[{"_id":"47264","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","editor":[{"full_name":"Bailey, Michael","last_name":"Bailey","first_name":"Michael"},{"first_name":"Rachel","full_name":"Greenstadt, Rachel","last_name":"Greenstadt"}],"status":"public","date_updated":"2024-06-05T13:01:22Z","publisher":"USENIX Association","date_created":"2023-09-22T13:02:22Z","author":[{"last_name":"Oltrogge","full_name":"Oltrogge, Marten","first_name":"Marten"},{"first_name":"Nicolas","full_name":"Huaman, Nicolas","last_name":"Huaman"},{"first_name":"Sabrina","full_name":"Amft, Sabrina","last_name":"Amft"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Backes, Michael","last_name":"Backes","first_name":"Michael"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"title":"Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications","year":"2021","citation":{"bibtex":"@inproceedings{Oltrogge_Huaman_Amft_Acar_Backes_Fahl_2021, title={Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications}, booktitle={30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021}, publisher={USENIX Association}, author={Oltrogge, Marten and Huaman, Nicolas and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha}, editor={Bailey, Michael and Greenstadt, Rachel}, year={2021}, pages={4347–4364} }","mla":"Oltrogge, Marten, et al. “Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.” <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, USENIX Association, 2021, pp. 4347–4364.","short":"M. Oltrogge, N. Huaman, S. Amft, Y. Acar, M. Backes, S. Fahl, in: M. Bailey, R. Greenstadt (Eds.), 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, USENIX Association, 2021, pp. 4347–4364.","apa":"Oltrogge, M., Huaman, N., Amft, S., Acar, Y., Backes, M., &#38; Fahl, S. (2021). Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i> (pp. 4347–4364). USENIX Association.","ieee":"M. Oltrogge, N. Huaman, S. Amft, Y. Acar, M. Backes, and S. Fahl, “Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications,” in <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, 2021, pp. 4347–4364.","chicago":"Oltrogge, Marten, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, and Sascha Fahl. “Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.” In <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, 4347–4364. USENIX Association, 2021.","ama":"Oltrogge M, Huaman N, Amft S, Acar Y, Backes M, Fahl S. Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. In: Bailey M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>. USENIX Association; 2021:4347–4364."},"page":"4347–4364"},{"_id":"47269","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"extern":"1","publication":"Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021","type":"conference","editor":[{"last_name":"Chiasson","full_name":"Chiasson, Sonia","first_name":"Sonia"}],"status":"public","publisher":"USENIX Association","date_updated":"2024-06-05T13:03:38Z","author":[{"last_name":"Neil","full_name":"Neil, Lorenzo","first_name":"Lorenzo"},{"last_name":"Bouma-Sims","full_name":"Bouma-Sims, Elijah","first_name":"Elijah"},{"first_name":"Evan","full_name":"Lafontaine, Evan","last_name":"Lafontaine"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"last_name":"Reaves","full_name":"Reaves, Bradley","first_name":"Bradley"}],"date_created":"2023-09-22T13:05:16Z","title":"Investigating Web Service Account Remediation Advice","year":"2021","page":"359–376","citation":{"ama":"Neil L, Bouma-Sims E, Lafontaine E, Acar Y, Reaves B. Investigating Web Service Account Remediation Advice. In: Chiasson S, ed. <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>. USENIX Association; 2021:359–376.","chicago":"Neil, Lorenzo, Elijah Bouma-Sims, Evan Lafontaine, Yasemin Acar, and Bradley Reaves. “Investigating Web Service Account Remediation Advice.” In <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, 359–376. USENIX Association, 2021.","ieee":"L. Neil, E. Bouma-Sims, E. Lafontaine, Y. Acar, and B. Reaves, “Investigating Web Service Account Remediation Advice,” in <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, 2021, pp. 359–376.","bibtex":"@inproceedings{Neil_Bouma-Sims_Lafontaine_Acar_Reaves_2021, title={Investigating Web Service Account Remediation Advice}, booktitle={Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021}, publisher={USENIX Association}, author={Neil, Lorenzo and Bouma-Sims, Elijah and Lafontaine, Evan and Acar, Yasemin and Reaves, Bradley}, editor={Chiasson, Sonia}, year={2021}, pages={359–376} }","short":"L. Neil, E. Bouma-Sims, E. Lafontaine, Y. Acar, B. Reaves, in: S. Chiasson (Ed.), Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021, USENIX Association, 2021, pp. 359–376.","mla":"Neil, Lorenzo, et al. “Investigating Web Service Account Remediation Advice.” <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, USENIX Association, 2021, pp. 359–376.","apa":"Neil, L., Bouma-Sims, E., Lafontaine, E., Acar, Y., &#38; Reaves, B. (2021). Investigating Web Service Account Remediation Advice. In S. Chiasson (Ed.), <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i> (pp. 359–376). USENIX Association."}},{"type":"dissertation","status":"public","_id":"47271","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"extern":"1","language":[{"iso":"eng"}],"year":"2021","citation":{"chicago":"Acar, Yasemin. <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany, 2021.","ieee":"Y. Acar, <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany, 2021.","ama":"Acar Y. <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany; 2021.","bibtex":"@book{Acar_2021, title={Human Factors in Secure Software Development}, publisher={University of Marburg, Germany}, author={Acar, Yasemin}, year={2021} }","short":"Y. Acar, Human Factors in Secure Software Development, University of Marburg, Germany, 2021.","mla":"Acar, Yasemin. <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany, 2021.","apa":"Acar, Y. (2021). <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany."},"date_updated":"2024-06-05T12:56:39Z","publisher":"University of Marburg, Germany","author":[{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"}],"date_created":"2023-09-22T13:06:40Z","title":"Human Factors in Secure Software Development"},{"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030503086","9783030503093"]},"publication_status":"published","place":"Cham","year":"2020","citation":{"ama":"Haney JM, Furman SM, Acar Y. Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In: <i>HCI for Cybersecurity, Privacy and Trust</i>. Springer International Publishing; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-50309-3_26\">10.1007/978-3-030-50309-3_26</a>","chicago":"Haney, Julie M., Susanne M. Furman, and Yasemin Acar. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” In <i>HCI for Cybersecurity, Privacy and Trust</i>. Cham: Springer International Publishing, 2020. <a href=\"https://doi.org/10.1007/978-3-030-50309-3_26\">https://doi.org/10.1007/978-3-030-50309-3_26</a>.","ieee":"J. M. Haney, S. M. Furman, and Y. Acar, “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges,” in <i>HCI for Cybersecurity, Privacy and Trust</i>, Cham: Springer International Publishing, 2020.","mla":"Haney, Julie M., et al. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” <i>HCI for Cybersecurity, Privacy and Trust</i>, Springer International Publishing, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-50309-3_26\">10.1007/978-3-030-50309-3_26</a>.","bibtex":"@inbook{Haney_Furman_Acar_2020, place={Cham}, title={Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-50309-3_26\">10.1007/978-3-030-50309-3_26</a>}, booktitle={HCI for Cybersecurity, Privacy and Trust}, publisher={Springer International Publishing}, author={Haney, Julie M. and Furman, Susanne M. and Acar, Yasemin}, year={2020} }","short":"J.M. Haney, S.M. Furman, Y. Acar, in: HCI for Cybersecurity, Privacy and Trust, Springer International Publishing, Cham, 2020.","apa":"Haney, J. M., Furman, S. M., &#38; Acar, Y. (2020). Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In <i>HCI for Cybersecurity, Privacy and Trust</i>. Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-030-50309-3_26\">https://doi.org/10.1007/978-3-030-50309-3_26</a>"},"publisher":"Springer International Publishing","date_updated":"2024-06-05T13:04:23Z","author":[{"first_name":"Julie M.","last_name":"Haney","full_name":"Haney, Julie M."},{"full_name":"Furman, Susanne M.","last_name":"Furman","first_name":"Susanne M."},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"}],"date_created":"2023-09-22T12:59:53Z","title":"Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges","doi":"10.1007/978-3-030-50309-3_26","publication":"HCI for Cybersecurity, Privacy and Trust","type":"book_chapter","status":"public","_id":"47261","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"extern":"1"},{"year":"2020","citation":{"chicago":"Wermke, Dominik, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, and Sascha Fahl. “Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites.” In <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>, edited by Heather Richter Lipford and Sonia Chiasson, 359–377. USENIX Association, 2020.","ieee":"D. Wermke, N. Huaman, C. Stransky, N. Busch, Y. Acar, and S. Fahl, “Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites,” in <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>, 2020, pp. 359–377.","ama":"Wermke D, Huaman N, Stransky C, Busch N, Acar Y, Fahl S. Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites. In: Lipford HR, Chiasson S, eds. <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>. USENIX Association; 2020:359–377.","apa":"Wermke, D., Huaman, N., Stransky, C., Busch, N., Acar, Y., &#38; Fahl, S. (2020). Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites. In H. R. Lipford &#38; S. Chiasson (Eds.), <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i> (pp. 359–377). USENIX Association.","mla":"Wermke, Dominik, et al. “Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites.” <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>, edited by Heather Richter Lipford and Sonia Chiasson, USENIX Association, 2020, pp. 359–377.","bibtex":"@inproceedings{Wermke_Huaman_Stransky_Busch_Acar_Fahl_2020, title={Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites}, booktitle={Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020}, publisher={USENIX Association}, author={Wermke, Dominik and Huaman, Nicolas and Stransky, Christian and Busch, Niklas and Acar, Yasemin and Fahl, Sascha}, editor={Lipford, Heather Richter and Chiasson, Sonia}, year={2020}, pages={359–377} }","short":"D. Wermke, N. Huaman, C. Stransky, N. Busch, Y. Acar, S. Fahl, in: H.R. Lipford, S. Chiasson (Eds.), Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020, USENIX Association, 2020, pp. 359–377."},"page":"359–377","date_updated":"2024-06-05T13:04:48Z","publisher":"USENIX Association","author":[{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"first_name":"Niklas","last_name":"Busch","full_name":"Busch, Niklas"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T12:59:31Z","title":"Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites","type":"conference","publication":"Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020","editor":[{"first_name":"Heather Richter","last_name":"Lipford","full_name":"Lipford, Heather Richter"},{"first_name":"Sonia","full_name":"Chiasson, Sonia","last_name":"Chiasson"}],"status":"public","_id":"47260","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"extern":"1","language":[{"iso":"eng"}]},{"type":"conference","publication":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","status":"public","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47262","language":[{"iso":"eng"}],"extern":"1","publication_status":"published","citation":{"ieee":"P. L. Gorski, Y. Acar, L. Lo Iacono, and S. Fahl, “Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs,” 2020, doi: <a href=\"https://doi.org/10.1145/3313831.3376142\">10.1145/3313831.3376142</a>.","chicago":"Gorski, Peter Leo, Yasemin Acar, Luigi Lo Iacono, and Sascha Fahl. “Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs.” In <i>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</i>. ACM, 2020. <a href=\"https://doi.org/10.1145/3313831.3376142\">https://doi.org/10.1145/3313831.3376142</a>.","ama":"Gorski PL, Acar Y, Lo Iacono L, Fahl S. Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs. In: <i>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</i>. ACM; 2020. doi:<a href=\"https://doi.org/10.1145/3313831.3376142\">10.1145/3313831.3376142</a>","apa":"Gorski, P. L., Acar, Y., Lo Iacono, L., &#38; Fahl, S. (2020). Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs. <i>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</i>. <a href=\"https://doi.org/10.1145/3313831.3376142\">https://doi.org/10.1145/3313831.3376142</a>","short":"P.L. Gorski, Y. Acar, L. Lo Iacono, S. Fahl, in: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, 2020.","bibtex":"@inproceedings{Gorski_Acar_Lo Iacono_Fahl_2020, title={Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1145/3313831.3376142\">10.1145/3313831.3376142</a>}, booktitle={Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems}, publisher={ACM}, author={Gorski, Peter Leo and Acar, Yasemin and Lo Iacono, Luigi and Fahl, Sascha}, year={2020} }","mla":"Gorski, Peter Leo, et al. “Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs.” <i>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</i>, ACM, 2020, doi:<a href=\"https://doi.org/10.1145/3313831.3376142\">10.1145/3313831.3376142</a>."},"year":"2020","author":[{"last_name":"Gorski","full_name":"Gorski, Peter Leo","first_name":"Peter Leo"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"full_name":"Lo Iacono, Luigi","last_name":"Lo Iacono","first_name":"Luigi"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2023-09-22T13:00:15Z","publisher":"ACM","date_updated":"2024-06-05T13:05:10Z","doi":"10.1145/3313831.3376142","title":"Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs"},{"type":"conference","status":"public","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47879","language":[{"iso":"eng"}],"extern":"1","citation":{"ama":"Haney J, Furman S, Acar Y. Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In: International Conference on Human-Computer Interaction, Copenhagen, -1; 2020.","chicago":"Haney, Julie, Susanne Furman, and Yasemin Acar. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” International Conference on Human-Computer Interaction, Copenhagen, -1, 2020.","ieee":"J. Haney, S. Furman, and Y. Acar, “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges,” 2020.","bibtex":"@inproceedings{Haney_Furman_Acar_2020, title={Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}, publisher={International Conference on Human-Computer Interaction, Copenhagen, -1}, author={Haney, Julie and Furman, Susanne and Acar, Yasemin}, year={2020} }","short":"J. Haney, S. Furman, Y. Acar, in: International Conference on Human-Computer Interaction, Copenhagen, -1, 2020.","mla":"Haney, Julie, et al. <i>Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges</i>. International Conference on Human-Computer Interaction, Copenhagen, -1, 2020.","apa":"Haney, J., Furman, S., &#38; Acar, Y. (2020). <i>Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges</i>."},"year":"2020","author":[{"first_name":"Julie","last_name":"Haney","full_name":"Haney, Julie"},{"full_name":"Furman, Susanne","last_name":"Furman","first_name":"Susanne"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"}],"date_created":"2023-10-09T13:20:44Z","publisher":"International Conference on Human-Computer Interaction, Copenhagen, -1","date_updated":"2024-06-05T13:04:04Z","title":"Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges"},{"language":[{"iso":"eng"}],"extern":"1","alternative_title":["How Browsers' Explanations Impact Misconceptions About Private Browsing Mode"],"_id":"47253","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","status":"public","publication":"Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18","type":"conference","title":"Your Secrets Are Safe","doi":"10.1145/3178876.3186088","publisher":"ACM Press","date_updated":"2024-06-05T13:06:44Z","date_created":"2023-09-22T12:52:15Z","author":[{"full_name":"Wu, Yuxi","last_name":"Wu","first_name":"Yuxi"},{"full_name":"Gupta, Panya","last_name":"Gupta","first_name":"Panya"},{"last_name":"Wei","full_name":"Wei, Miranda","first_name":"Miranda"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"first_name":"Blase","last_name":"Ur","full_name":"Ur, Blase"}],"year":"2018","citation":{"ieee":"Y. Wu, P. Gupta, M. Wei, Y. Acar, S. Fahl, and B. Ur, “Your Secrets Are Safe,” 2018, doi: <a href=\"https://doi.org/10.1145/3178876.3186088\">10.1145/3178876.3186088</a>.","chicago":"Wu, Yuxi, Panya Gupta, Miranda Wei, Yasemin Acar, Sascha Fahl, and Blase Ur. “Your Secrets Are Safe.” In <i>Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18</i>. ACM Press, 2018. <a href=\"https://doi.org/10.1145/3178876.3186088\">https://doi.org/10.1145/3178876.3186088</a>.","apa":"Wu, Y., Gupta, P., Wei, M., Acar, Y., Fahl, S., &#38; Ur, B. (2018). Your Secrets Are Safe. <i>Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18</i>. <a href=\"https://doi.org/10.1145/3178876.3186088\">https://doi.org/10.1145/3178876.3186088</a>","ama":"Wu Y, Gupta P, Wei M, Acar Y, Fahl S, Ur B. Your Secrets Are Safe. In: <i>Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18</i>. ACM Press; 2018. doi:<a href=\"https://doi.org/10.1145/3178876.3186088\">10.1145/3178876.3186088</a>","short":"Y. Wu, P. Gupta, M. Wei, Y. Acar, S. Fahl, B. Ur, in: Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18, ACM Press, 2018.","bibtex":"@inproceedings{Wu_Gupta_Wei_Acar_Fahl_Ur_2018, title={Your Secrets Are Safe}, DOI={<a href=\"https://doi.org/10.1145/3178876.3186088\">10.1145/3178876.3186088</a>}, booktitle={Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18}, publisher={ACM Press}, author={Wu, Yuxi and Gupta, Panya and Wei, Miranda and Acar, Yasemin and Fahl, Sascha and Ur, Blase}, year={2018} }","mla":"Wu, Yuxi, et al. “Your Secrets Are Safe.” <i>Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18</i>, ACM Press, 2018, doi:<a href=\"https://doi.org/10.1145/3178876.3186088\">10.1145/3178876.3186088</a>."},"publication_status":"published"},{"extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47255","status":"public","editor":[{"first_name":"Mary Ellen","last_name":"Zurko","full_name":"Zurko, Mary Ellen"},{"first_name":"Heather Richter","last_name":"Lipford","full_name":"Lipford, Heather Richter"}],"publication":"Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018","type":"conference","title":"\"We make it a big deal in the company\": Security Mindsets in Organizations that Develop Cryptographic Products","date_created":"2023-09-22T12:53:12Z","author":[{"first_name":"Julie M.","full_name":"Haney, Julie M.","last_name":"Haney"},{"first_name":"Mary","full_name":"Theofanos, Mary","last_name":"Theofanos"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Sandra Spickard","last_name":"Prettyman","full_name":"Prettyman, Sandra Spickard"}],"publisher":"USENIX Association","date_updated":"2024-06-05T13:07:06Z","page":"357–373","citation":{"bibtex":"@inproceedings{Haney_Theofanos_Acar_Prettyman_2018, title={“We make it a big deal in the company”: Security Mindsets in Organizations that Develop Cryptographic Products}, booktitle={Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018}, publisher={USENIX Association}, author={Haney, Julie M. and Theofanos, Mary and Acar, Yasemin and Prettyman, Sandra Spickard}, editor={Zurko, Mary Ellen and Lipford, Heather Richter}, year={2018}, pages={357–373} }","mla":"Haney, Julie M., et al. “‘We Make It a Big Deal in the Company’: Security Mindsets in Organizations That Develop Cryptographic Products.” <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, USENIX Association, 2018, pp. 357–373.","short":"J.M. Haney, M. Theofanos, Y. Acar, S.S. Prettyman, in: M.E. Zurko, H.R. Lipford (Eds.), Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, USENIX Association, 2018, pp. 357–373.","apa":"Haney, J. M., Theofanos, M., Acar, Y., &#38; Prettyman, S. S. (2018). “We make it a big deal in the company”: Security Mindsets in Organizations that Develop Cryptographic Products. In M. E. Zurko &#38; H. R. Lipford (Eds.), <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i> (pp. 357–373). USENIX Association.","ieee":"J. M. Haney, M. Theofanos, Y. Acar, and S. S. Prettyman, “‘We make it a big deal in the company’: Security Mindsets in Organizations that Develop Cryptographic Products,” in <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, 2018, pp. 357–373.","chicago":"Haney, Julie M., Mary Theofanos, Yasemin Acar, and Sandra Spickard Prettyman. “‘We Make It a Big Deal in the Company’: Security Mindsets in Organizations That Develop Cryptographic Products.” In <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, 357–373. USENIX Association, 2018.","ama":"Haney JM, Theofanos M, Acar Y, Prettyman SS. “We make it a big deal in the company”: Security Mindsets in Organizations that Develop Cryptographic Products. In: Zurko ME, Lipford HR, eds. <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>. USENIX Association; 2018:357–373."},"year":"2018"},{"language":[{"iso":"eng"}],"extern":"1","_id":"47876","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"status":"public","type":"report","title":"Organizational views of NIST cryptographic standards and testing and validation programs","doi":"10.6028/nist.ir.8241","date_updated":"2024-06-05T13:05:57Z","publisher":"National Institute of Standards and Technology","date_created":"2023-10-09T13:18:41Z","author":[{"first_name":"Julie","last_name":"Haney","full_name":"Haney, Julie"},{"full_name":"Theofanos, Mary","last_name":"Theofanos","first_name":"Mary"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"full_name":"Prettyman, Sandra Spickard","last_name":"Prettyman","first_name":"Sandra Spickard"}],"year":"2018","citation":{"apa":"Haney, J., Theofanos, M., Acar, Y., &#38; Prettyman, S. S. (2018). <i>Organizational views of NIST cryptographic standards and testing and validation programs</i>. National Institute of Standards and Technology. <a href=\"https://doi.org/10.6028/nist.ir.8241\">https://doi.org/10.6028/nist.ir.8241</a>","short":"J. Haney, M. Theofanos, Y. Acar, S.S. Prettyman, Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs, National Institute of Standards and Technology, 2018.","mla":"Haney, Julie, et al. <i>Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs</i>. National Institute of Standards and Technology, 2018, doi:<a href=\"https://doi.org/10.6028/nist.ir.8241\">10.6028/nist.ir.8241</a>.","bibtex":"@book{Haney_Theofanos_Acar_Prettyman_2018, title={Organizational views of NIST cryptographic standards and testing and validation programs}, DOI={<a href=\"https://doi.org/10.6028/nist.ir.8241\">10.6028/nist.ir.8241</a>}, publisher={National Institute of Standards and Technology}, author={Haney, Julie and Theofanos, Mary and Acar, Yasemin and Prettyman, Sandra Spickard}, year={2018} }","chicago":"Haney, Julie, Mary Theofanos, Yasemin Acar, and Sandra Spickard Prettyman. <i>Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs</i>. National Institute of Standards and Technology, 2018. <a href=\"https://doi.org/10.6028/nist.ir.8241\">https://doi.org/10.6028/nist.ir.8241</a>.","ieee":"J. Haney, M. Theofanos, Y. Acar, and S. S. Prettyman, <i>Organizational views of NIST cryptographic standards and testing and validation programs</i>. National Institute of Standards and Technology, 2018.","ama":"Haney J, Theofanos M, Acar Y, Prettyman SS. <i>Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs</i>. National Institute of Standards and Technology; 2018. doi:<a href=\"https://doi.org/10.6028/nist.ir.8241\">10.6028/nist.ir.8241</a>"},"publication_status":"published"},{"title":"Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse","author":[{"first_name":"Peter Leo","full_name":"Gorski, Peter Leo","last_name":"Gorski"},{"first_name":"Luigi Lo","last_name":"Iacono","full_name":"Iacono, Luigi Lo"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"last_name":"Möller","full_name":"Möller, Sebastian","first_name":"Sebastian"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T12:53:46Z","publisher":"USENIX Association","date_updated":"2024-06-05T13:20:00Z","page":"265–281","citation":{"chicago":"Gorski, Peter Leo, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, and Sascha Fahl. “Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.” In <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, 265–281. USENIX Association, 2018.","ieee":"P. L. Gorski <i>et al.</i>, “Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse,” in <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, 2018, pp. 265–281.","ama":"Gorski PL, Iacono LL, Wermke D, et al. Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. In: Zurko ME, Lipford HR, eds. <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>. USENIX Association; 2018:265–281.","short":"P.L. Gorski, L.L. Iacono, D. Wermke, C. Stransky, S. Möller, Y. Acar, S. Fahl, in: M.E. Zurko, H.R. Lipford (Eds.), Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, USENIX Association, 2018, pp. 265–281.","mla":"Gorski, Peter Leo, et al. “Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.” <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, USENIX Association, 2018, pp. 265–281.","bibtex":"@inproceedings{Gorski_Iacono_Wermke_Stransky_Möller_Acar_Fahl_2018, title={Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse}, booktitle={Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018}, publisher={USENIX Association}, author={Gorski, Peter Leo and Iacono, Luigi Lo and Wermke, Dominik and Stransky, Christian and Möller, Sebastian and Acar, Yasemin and Fahl, Sascha}, editor={Zurko, Mary Ellen and Lipford, Heather Richter}, year={2018}, pages={265–281} }","apa":"Gorski, P. L., Iacono, L. L., Wermke, D., Stransky, C., Möller, S., Acar, Y., &#38; Fahl, S. (2018). Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. In M. E. Zurko &#38; H. R. Lipford (Eds.), <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i> (pp. 265–281). USENIX Association."},"year":"2018","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47256","status":"public","editor":[{"first_name":"Mary Ellen","full_name":"Zurko, Mary Ellen","last_name":"Zurko"},{"full_name":"Lipford, Heather Richter","last_name":"Lipford","first_name":"Heather Richter"}],"publication":"Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018","type":"conference"},{"publisher":"IEEE","date_updated":"2024-06-05T13:19:28Z","date_created":"2023-09-22T12:52:42Z","author":[{"last_name":"Oltrogge","full_name":"Oltrogge, Marten","first_name":"Marten"},{"full_name":"Derr, Erik","last_name":"Derr","first_name":"Erik"},{"last_name":"Stransky","full_name":"Stransky, Christian","first_name":"Christian"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"first_name":"Christian","last_name":"Rossow","full_name":"Rossow, Christian"},{"last_name":"Pellegrino","full_name":"Pellegrino, Giancarlo","first_name":"Giancarlo"},{"last_name":"Bugiel","full_name":"Bugiel, Sven","first_name":"Sven"},{"full_name":"Backes, Michael","last_name":"Backes","first_name":"Michael"}],"title":"The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators","doi":"10.1109/sp.2018.00005","publication_status":"published","year":"2018","citation":{"ama":"Oltrogge M, Derr E, Stransky C, et al. The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. In: <i>2018 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2018. doi:<a href=\"https://doi.org/10.1109/sp.2018.00005\">10.1109/sp.2018.00005</a>","chicago":"Oltrogge, Marten, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, and Michael Backes. “The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.” In <i>2018 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2018. <a href=\"https://doi.org/10.1109/sp.2018.00005\">https://doi.org/10.1109/sp.2018.00005</a>.","ieee":"M. Oltrogge <i>et al.</i>, “The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators,” 2018, doi: <a href=\"https://doi.org/10.1109/sp.2018.00005\">10.1109/sp.2018.00005</a>.","short":"M. Oltrogge, E. Derr, C. Stransky, Y. Acar, S. Fahl, C. Rossow, G. Pellegrino, S. Bugiel, M. Backes, in: 2018 IEEE Symposium on Security and Privacy (SP), IEEE, 2018.","bibtex":"@inproceedings{Oltrogge_Derr_Stransky_Acar_Fahl_Rossow_Pellegrino_Bugiel_Backes_2018, title={The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators}, DOI={<a href=\"https://doi.org/10.1109/sp.2018.00005\">10.1109/sp.2018.00005</a>}, booktitle={2018 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael}, year={2018} }","mla":"Oltrogge, Marten, et al. “The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.” <i>2018 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2018, doi:<a href=\"https://doi.org/10.1109/sp.2018.00005\">10.1109/sp.2018.00005</a>.","apa":"Oltrogge, M., Derr, E., Stransky, C., Acar, Y., Fahl, S., Rossow, C., Pellegrino, G., Bugiel, S., &#38; Backes, M. (2018). The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. <i>2018 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2018.00005\">https://doi.org/10.1109/sp.2018.00005</a>"},"_id":"47254","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"2018 IEEE Symposium on Security and Privacy (SP)","status":"public"},{"page":"222–235","citation":{"ieee":"D. Wermke, N. Huaman, Y. Acar, B. Reaves, P. Traynor, and S. Fahl, “A Large Scale Investigation of Obfuscation Use in Google Play,” in <i>Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, 2018, pp. 222–235, doi: <a href=\"https://doi.org/10.1145/3274694.3274726\">10.1145/3274694.3274726</a>.","chicago":"Wermke, Dominik, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, and Sascha Fahl. “A Large Scale Investigation of Obfuscation Use in Google Play.” In <i>Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, 222–235. ACM, 2018. <a href=\"https://doi.org/10.1145/3274694.3274726\">https://doi.org/10.1145/3274694.3274726</a>.","ama":"Wermke D, Huaman N, Acar Y, Reaves B, Traynor P, Fahl S. A Large Scale Investigation of Obfuscation Use in Google Play. In: <i>Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>. ACM; 2018:222–235. doi:<a href=\"https://doi.org/10.1145/3274694.3274726\">10.1145/3274694.3274726</a>","apa":"Wermke, D., Huaman, N., Acar, Y., Reaves, B., Traynor, P., &#38; Fahl, S. (2018). A Large Scale Investigation of Obfuscation Use in Google Play. <i>Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, 222–235. <a href=\"https://doi.org/10.1145/3274694.3274726\">https://doi.org/10.1145/3274694.3274726</a>","short":"D. Wermke, N. Huaman, Y. Acar, B. Reaves, P. Traynor, S. Fahl, in: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, ACM, 2018, pp. 222–235.","mla":"Wermke, Dominik, et al. “A Large Scale Investigation of Obfuscation Use in Google Play.” <i>Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, ACM, 2018, pp. 222–235, doi:<a href=\"https://doi.org/10.1145/3274694.3274726\">10.1145/3274694.3274726</a>.","bibtex":"@inproceedings{Wermke_Huaman_Acar_Reaves_Traynor_Fahl_2018, title={A Large Scale Investigation of Obfuscation Use in Google Play}, DOI={<a href=\"https://doi.org/10.1145/3274694.3274726\">10.1145/3274694.3274726</a>}, booktitle={Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018}, publisher={ACM}, author={Wermke, Dominik and Huaman, Nicolas and Acar, Yasemin and Reaves, Bradley and Traynor, Patrick and Fahl, Sascha}, year={2018}, pages={222–235} }"},"year":"2018","doi":"10.1145/3274694.3274726","title":"A Large Scale Investigation of Obfuscation Use in Google Play","date_created":"2023-09-22T12:51:58Z","author":[{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"last_name":"Huaman","full_name":"Huaman, Nicolas","first_name":"Nicolas"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"last_name":"Reaves","full_name":"Reaves, Bradley","first_name":"Bradley"},{"full_name":"Traynor, Patrick","last_name":"Traynor","first_name":"Patrick"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_updated":"2024-06-05T13:20:17Z","publisher":"ACM","status":"public","publication":"Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018","type":"conference","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47252"},{"extern":"1","language":[{"iso":"eng"}],"_id":"47249","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"status":"public","type":"conference","publication":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","title":"Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android","doi":"10.1145/3133956.3134059","date_updated":"2024-06-05T13:09:19Z","publisher":"ACM","date_created":"2023-09-22T12:50:32Z","author":[{"first_name":"Erik","last_name":"Derr","full_name":"Derr, Erik"},{"last_name":"Bugiel","full_name":"Bugiel, Sven","first_name":"Sven"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"}],"year":"2017","citation":{"bibtex":"@inproceedings{Derr_Bugiel_Fahl_Acar_Backes_2017, title={Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android}, DOI={<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>}, booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael}, year={2017} }","mla":"Derr, Erik, et al. “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2017, doi:<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>.","short":"E. Derr, S. Bugiel, S. Fahl, Y. Acar, M. Backes, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.","apa":"Derr, E., Bugiel, S., Fahl, S., Acar, Y., &#38; Backes, M. (2017). Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3133956.3134059\">https://doi.org/10.1145/3133956.3134059</a>","ama":"Derr E, Bugiel S, Fahl S, Acar Y, Backes M. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. In: <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>","ieee":"E. Derr, S. Bugiel, S. Fahl, Y. Acar, and M. Backes, “Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android,” 2017, doi: <a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>.","chicago":"Derr, Erik, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes. “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2017. <a href=\"https://doi.org/10.1145/3133956.3134059\">https://doi.org/10.1145/3133956.3134059</a>."},"publication_status":"published"},{"issue":"2","year":"2017","intvolume":"        15","page":"50–60","citation":{"ama":"Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. How Internet Resources Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur Priv</i>. 2017;15(2):50–60. doi:<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>","ieee":"Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “How Internet Resources Might Be Helping You Develop Faster but Less Securely,” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, pp. 50–60, 2017, doi: <a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>.","chicago":"Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. “How Internet Resources Might Be Helping You Develop Faster but Less Securely.” <i>IEEE Secur. Priv.</i> 15, no. 2 (2017): 50–60. <a href=\"https://doi.org/10.1109/MSP.2017.24\">https://doi.org/10.1109/MSP.2017.24</a>.","apa":"Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C. (2017). How Internet Resources Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur. Priv.</i>, <i>15</i>(2), 50–60. <a href=\"https://doi.org/10.1109/MSP.2017.24\">https://doi.org/10.1109/MSP.2017.24</a>","bibtex":"@article{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2017, title={How Internet Resources Might Be Helping You Develop Faster but Less Securely}, volume={15}, DOI={<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>}, number={2}, journal={IEEE Secur. Priv.}, author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017}, pages={50–60} }","mla":"Acar, Yasemin, et al. “How Internet Resources Might Be Helping You Develop Faster but Less Securely.” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, 2017, pp. 50–60, doi:<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>.","short":"Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, IEEE Secur. Priv. 15 (2017) 50–60."},"date_updated":"2024-06-05T13:09:42Z","volume":15,"date_created":"2023-09-22T13:39:01Z","author":[{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"first_name":"Doowon","full_name":"Kim, Doowon","last_name":"Kim"},{"full_name":"Mazurek, Michelle L.","last_name":"Mazurek","first_name":"Michelle L."},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"}],"title":"How Internet Resources Might Be Helping You Develop Faster but Less Securely","doi":"10.1109/MSP.2017.24","publication":"IEEE Secur. Priv.","type":"journal_article","status":"public","_id":"47309","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"extern":"1"},{"publication":"10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017","type":"conference","status":"public","editor":[{"last_name":"Fernandez","full_name":"Fernandez, José M.","first_name":"José M."},{"first_name":"Mathias","last_name":"Payer","full_name":"Payer, Mathias"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47245","extern":"1","language":[{"iso":"eng"}],"citation":{"apa":"Stransky, C., Acar, Y., Nguyen, D. C., Wermke, D., Kim, D., Redmiles, E. M., Backes, M., Garfinkel, S. L., Mazurek, M. L., &#38; Fahl, S. (2017). Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. In J. M. Fernandez &#38; M. Payer (Eds.), <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association.","bibtex":"@inproceedings{Stransky_Acar_Nguyen_Wermke_Kim_Redmiles_Backes_Garfinkel_Mazurek_Fahl_2017, title={Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers}, booktitle={10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017}, publisher={USENIX Association}, author={Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Kim, Doowon and Redmiles, Elissa M. and Backes, Michael and Garfinkel, Simson L. and Mazurek, Michelle L. and Fahl, Sascha}, editor={Fernandez, José M. and Payer, Mathias}, year={2017} }","mla":"Stransky, Christian, et al. “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.” <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer, USENIX Association, 2017.","short":"C. Stransky, Y. Acar, D.C. Nguyen, D. Wermke, D. Kim, E.M. Redmiles, M. Backes, S.L. Garfinkel, M.L. Mazurek, S. Fahl, in: J.M. Fernandez, M. Payer (Eds.), 10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017, USENIX Association, 2017.","ama":"Stransky C, Acar Y, Nguyen DC, et al. Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. In: Fernandez JM, Payer M, eds. <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association; 2017.","ieee":"C. Stransky <i>et al.</i>, “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers,” in <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, 2017.","chicago":"Stransky, Christian, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, and Sascha Fahl. “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.” In <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer. USENIX Association, 2017."},"year":"2017","date_created":"2023-09-22T12:47:30Z","author":[{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"full_name":"Nguyen, Duc Cuong","last_name":"Nguyen","first_name":"Duc Cuong"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"last_name":"Kim","full_name":"Kim, Doowon","first_name":"Doowon"},{"full_name":"Redmiles, Elissa M.","last_name":"Redmiles","first_name":"Elissa M."},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"},{"first_name":"Simson L.","full_name":"Garfinkel, Simson L.","last_name":"Garfinkel"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"publisher":"USENIX Association","date_updated":"2024-06-05T13:12:04Z","title":"Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers"},{"year":"2017","citation":{"apa":"Fischer, F., Böttinger, K., Xiao, H., Stransky, C., Acar, Y., Backes, M., &#38; Fahl, S. (2017). Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security. <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. <a href=\"https://doi.org/10.1109/SP.2017.31\">https://doi.org/10.1109/SP.2017.31</a>","short":"F. Fischer, K. Böttinger, H. Xiao, C. Stransky, Y. Acar, M. Backes, S. Fahl, in: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, IEEE Computer Society, 2017, pp. 121–136.","bibtex":"@inproceedings{Fischer_Böttinger_Xiao_Stransky_Acar_Backes_Fahl_2017, title={Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security}, DOI={<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>}, booktitle={2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017}, publisher={IEEE Computer Society}, author={Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha}, year={2017}, pages={121–136} }","mla":"Fischer, Felix, et al. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security.” <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, IEEE Computer Society, 2017, pp. 121–136, doi:<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>.","ama":"Fischer F, Böttinger K, Xiao H, et al. Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security. In: <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>. IEEE Computer Society; 2017:121–136. doi:<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>","chicago":"Fischer, Felix, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, and Sascha Fahl. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security.” In <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. IEEE Computer Society, 2017. <a href=\"https://doi.org/10.1109/SP.2017.31\">https://doi.org/10.1109/SP.2017.31</a>.","ieee":"F. Fischer <i>et al.</i>, “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security,” in <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 2017, pp. 121–136, doi: <a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>."},"page":"121–136","title":"Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security","doi":"10.1109/SP.2017.31","date_updated":"2024-06-05T13:12:27Z","publisher":"IEEE Computer Society","date_created":"2023-09-22T12:43:27Z","author":[{"full_name":"Fischer, Felix","last_name":"Fischer","first_name":"Felix"},{"first_name":"Konstantin","last_name":"Böttinger","full_name":"Böttinger, Konstantin"},{"last_name":"Xiao","full_name":"Xiao, Huang","first_name":"Huang"},{"first_name":"Christian","last_name":"Stransky","full_name":"Stransky, Christian"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"last_name":"Backes","full_name":"Backes, Michael","first_name":"Michael"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"status":"public","type":"conference","publication":"2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017","language":[{"iso":"eng"}],"extern":"1","_id":"47243","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}]},{"date_updated":"2024-06-05T13:12:56Z","publisher":"ACM","author":[{"full_name":"Nguyen, Duc Cuong","last_name":"Nguyen","first_name":"Duc Cuong"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"},{"first_name":"Charles","last_name":"Weir","full_name":"Weir, Charles"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T12:50:51Z","title":"A Stitch in Time: Supporting Android Developers in Writing Secure Code","doi":"10.1145/3133956.3133977","publication_status":"published","year":"2017","citation":{"apa":"Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., &#38; Fahl, S. (2017). A Stitch in Time: Supporting Android Developers in Writing Secure Code. <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3133956.3133977\">https://doi.org/10.1145/3133956.3133977</a>","short":"D.C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, S. Fahl, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.","bibtex":"@inproceedings{Nguyen_Wermke_Acar_Backes_Weir_Fahl_2017, title={A Stitch in Time: Supporting Android Developers in Writing Secure Code}, DOI={<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>}, booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles and Fahl, Sascha}, year={2017} }","mla":"Nguyen, Duc Cuong, et al. “A Stitch in Time: Supporting Android Developers in Writing Secure Code.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2017, doi:<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>.","ama":"Nguyen DC, Wermke D, Acar Y, Backes M, Weir C, Fahl S. A Stitch in Time: Supporting Android Developers in Writing Secure Code. In: <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>","chicago":"Nguyen, Duc Cuong, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, and Sascha Fahl. “A Stitch in Time: Supporting Android Developers in Writing Secure Code.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2017. <a href=\"https://doi.org/10.1145/3133956.3133977\">https://doi.org/10.1145/3133956.3133977</a>.","ieee":"D. C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, and S. Fahl, “A Stitch in Time: Supporting Android Developers in Writing Secure Code,” 2017, doi: <a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>."},"_id":"47250","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","status":"public"},{"publication":"2017 IEEE Cybersecurity Development (SecDev)","type":"conference","status":"public","_id":"47248","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"extern":"1","publication_status":"published","year":"2017","citation":{"ieee":"Y. Acar, C. Stransky, D. Wermke, C. Weir, M. L. Mazurek, and S. Fahl, “Developers Need Support, Too: A Survey of Security Advice for Software Developers,” 2017, doi: <a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>.","chicago":"Acar, Yasemin, Christian Stransky, Dominik Wermke, Charles Weir, Michelle L. Mazurek, and Sascha Fahl. “Developers Need Support, Too: A Survey of Security Advice for Software Developers.” In <i>2017 IEEE Cybersecurity Development (SecDev)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/secdev.2017.17\">https://doi.org/10.1109/secdev.2017.17</a>.","ama":"Acar Y, Stransky C, Wermke D, Weir C, Mazurek ML, Fahl S. Developers Need Support, Too: A Survey of Security Advice for Software Developers. In: <i>2017 IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>","short":"Y. Acar, C. Stransky, D. Wermke, C. Weir, M.L. Mazurek, S. Fahl, in: 2017 IEEE Cybersecurity Development (SecDev), IEEE, 2017.","mla":"Acar, Yasemin, et al. “Developers Need Support, Too: A Survey of Security Advice for Software Developers.” <i>2017 IEEE Cybersecurity Development (SecDev)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>.","bibtex":"@inproceedings{Acar_Stransky_Wermke_Weir_Mazurek_Fahl_2017, title={Developers Need Support, Too: A Survey of Security Advice for Software Developers}, DOI={<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>}, booktitle={2017 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Weir, Charles and Mazurek, Michelle L. and Fahl, Sascha}, year={2017} }","apa":"Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M. L., &#38; Fahl, S. (2017). Developers Need Support, Too: A Survey of Security Advice for Software Developers. <i>2017 IEEE Cybersecurity Development (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev.2017.17\">https://doi.org/10.1109/secdev.2017.17</a>"},"publisher":"IEEE","date_updated":"2024-06-05T13:11:41Z","author":[{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"last_name":"Stransky","full_name":"Stransky, Christian","first_name":"Christian"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"last_name":"Weir","full_name":"Weir, Charles","first_name":"Charles"},{"first_name":"Michelle L.","full_name":"Mazurek, Michelle L.","last_name":"Mazurek"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T12:50:12Z","title":"Developers Need Support, Too: A Survey of Security Advice for Software Developers","doi":"10.1109/secdev.2017.17"},{"doi":"10.1109/secdev.2016.013","title":"You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users","date_created":"2023-09-22T12:42:23Z","author":[{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."}],"publisher":"IEEE","date_updated":"2024-06-05T13:13:34Z","citation":{"ama":"Acar Y, Fahl S, Mazurek ML. You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. In: <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>","ieee":"Y. Acar, S. Fahl, and M. L. Mazurek, “You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users,” 2017, doi: <a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>.","chicago":"Acar, Yasemin, Sascha Fahl, and Michelle L. Mazurek. “You Are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.” In <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/secdev.2016.013\">https://doi.org/10.1109/secdev.2016.013</a>.","apa":"Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. <i>2016 IEEE Cybersecurity Development (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev.2016.013\">https://doi.org/10.1109/secdev.2016.013</a>","mla":"Acar, Yasemin, et al. “You Are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.” <i>2016 IEEE Cybersecurity Development (SecDev)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>.","bibtex":"@inproceedings{Acar_Fahl_Mazurek_2017, title={You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users}, DOI={<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>}, booktitle={2016 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }","short":"Y. Acar, S. Fahl, M.L. Mazurek, in: 2016 IEEE Cybersecurity Development (SecDev), IEEE, 2017."},"year":"2017","publication_status":"published","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47242","status":"public","publication":"2016 IEEE Cybersecurity Development (SecDev)","type":"conference"}]
