@inproceedings{47233,
  author       = {{Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin}},
  booktitle    = {{Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}},
  publisher    = {{ACM}},
  title        = {{{VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits}}},
  doi          = {{10.1145/2810103.2813604}},
  year         = {{2015}},
}

@inproceedings{47232,
  author       = {{Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha}},
  booktitle    = {{24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015}},
  editor       = {{Jung, Jaeyeon and Holz, Thorsten}},
  pages        = {{239–254}},
  publisher    = {{USENIX Association}},
  title        = {{{To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections}}},
  year         = {{2015}},
}

@inproceedings{47162,
  author       = {{Fahl, Sascha and Acar, Yasemin and Perl, Henning and Smith, Matthew}},
  booktitle    = {{Proceedings of the 9th ACM symposium on Information, computer and communications security}},
  publisher    = {{ACM}},
  title        = {{{Why eve and mallory (also) love webmasters}}},
  doi          = {{10.1145/2590296.2590341}},
  year         = {{2014}},
}

@inproceedings{47161,
  author       = {{Fahl, Sascha and Harbach, Marian and Acar, Yasemin and Smith, Matthew}},
  booktitle    = {{Proceedings of the Ninth Symposium on Usable Privacy and Security}},
  publisher    = {{ACM}},
  title        = {{{On the ecological validity of a password study}}},
  doi          = {{10.1145/2501604.2501617}},
  year         = {{2013}},
}

