöhler"},{"last_name":"Schmüser","full_name":"Schmüser, Juliane","first_name":"Juliane"},{"last_name":"Sri Ramulu","orcid":"0000-0002-0000-5843","id":"99000","full_name":"Sri Ramulu, Harshini","first_name":"Harshini"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"status":"public","publication":"44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023","type":"conference","language":[{"iso":"eng"}],"_id":"47304","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931"},{"citation":{"apa":"Krause, A., Klemmer, J. H., Huaman, N., Wermke, D., Acar, Y., &#38; Fahl, S. (2023). Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","short":"A. Krause, J.H. Klemmer, N. Huaman, D. Wermke, Y. Acar, S. Fahl, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","bibtex":"@inproceedings{Krause_Klemmer_Huaman_Wermke_Acar_Fahl_2023, title={Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Krause, Alexander and Klemmer, Jan H. and Huaman, Nicolas and Wermke, Dominik and Acar, Yasemin and Fahl, Sascha}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","mla":"Krause, Alexander, et al. “Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","ama":"Krause A, Klemmer JH, Huaman N, Wermke D, Acar Y, Fahl S. Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","ieee":"A. Krause, J. H. Klemmer, N. Huaman, D. Wermke, Y. Acar, and S. Fahl, “Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","chicago":"Krause, Alexander, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, and Sascha Fahl. “Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023."},"year":"2023","title":"Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories","date_created":"2023-09-22T13:26:59Z","author":[{"first_name":"Alexander","last_name":"Krause","full_name":"Krause, Alexander"},{"first_name":"Jan H.","full_name":"Klemmer, Jan H.","last_name":"Klemmer"},{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"publisher":"USENIX Association","date_updated":"2024-06-05T12:38:22Z","status":"public","editor":[{"first_name":"Joseph A.","full_name":"Calandrino, Joseph A.","last_name":"Calandrino"},{"first_name":"Carmela","full_name":"Troncoso, Carmela","last_name":"Troncoso"}],"type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47299"},{"publication":"44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023","type":"conference","status":"public","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47310","language":[{"iso":"eng"}],"page":"1527–1544","citation":{"apa":"Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1527–1544. <a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">https://doi.org/10.1109/SP46215.2023.10179320</a>","mla":"Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, IEEE, 2023, pp. 1527–1544, doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">10.1109/SP46215.2023.10179320</a>.","bibtex":"@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, DOI={<a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">10.1109/SP46215.2023.10179320</a>}, booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={1527–1544} }","short":"M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE, 2023, pp. 1527–1544.","ieee":"M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” in <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2023, pp. 1527–1544, doi: <a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">10.1109/SP46215.2023.10179320</a>.","chicago":"Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” In <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1527–1544. IEEE, 2023. <a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">https://doi.org/10.1109/SP46215.2023.10179320</a>.","ama":"Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. In: <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>. IEEE; 2023:1527–1544. doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">10.1109/SP46215.2023.10179320</a>"},"year":"2023","author":[{"last_name":"Fourné","full_name":"Fourné, Marcel","first_name":"Marcel"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"full_name":"Enck, William","last_name":"Enck","first_name":"William"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"}],"date_created":"2023-09-22T13:44:47Z","publisher":"IEEE","date_updated":"2024-06-05T12:38:52Z","doi":"10.1109/SP46215.2023.10179320","title":"It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security"},{"_id":"47311","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"type":"conference","publication":"44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023","status":"public","publisher":"IEEE","date_updated":"2024-06-05T12:39:19Z","author":[{"full_name":"Munyendo, Collins W.","last_name":"Munyendo","first_name":"Collins W."},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Aviv, Adam J.","last_name":"Aviv","first_name":"Adam J."}],"date_created":"2023-09-22T13:45:16Z","title":"\"In Eighty Percent of the Cases, I Select the Password for Them\": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya","doi":"10.1109/SP46215.2023.10179410","year":"2023","citation":{"chicago":"Munyendo, Collins W., Yasemin Acar, and Adam J. Aviv. “‘In Eighty Percent of the Cases, I Select the Password for Them’: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.” In <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 570–587. IEEE, 2023. <a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">https://doi.org/10.1109/SP46215.2023.10179410</a>.","ieee":"C. W. Munyendo, Y. Acar, and A. J. Aviv, “‘In Eighty Percent of the Cases, I Select the Password for Them’: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya,” in <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2023, pp. 570–587, doi: <a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">10.1109/SP46215.2023.10179410</a>.","ama":"Munyendo CW, Acar Y, Aviv AJ. “In Eighty Percent of the Cases, I Select the Password for Them”: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya. In: <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>. IEEE; 2023:570–587. doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">10.1109/SP46215.2023.10179410</a>","short":"C.W. Munyendo, Y. Acar, A.J. Aviv, in: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE, 2023, pp. 570–587.","bibtex":"@inproceedings{Munyendo_Acar_Aviv_2023, title={“In Eighty Percent of the Cases, I Select the Password for Them”: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya}, DOI={<a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">10.1109/SP46215.2023.10179410</a>}, booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Munyendo, Collins W. and Acar, Yasemin and Aviv, Adam J.}, year={2023}, pages={570–587} }","mla":"Munyendo, Collins W., et al. “‘In Eighty Percent of the Cases, I Select the Password for Them’: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.” <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, IEEE, 2023, pp. 570–587, doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">10.1109/SP46215.2023.10179410</a>.","apa":"Munyendo, C. W., Acar, Y., &#38; Aviv, A. J. (2023). “In Eighty Percent of the Cases, I Select the Password for Them”: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya. <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 570–587. <a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">https://doi.org/10.1109/SP46215.2023.10179410</a>"},"page":"570–587"},{"page":"2015–2031","citation":{"chicago":"Keküllüoglu, Dilara, and Yasemin Acar. “‘We Are a Startup to the Core’: A Qualitative Interview Study on the Security and Privacy Development Practices in Turkish Software Startups.” In <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2015–2031. IEEE, 2023. <a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">https://doi.org/10.1109/SP46215.2023.10179339</a>.","ieee":"D. Keküllüoglu and Y. Acar, “‘We are a startup to the core’: A qualitative interview study on the security and privacy development practices in Turkish software startups,” in <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2023, pp. 2015–2031, doi: <a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">10.1109/SP46215.2023.10179339</a>.","ama":"Keküllüoglu D, Acar Y. “We are a startup to the core”: A qualitative interview study on the security and privacy development practices in Turkish software startups. In: <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>. IEEE; 2023:2015–2031. doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">10.1109/SP46215.2023.10179339</a>","apa":"Keküllüoglu, D., &#38; Acar, Y. (2023). “We are a startup to the core”: A qualitative interview study on the security and privacy development practices in Turkish software startups. <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2015–2031. <a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">https://doi.org/10.1109/SP46215.2023.10179339</a>","short":"D. Keküllüoglu, Y. Acar, in: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE, 2023, pp. 2015–2031.","mla":"Keküllüoglu, Dilara, and Yasemin Acar. “‘We Are a Startup to the Core’: A Qualitative Interview Study on the Security and Privacy Development Practices in Turkish Software Startups.” <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, IEEE, 2023, pp. 2015–2031, doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">10.1109/SP46215.2023.10179339</a>.","bibtex":"@inproceedings{Keküllüoglu_Acar_2023, title={“We are a startup to the core”: A qualitative interview study on the security and privacy development practices in Turkish software startups}, DOI={<a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">10.1109/SP46215.2023.10179339</a>}, booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Keküllüoglu, Dilara and Acar, Yasemin}, year={2023}, pages={2015–2031} }"},"year":"2023","doi":"10.1109/SP46215.2023.10179339","title":"\"We are a startup to the core\": A qualitative interview study on the security and privacy development practices in Turkish software startups","date_created":"2023-09-22T13:28:23Z","author":[{"full_name":"Keküllüoglu, Dilara","last_name":"Keküllüoglu","first_name":"Dilara"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"}],"publisher":"IEEE","date_updated":"2024-06-05T12:40:37Z","status":"public","publication":"44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47303"},{"date_created":"2023-09-22T13:25:55Z","author":[{"last_name":"Kohno","full_name":"Kohno, Tadayoshi","first_name":"Tadayoshi"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"Wulf","last_name":"Loh","full_name":"Loh, Wulf"}],"volume":"abs/2302.14326","date_updated":"2024-06-05T12:39:48Z","doi":"10.48550/arXiv.2302.14326","title":"Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations","citation":{"mla":"Kohno, Tadayoshi, et al. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>CoRR</i>, vol. abs/2302.14326, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>.","short":"T. Kohno, Y. Acar, W. Loh, CoRR abs/2302.14326 (2023).","bibtex":"@article{Kohno_Acar_Loh_2023, title={Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, volume={abs/2302.14326}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>}, journal={CoRR}, author={Kohno, Tadayoshi and Acar, Yasemin and Loh, Wulf}, year={2023} }","ama":"Kohno T, Acar Y, Loh W. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. <i>CoRR</i>. 2023;abs/2302.14326. doi:<a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>","apa":"Kohno, T., Acar, Y., &#38; Loh, W. (2023). Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. <i>CoRR</i>, <i>abs/2302.14326</i>. <a href=\"https://doi.org/10.48550/arXiv.2302.14326\">https://doi.org/10.48550/arXiv.2302.14326</a>","ieee":"T. Kohno, Y. Acar, and W. Loh, “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations,” <i>CoRR</i>, vol. abs/2302.14326, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>.","chicago":"Kohno, Tadayoshi, Yasemin Acar, and Wulf Loh. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>CoRR</i> abs/2302.14326 (2023). <a href=\"https://doi.org/10.48550/arXiv.2302.14326\">https://doi.org/10.48550/arXiv.2302.14326</a>."},"year":"2023","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47296","language":[{"iso":"eng"}],"type":"journal_article","publication":"CoRR","status":"public"},{"_id":"47305","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"publication":"Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023","type":"conference","editor":[{"first_name":"Patrick Gage","last_name":"Kelley","full_name":"Kelley, Patrick Gage"},{"first_name":"Apu","full_name":"Kapadia, Apu","last_name":"Kapadia"}],"status":"public","publisher":"USENIX Association","date_updated":"2024-06-05T12:44:28Z","date_created":"2023-09-22T13:29:29Z","author":[{"last_name":"Amft","full_name":"Amft, Sabrina","first_name":"Sabrina"},{"full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff","first_name":"Sandra"},{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"title":"\"Would You Give the Same Priority to the Bank and a Game? I Do Not!\" Exploring Credential Management Strategies and Obstacles during Password Manager Setup","year":"2023","page":"171–190","citation":{"mla":"Amft, Sabrina, et al. “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup.” <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, edited by Patrick Gage Kelley and Apu Kapadia, USENIX Association, 2023, pp. 171–190.","short":"S. Amft, S. Höltervennhoff, N. Huaman, Y. Acar, S. Fahl, in: P.G. Kelley, A. Kapadia (Eds.), Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, USENIX Association, 2023, pp. 171–190.","bibtex":"@inproceedings{Amft_Höltervennhoff_Huaman_Acar_Fahl_2023, title={“Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup}, booktitle={Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023}, publisher={USENIX Association}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Acar, Yasemin and Fahl, Sascha}, editor={Kelley, Patrick Gage and Kapadia, Apu}, year={2023}, pages={171–190} }","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Acar, Y., &#38; Fahl, S. (2023). “Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup. In P. G. Kelley &#38; A. Kapadia (Eds.), <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i> (pp. 171–190). USENIX Association.","ama":"Amft S, Höltervennhoff S, Huaman N, Acar Y, Fahl S. “Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup. In: Kelley PG, Kapadia A, eds. <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>. USENIX Association; 2023:171–190.","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, and Sascha Fahl. “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup.” In <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, edited by Patrick Gage Kelley and Apu Kapadia, 171–190. USENIX Association, 2023.","ieee":"S. Amft, S. Höltervennhoff, N. Huaman, Y. Acar, and S. Fahl, “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup,” in <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 2023, pp. 171–190."}},{"type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","editor":[{"last_name":"Calandrino","full_name":"Calandrino, Joseph A.","first_name":"Joseph A."},{"first_name":"Carmela","last_name":"Troncoso","full_name":"Troncoso, Carmela"}],"status":"public","_id":"47301","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"year":"2023","citation":{"bibtex":"@inproceedings{Höltervennhoff_Klostermeyer_Wöhler_Acar_Fahl_2023, title={“I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Höltervennhoff, Sandra and Klostermeyer, Philip and Wöhler, Noah and Acar, Yasemin and Fahl, Sascha}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","short":"S. Höltervennhoff, P. Klostermeyer, N. Wöhler, Y. Acar, S. Fahl, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","mla":"Höltervennhoff, Sandra, et al. “‘I Wouldn’t Want My Unsafe Code to Run My Pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","apa":"Höltervennhoff, S., Klostermeyer, P., Wöhler, N., Acar, Y., &#38; Fahl, S. (2023). “I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","ama":"Höltervennhoff S, Klostermeyer P, Wöhler N, Acar Y, Fahl S. “I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","ieee":"S. Höltervennhoff, P. Klostermeyer, N. Wöhler, Y. Acar, and S. Fahl, “‘I wouldn’t want my unsafe code to run my pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","chicago":"Höltervennhoff, Sandra, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, and Sascha Fahl. “‘I Wouldn’t Want My Unsafe Code to Run My Pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023."},"publisher":"USENIX Association","date_updated":"2024-06-05T12:49:13Z","author":[{"last_name":"Höltervennhoff","full_name":"Höltervennhoff, Sandra","first_name":"Sandra"},{"first_name":"Philip","last_name":"Klostermeyer","full_name":"Klostermeyer, Philip"},{"first_name":"Noah","last_name":"Wöhler","full_name":"Wöhler, Noah"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2023-09-22T13:27:45Z","title":"\"I wouldn’t want my unsafe code to run my pacemaker\": An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust"},{"year":"2023","citation":{"short":"J. Mink, H. Kaur, J. Schmüser, S. Fahl, Y. Acar, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","mla":"Mink, Jaron, et al. “‘Security Is Not My Field, I’m a Stats Guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","bibtex":"@inproceedings{Mink_Kaur_Schmüser_Fahl_Acar_2023, title={“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Mink, Jaron and Kaur, Harjot and Schmüser, Juliane and Fahl, Sascha and Acar, Yasemin}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","apa":"Mink, J., Kaur, H., Schmüser, J., Fahl, S., &#38; Acar, Y. (2023). “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","ama":"Mink J, Kaur H, Schmüser J, Fahl S, Acar Y. “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","chicago":"Mink, Jaron, Harjot Kaur, Juliane Schmüser, Sascha Fahl, and Yasemin Acar. “‘Security Is Not My Field, I’m a Stats Guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ieee":"J. Mink, H. Kaur, J. Schmüser, S. Fahl, and Y. Acar, “‘Security is not my field, I’m a stats guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023."},"date_updated":"2024-06-05T12:42:46Z","publisher":"USENIX Association","date_created":"2023-09-22T13:26:37Z","author":[{"first_name":"Jaron","full_name":"Mink, Jaron","last_name":"Mink"},{"first_name":"Harjot","last_name":"Kaur","full_name":"Kaur, Harjot"},{"full_name":"Schmüser, Juliane","last_name":"Schmüser","first_name":"Juliane"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"}],"title":"\"Security is not my field, I’m a stats guy\": A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry","type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","editor":[{"first_name":"Joseph A.","last_name":"Calandrino","full_name":"Calandrino, Joseph A."},{"last_name":"Troncoso","full_name":"Troncoso, Carmela","first_name":"Carmela"}],"status":"public","_id":"47298","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}]},{"publication":"2023 IEEE Symposium on Security and Privacy (SP)","type":"conference","status":"public","department":[{"_id":"858"}],"user_id":"14931","_id":"47842","extern":"1","language":[{"iso":"eng"}],"publication_status":"published","citation":{"apa":"Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>","short":"M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 2023 IEEE Symposium on Security and Privacy (SP), IEEE, 2023.","mla":"Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” <i>2023 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","bibtex":"@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, DOI={<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>}, booktitle={2023 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023} }","ama":"Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. In: <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>","chicago":"Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” In <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>.","ieee":"M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” 2023, doi: <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>."},"year":"2023","date_created":"2023-10-06T16:11:54Z","author":[{"full_name":"Fourné, Marcel","id":"99291","last_name":"Fourné","first_name":"Marcel"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"full_name":"Enck, William","last_name":"Enck","first_name":"William"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"}],"publisher":"IEEE","date_updated":"2024-06-05T12:44:03Z","doi":"10.1109/sp46215.2023.10179320","title":"It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security"},{"volume":"abs/2306.09708","author":[{"last_name":"Amft","full_name":"Amft, Sabrina","first_name":"Sabrina"},{"last_name":"Höltervennhoff","full_name":"Höltervennhoff, Sandra","first_name":"Sandra"},{"full_name":"Huaman, Nicolas","last_name":"Huaman","first_name":"Nicolas"},{"last_name":"Krause","full_name":"Krause, Alexander","first_name":"Alexander"},{"full_name":"Simko, Lucy","last_name":"Simko","first_name":"Lucy"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2023-09-22T13:25:13Z","date_updated":"2024-06-05T12:43:30Z","doi":"10.48550/arXiv.2306.09708","title":"Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication","citation":{"chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “Lost and Not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.” <i>CoRR</i> abs/2306.09708 (2023). <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">https://doi.org/10.48550/arXiv.2306.09708</a>.","ieee":"S. Amft <i>et al.</i>, “Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication,” <i>CoRR</i>, vol. abs/2306.09708, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>.","bibtex":"@article{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication}, volume={abs/2306.09708}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>}, journal={CoRR}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, year={2023} }","short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, CoRR abs/2306.09708 (2023).","mla":"Amft, Sabrina, et al. “Lost and Not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.” <i>CoRR</i>, vol. abs/2306.09708, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>.","ama":"Amft S, Höltervennhoff S, Huaman N, et al. Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. <i>CoRR</i>. 2023;abs/2306.09708. doi:<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. <i>CoRR</i>, <i>abs/2306.09708</i>. <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">https://doi.org/10.48550/arXiv.2306.09708</a>"},"year":"2023","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47295","language":[{"iso":"eng"}],"publication":"CoRR","type":"journal_article","status":"public"},{"date_updated":"2024-06-05T12:41:36Z","author":[{"first_name":"Mindy","last_name":"Tran","id":"99001","full_name":"Tran, Mindy"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Michel","full_name":"Cucker, Michel","last_name":"Cucker"},{"first_name":"William","full_name":"Enck, William","last_name":"Enck"},{"first_name":"Alexandros","last_name":"Kapravelos","full_name":"Kapravelos, Alexandros"},{"first_name":"Christian","last_name":"Kästner","full_name":"Kästner, Christian"},{"full_name":"Williams, Laurie A.","last_name":"Williams","first_name":"Laurie A."}],"date_created":"2023-09-22T13:24:55Z","volume":"abs/2307.15642","title":"S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit","doi":"10.48550/arXiv.2307.15642","year":"2023","citation":{"ama":"Tran M, Acar Y, Cucker M, et al. S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>. 2023;abs/2307.15642. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>","chicago":"Tran, Mindy, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i> abs/2307.15642 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>.","ieee":"M. Tran <i>et al.</i>, “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit,” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>.","apa":"Tran, M., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>, <i>abs/2307.15642</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>","mla":"Tran, Mindy, et al. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>.","short":"M. Tran, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.15642 (2023).","bibtex":"@article{Tran_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit}, volume={abs/2307.15642}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>}, journal={CoRR}, author={Tran, Mindy and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }"},"_id":"47294","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"type":"journal_article","publication":"CoRR","status":"public"},{"volume":"abs/2307.16557","author":[{"first_name":"Trevor","last_name":"Dunlap","full_name":"Dunlap, Trevor"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Cucker, Michel","last_name":"Cucker","first_name":"Michel"},{"first_name":"William","full_name":"Enck, William","last_name":"Enck"},{"full_name":"Kapravelos, Alexandros","last_name":"Kapravelos","first_name":"Alexandros"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"last_name":"Williams","full_name":"Williams, Laurie A.","first_name":"Laurie A."}],"date_created":"2023-09-22T13:24:29Z","date_updated":"2024-06-05T12:41:59Z","doi":"10.48550/arXiv.2307.16557","title":"S3C2 Summit 2023-02: Industry Secure Supply Chain Summit","citation":{"mla":"Dunlap, Trevor, et al. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>.","bibtex":"@article{Dunlap_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-02: Industry Secure Supply Chain Summit}, volume={abs/2307.16557}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>}, journal={CoRR}, author={Dunlap, Trevor and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","short":"T. Dunlap, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.16557 (2023).","apa":"Dunlap, T., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2307.16557</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>","ieee":"T. Dunlap <i>et al.</i>, “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>.","chicago":"Dunlap, Trevor, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i> abs/2307.16557 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>.","ama":"Dunlap T, Acar Y, Cucker M, et al. S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2307.16557. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>"},"year":"2023","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47293","language":[{"iso":"eng"}],"publication":"CoRR","type":"journal_article","status":"public"},{"publication":"CoRR","type":"journal_article","status":"public","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47292","language":[{"iso":"eng"}],"citation":{"apa":"Enck, W., Acar, Y., Cukier, M., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2308.06850</i>. <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>","bibtex":"@article{Enck_Acar_Cukier_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-06: Government Secure Supply Chain Summit}, volume={abs/2308.06850}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>}, journal={CoRR}, author={Enck, William and Acar, Yasemin and Cukier, Michel and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","short":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2308.06850 (2023).","mla":"Enck, William, et al. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","ama":"Enck W, Acar Y, Cukier M, Kapravelos A, Kästner C, Williams LA. S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2308.06850. doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>","chicago":"Enck, William, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i> abs/2308.06850 (2023). <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>.","ieee":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, and L. A. Williams, “S3C2 Summit 2023-06: Government Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>."},"year":"2023","volume":"abs/2308.06850","date_created":"2023-09-22T13:23:45Z","author":[{"last_name":"Enck","full_name":"Enck, William","first_name":"William"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Cukier, Michel","last_name":"Cukier","first_name":"Michel"},{"first_name":"Alexandros","last_name":"Kapravelos","full_name":"Kapravelos, Alexandros"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"last_name":"Williams","full_name":"Williams, Laurie A.","first_name":"Laurie A."}],"date_updated":"2024-06-05T12:42:20Z","doi":"10.48550/arXiv.2308.06850","title":"S3C2 Summit 2023-06: Government Secure Supply Chain Summit"},{"year":"2023","citation":{"mla":"Kohno, Tadayoshi, et al. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","short":"T. Kohno, Y. Acar, W. Loh, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","bibtex":"@inproceedings{Kohno_Acar_Loh_2023, title={Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Kohno, Tadayoshi and Acar, Yasemin and Loh, Wulf}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","apa":"Kohno, T., Acar, Y., &#38; Loh, W. (2023). Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","chicago":"Kohno, Tadayoshi, Yasemin Acar, and Wulf Loh. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ieee":"T. Kohno, Y. Acar, and W. Loh, “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","ama":"Kohno T, Acar Y, Loh W. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023."},"title":"Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations","date_updated":"2024-06-05T12:49:39Z","publisher":"USENIX Association","date_created":"2023-09-22T13:27:24Z","author":[{"first_name":"Tadayoshi","last_name":"Kohno","full_name":"Kohno, Tadayoshi"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"full_name":"Loh, Wulf","last_name":"Loh","first_name":"Wulf"}],"editor":[{"first_name":"Joseph A.","last_name":"Calandrino","full_name":"Calandrino, Joseph A."},{"first_name":"Carmela","full_name":"Troncoso, Carmela","last_name":"Troncoso"}],"status":"public","type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","language":[{"iso":"eng"}],"_id":"47300","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}]},{"type":"conference","publication":"Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023","status":"public","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47312","language":[{"iso":"eng"}],"citation":{"ama":"Neil L, Sri Ramulu H, Acar Y, Reaves B. Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. In: <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>. USENIX Association; 2023:283–299.","ieee":"L. Neil, H. Sri Ramulu, Y. Acar, and B. Reaves, “Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice,” in <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 2023, pp. 283–299.","chicago":"Neil, Lorenzo, Harshini Sri Ramulu, Yasemin Acar, and Bradley Reaves. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” In <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299. USENIX Association, 2023.","apa":"Neil, L., Sri Ramulu, H., Acar, Y., &#38; Reaves, B. (2023). Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299.","mla":"Neil, Lorenzo, et al. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, USENIX Association, 2023, pp. 283–299.","short":"L. Neil, H. Sri Ramulu, Y. Acar, B. Reaves, in: Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, USENIX Association, 2023, pp. 283–299.","bibtex":"@inproceedings{Neil_Sri Ramulu_Acar_Reaves_2023, title={Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice}, booktitle={Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023}, publisher={USENIX Association}, author={Neil, Lorenzo and Sri Ramulu, Harshini and Acar, Yasemin and Reaves, Bradley}, year={2023}, pages={283–299} }"},"page":"283–299","year":"2023","date_created":"2023-09-22T13:45:47Z","author":[{"first_name":"Lorenzo","last_name":"Neil","full_name":"Neil, Lorenzo"},{"full_name":"Sri Ramulu, Harshini","id":"99000","orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","first_name":"Harshini"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Bradley","full_name":"Reaves, Bradley","last_name":"Reaves"}],"publisher":"USENIX Association","date_updated":"2024-06-05T12:50:02Z","title":"Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice"},{"status":"public","type":"journal_article","publication":"CoRR","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47291","citation":{"apa":"Klemmer, J. H., Gutfleisch, M., Stransky, C., Acar, Y., Sasse, M. A., &#38; Fahl, S. (2023). “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>, <i>abs/2309.00744</i>. <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>","short":"J.H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M.A. Sasse, S. Fahl, CoRR abs/2309.00744 (2023).","bibtex":"@article{Klemmer_Gutfleisch_Stransky_Acar_Sasse_Fahl_2023, title={“Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication}, volume={abs/2309.00744}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>}, journal={CoRR}, author={Klemmer, Jan H. and Gutfleisch, Marco and Stransky, Christian and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha}, year={2023} }","mla":"Klemmer, Jan H., et al. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>.","ama":"Klemmer JH, Gutfleisch M, Stransky C, Acar Y, Sasse MA, Fahl S. “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>. 2023;abs/2309.00744. doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>","ieee":"J. H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M. A. Sasse, and S. Fahl, “‘Make Them Change it Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication,” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>.","chicago":"Klemmer, Jan H., Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, and Sascha Fahl. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i> abs/2309.00744 (2023). <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>."},"year":"2023","doi":"10.48550/arXiv.2309.00744","title":"\"Make Them Change it Every Week!\": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication","date_created":"2023-09-22T13:23:22Z","author":[{"full_name":"Klemmer, Jan H.","last_name":"Klemmer","first_name":"Jan H."},{"first_name":"Marco","last_name":"Gutfleisch","full_name":"Gutfleisch, Marco"},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"M. Angela","full_name":"Sasse, M. Angela","last_name":"Sasse"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"volume":"abs/2309.00744","date_updated":"2024-06-05T13:38:52Z"},{"type":"conference","publication":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023","editor":[{"full_name":"Meng, Weizhi","last_name":"Meng","first_name":"Weizhi"},{"first_name":"Christian Damsgaard","last_name":"Jensen","full_name":"Jensen, Christian Damsgaard"},{"last_name":"Cremers","full_name":"Cremers, Cas","first_name":"Cas"},{"full_name":"Kirda, Engin","last_name":"Kirda","first_name":"Engin"}],"status":"public","_id":"53362","user_id":"14931","department":[{"_id":"858"}],"language":[{"iso":"eng"}],"year":"2023","citation":{"chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” In <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, and Engin Kirda, 3138–3152. ACM, 2023. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>.","ieee":"S. Amft <i>et al.</i>, “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments,” in <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, 2023, pp. 3138–3152, doi: <a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>.","ama":"Amft S, Höltervennhoff S, Huaman N, et al. “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In: Meng W, Jensen CD, Cremers C, Kirda E, eds. <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>. ACM; 2023:3138–3152. doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>","short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, in: W. Meng, C.D. Jensen, C. Cremers, E. Kirda (Eds.), Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, ACM, 2023, pp. 3138–3152.","bibtex":"@inproceedings{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={“We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments}, DOI={<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>}, booktitle={Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023}, publisher={ACM}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, editor={Meng, Weizhi and Jensen, Christian Damsgaard and Cremers, Cas and Kirda, Engin}, year={2023}, pages={3138–3152} }","mla":"Amft, Sabrina, et al. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng et al., ACM, 2023, pp. 3138–3152, doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>.","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In W. Meng, C. D. Jensen, C. Cremers, &#38; E. Kirda (Eds.), <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i> (pp. 3138–3152). ACM. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>"},"page":"3138–3152","date_updated":"2024-06-05T13:52:15Z","publisher":"ACM","author":[{"first_name":"Sabrina","full_name":"Amft, Sabrina","last_name":"Amft"},{"first_name":"Sandra","last_name":"Höltervennhoff","full_name":"Höltervennhoff, Sandra"},{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"first_name":"Alexander","last_name":"Krause","full_name":"Krause, Alexander"},{"first_name":"Lucy","full_name":"Simko, Lucy","last_name":"Simko"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2024-04-09T06:22:43Z","title":"\"We’ve Disabled MFA for You\": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments","doi":"10.1145/3576915.3623180"},{"publisher":"IEEE","date_updated":"2024-06-05T13:51:00Z","date_created":"2023-12-04T11:07:08Z","author":[{"first_name":"Stefan","last_name":"Krüger","full_name":"Krüger, Stefan"},{"last_name":"Reif","full_name":"Reif, Michael","first_name":"Michael"},{"full_name":"Wickert, Anna-Katharina","last_name":"Wickert","first_name":"Anna-Katharina"},{"first_name":"Sarah","full_name":"Nadi, Sarah","last_name":"Nadi"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"Mira","last_name":"Mezini","full_name":"Mezini, Mira"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"title":"Securing Your Crypto-API Usage Through Tool Support - A Usability Study","doi":"10.1109/secdev56634.2023.00015","publication_status":"published","year":"2023","citation":{"short":"S. Krüger, M. Reif, A.-K. Wickert, S. Nadi, K. Ali, E. Bodden, Y. Acar, M. Mezini, S. Fahl, in: 2023 IEEE Secure Development Conference (SecDev), IEEE, 2023.","mla":"Krüger, Stefan, et al. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” <i>2023 IEEE Secure Development Conference (SecDev)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>.","bibtex":"@inproceedings{Krüger_Reif_Wickert_Nadi_Ali_Bodden_Acar_Mezini_Fahl_2023, title={Securing Your Crypto-API Usage Through Tool Support - A Usability Study}, DOI={<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>}, booktitle={2023 IEEE Secure Development Conference (SecDev)}, publisher={IEEE}, author={Krüger, Stefan and Reif, Michael and Wickert, Anna-Katharina and Nadi, Sarah and Ali, Karim and Bodden, Eric and Acar, Yasemin and Mezini, Mira and Fahl, Sascha}, year={2023} }","apa":"Krüger, S., Reif, M., Wickert, A.-K., Nadi, S., Ali, K., Bodden, E., Acar, Y., Mezini, M., &#38; Fahl, S. (2023). Securing Your Crypto-API Usage Through Tool Support - A Usability Study. <i>2023 IEEE Secure Development Conference (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>","ieee":"S. Krüger <i>et al.</i>, “Securing Your Crypto-API Usage Through Tool Support - A Usability Study,” 2023, doi: <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>.","chicago":"Krüger, Stefan, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, and Sascha Fahl. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” In <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>.","ama":"Krüger S, Reif M, Wickert A-K, et al. Securing Your Crypto-API Usage Through Tool Support - A Usability Study. In: <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>"},"_id":"49438","department":[{"_id":"76"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"publication":"2023 IEEE Secure Development Conference (SecDev)","type":"conference","status":"public"}]
