@inproceedings{47879,
  author       = {{Haney, Julie and Furman, Susanne and Acar, Yasemin}},
  publisher    = {{International Conference on Human-Computer Interaction, Copenhagen, -1}},
  title        = {{{Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}}},
  year         = {{2020}},
}

@inproceedings{47253,
  author       = {{Wu, Yuxi and Gupta, Panya and Wei, Miranda and Acar, Yasemin and Fahl, Sascha and Ur, Blase}},
  booktitle    = {{Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18}},
  publisher    = {{ACM Press}},
  title        = {{{Your Secrets Are Safe}}},
  doi          = {{10.1145/3178876.3186088}},
  year         = {{2018}},
}

@inproceedings{47255,
  author       = {{Haney, Julie M. and Theofanos, Mary and Acar, Yasemin and Prettyman, Sandra Spickard}},
  booktitle    = {{Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018}},
  editor       = {{Zurko, Mary Ellen and Lipford, Heather Richter}},
  pages        = {{357–373}},
  publisher    = {{USENIX Association}},
  title        = {{{"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products}}},
  year         = {{2018}},
}

@techreport{47876,
  author       = {{Haney, Julie and Theofanos, Mary and Acar, Yasemin and Prettyman, Sandra Spickard}},
  publisher    = {{National Institute of Standards and Technology}},
  title        = {{{Organizational views of NIST cryptographic standards and testing and validation programs}}},
  doi          = {{10.6028/nist.ir.8241}},
  year         = {{2018}},
}

@inproceedings{47256,
  author       = {{Gorski, Peter Leo and Iacono, Luigi Lo and Wermke, Dominik and Stransky, Christian and Möller, Sebastian and Acar, Yasemin and Fahl, Sascha}},
  booktitle    = {{Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018}},
  editor       = {{Zurko, Mary Ellen and Lipford, Heather Richter}},
  pages        = {{265–281}},
  publisher    = {{USENIX Association}},
  title        = {{{Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse}}},
  year         = {{2018}},
}

@inproceedings{47254,
  author       = {{Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael}},
  booktitle    = {{2018 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators}}},
  doi          = {{10.1109/sp.2018.00005}},
  year         = {{2018}},
}

@inproceedings{47252,
  author       = {{Wermke, Dominik and Huaman, Nicolas and Acar, Yasemin and Reaves, Bradley and Traynor, Patrick and Fahl, Sascha}},
  booktitle    = {{Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018}},
  pages        = {{222–235}},
  publisher    = {{ACM}},
  title        = {{{A Large Scale Investigation of Obfuscation Use in Google Play}}},
  doi          = {{10.1145/3274694.3274726}},
  year         = {{2018}},
}

@inproceedings{47249,
  author       = {{Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael}},
  booktitle    = {{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}},
  publisher    = {{ACM}},
  title        = {{{Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android}}},
  doi          = {{10.1145/3133956.3134059}},
  year         = {{2017}},
}

@article{47309,
  author       = {{Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}},
  journal      = {{IEEE Secur. Priv.}},
  number       = {{2}},
  pages        = {{50–60}},
  title        = {{{How Internet Resources Might Be Helping You Develop Faster but Less Securely}}},
  doi          = {{10.1109/MSP.2017.24}},
  volume       = {{15}},
  year         = {{2017}},
}

@inproceedings{47245,
  author       = {{Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Kim, Doowon and Redmiles, Elissa M. and Backes, Michael and Garfinkel, Simson L. and Mazurek, Michelle L. and Fahl, Sascha}},
  booktitle    = {{10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017}},
  editor       = {{Fernandez, José M. and Payer, Mathias}},
  publisher    = {{USENIX Association}},
  title        = {{{Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers}}},
  year         = {{2017}},
}

@inproceedings{47243,
  author       = {{Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha}},
  booktitle    = {{2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017}},
  pages        = {{121–136}},
  publisher    = {{IEEE Computer Society}},
  title        = {{{Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security}}},
  doi          = {{10.1109/SP.2017.31}},
  year         = {{2017}},
}

@inproceedings{47250,
  author       = {{Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles and Fahl, Sascha}},
  booktitle    = {{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}},
  publisher    = {{ACM}},
  title        = {{{A Stitch in Time: Supporting Android Developers in Writing Secure Code}}},
  doi          = {{10.1145/3133956.3133977}},
  year         = {{2017}},
}

@inproceedings{47248,
  author       = {{Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Weir, Charles and Mazurek, Michelle L. and Fahl, Sascha}},
  booktitle    = {{2017 IEEE Cybersecurity Development (SecDev)}},
  publisher    = {{IEEE}},
  title        = {{{Developers Need Support, Too: A Survey of Security Advice for Software Developers}}},
  doi          = {{10.1109/secdev.2017.17}},
  year         = {{2017}},
}

@inproceedings{47242,
  author       = {{Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}},
  booktitle    = {{2016 IEEE Cybersecurity Development (SecDev)}},
  publisher    = {{IEEE}},
  title        = {{{You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users}}},
  doi          = {{10.1109/secdev.2016.013}},
  year         = {{2017}},
}

@inproceedings{47246,
  author       = {{Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}},
  booktitle    = {{2017 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{Comparing the Usability of Cryptographic APIs}}},
  doi          = {{10.1109/sp.2017.52}},
  year         = {{2017}},
}

@inproceedings{47244,
  author       = {{Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle L. and Fahl, Sascha}},
  booktitle    = {{Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017}},
  pages        = {{81–95}},
  publisher    = {{USENIX Association}},
  title        = {{{Security Developer Studies with GitHub Users: Exploring a Convenience Sample}}},
  year         = {{2017}},
}

@techreport{47873,
  author       = {{Redmiles, Elissa M. and Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}},
  publisher    = {{University of Maryland Computer Science Department}},
  title        = {{{A Summary of Survey Methodology Best Practices for Security and Privacy Researchers}}},
  doi          = {{10.13016/M22K2W}},
  year         = {{2017}},
}

@inproceedings{47240,
  author       = {{Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew}},
  booktitle    = {{2016 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{SoK: Lessons Learned from Android Security Research for Appified Software Platforms}}},
  doi          = {{10.1109/sp.2016.33}},
  year         = {{2016}},
}

@inproceedings{47239,
  author       = {{Dechand, Sergej and Schürmann, Dominik and Busse, Karoline and Acar, Yasemin and Fahl, Sascha and Smith, Matthew}},
  booktitle    = {{25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016}},
  editor       = {{Holz, Thorsten and Savage, Stefan}},
  pages        = {{193–208}},
  publisher    = {{USENIX Association}},
  title        = {{{An Empirical Study of Textual Key-Fingerprint Representations}}},
  year         = {{2016}},
}

@inproceedings{47241,
  author       = {{Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}},
  booktitle    = {{2016 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{You Get Where You're Looking for: The Impact of Information Sources on Code Security}}},
  doi          = {{10.1109/sp.2016.25}},
  year         = {{2016}},
}

