[{"_id":"62738","user_id":"58331","keyword":["software vulnerabilities","vulnerability disclosure","security research"],"language":[{"iso":"eng"}],"publication":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","abstract":[{"lang":"eng","text":"Vulnerability disclosures are necessary to improve the security of our digital ecosystem. However, they can also be challenging for researchers: it may be hard to find out who the affected parties even are, or how to contact them. Researchers may be ignored or face adversity when disclosing vulnerabilities. We investigate researchers' experiences with vulnerability disclosures, extract best practices, and make recommendations for researchers, institutions that employ them, industry, and regulators to enable effective vulnerability disclosures."}],"status":"public","date_updated":"2025-12-02T08:54:18Z","oa":"1","publisher":"ACM","author":[{"orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","id":"99000","full_name":"Sri Ramulu, Harshini","first_name":"Harshini"},{"first_name":"Anna Lena","full_name":"Rotthaler, Anna Lena","id":"97843","last_name":"Rotthaler"},{"full_name":"Rossel, Jost","id":"58331","last_name":"Rossel","orcid":"0000-0002-3182-4059","first_name":"Jost"},{"full_name":"Gonzalez Rodriguez, Rachel","last_name":"Gonzalez Rodriguez","first_name":"Rachel"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"last_name":"Kohno","full_name":"Kohno, Tadayoshi","first_name":"Tadayoshi"},{"full_name":"Somorovsky, Juraj","id":"83504","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","first_name":"Juraj"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"}],"date_created":"2025-12-02T08:48:00Z","title":"Poster: Computer Security Researchers' Experiences with Vulnerability Disclosures","conference":{"start_date":"2025-10-13","end_date":"2025-10-17"},"doi":"10.1145/3719027.3760723","main_file_link":[{"open_access":"1","url":"https://dl.acm.org/doi/10.1145/3719027.3760723"}],"publication_status":"published","year":"2025","citation":{"ama":"Sri Ramulu H, Rotthaler AL, Rossel J, et al. Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures. In: <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2025. doi:<a href=\"https://doi.org/10.1145/3719027.3760723\">10.1145/3719027.3760723</a>","ieee":"H. Sri Ramulu <i>et al.</i>, “Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures,” 2025, doi: <a href=\"https://doi.org/10.1145/3719027.3760723\">10.1145/3719027.3760723</a>.","chicago":"Sri Ramulu, Harshini, Anna Lena Rotthaler, Jost Rossel, Rachel Gonzalez Rodriguez, Dominik Wermke, Sascha Fahl, Tadayoshi Kohno, Juraj Somorovsky, and Yasemin Acar. “Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures.” In <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2025. <a href=\"https://doi.org/10.1145/3719027.3760723\">https://doi.org/10.1145/3719027.3760723</a>.","apa":"Sri Ramulu, H., Rotthaler, A. L., Rossel, J., Gonzalez Rodriguez, R., Wermke, D., Fahl, S., Kohno, T., Somorovsky, J., &#38; Acar, Y. (2025). Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures. <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3719027.3760723\">https://doi.org/10.1145/3719027.3760723</a>","bibtex":"@inproceedings{Sri Ramulu_Rotthaler_Rossel_Gonzalez Rodriguez_Wermke_Fahl_Kohno_Somorovsky_Acar_2025, title={Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures}, DOI={<a href=\"https://doi.org/10.1145/3719027.3760723\">10.1145/3719027.3760723</a>}, booktitle={Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Sri Ramulu, Harshini and Rotthaler, Anna Lena and Rossel, Jost and Gonzalez Rodriguez, Rachel and Wermke, Dominik and Fahl, Sascha and Kohno, Tadayoshi and Somorovsky, Juraj and Acar, Yasemin}, year={2025} }","short":"H. Sri Ramulu, A.L. Rotthaler, J. Rossel, R. Gonzalez Rodriguez, D. Wermke, S. Fahl, T. Kohno, J. Somorovsky, Y. Acar, in: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2025.","mla":"Sri Ramulu, Harshini, et al. “Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures.” <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2025, doi:<a href=\"https://doi.org/10.1145/3719027.3760723\">10.1145/3719027.3760723</a>."}},{"publication":"Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024","type":"conference","editor":[{"last_name":"Mueller","full_name":"Mueller, Florian ’Floyd’","first_name":"Florian ’Floyd’"},{"last_name":"Kyburz","full_name":"Kyburz, Penny","first_name":"Penny"},{"full_name":"Williamson, Julie R.","last_name":"Williamson","first_name":"Julie R."},{"first_name":"Corina","full_name":"Sas, Corina","last_name":"Sas"},{"full_name":"Wilson, Max L.","last_name":"Wilson","first_name":"Max L."},{"first_name":"Phoebe O. Toups","full_name":"Dugas, Phoebe O. Toups","last_name":"Dugas"},{"full_name":"Shklovski, Irina","last_name":"Shklovski","first_name":"Irina"}],"status":"public","_id":"54863","department":[{"_id":"740"}],"user_id":"15458","language":[{"iso":"eng"}],"year":"2024","page":"574:1–574:16","citation":{"chicago":"Schmüser, Juliane, Harshini Sri Ramulu, Noah Wöhler, Christian Stransky, Felix Bensmann, Dimitar Dimitrov, Sebastian Schellhammer, et al. “Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter.” In <i>Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024</i>, edited by Florian ’Floyd’ Mueller, Penny Kyburz, Julie R. Williamson, Corina Sas, Max L. Wilson, Phoebe O. Toups Dugas, and Irina Shklovski, 574:1–574:16. ACM, 2024. <a href=\"https://doi.org/10.1145/3613904.3642826\">https://doi.org/10.1145/3613904.3642826</a>.","ieee":"J. Schmüser <i>et al.</i>, “Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter,” in <i>Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024</i>, 2024, p. 574:1–574:16, doi: <a href=\"https://doi.org/10.1145/3613904.3642826\">10.1145/3613904.3642826</a>.","ama":"Schmüser J, Ramulu HS, Wöhler N, et al. Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter. In: Mueller F ’Floyd’, Kyburz P, Williamson JR, et al., eds. <i>Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024</i>. ACM; 2024:574:1–574:16. doi:<a href=\"https://doi.org/10.1145/3613904.3642826\">10.1145/3613904.3642826</a>","bibtex":"@inproceedings{Schmüser_Ramulu_Wöhler_Stransky_Bensmann_Dimitrov_Schellhammer_Wermke_Dietze_Acar_et al._2024, title={Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter}, DOI={<a href=\"https://doi.org/10.1145/3613904.3642826\">10.1145/3613904.3642826</a>}, booktitle={Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024}, publisher={ACM}, author={Schmüser, Juliane and Ramulu, Harshini Sri and Wöhler, Noah and Stransky, Christian and Bensmann, Felix and Dimitrov, Dimitar and Schellhammer, Sebastian and Wermke, Dominik and Dietze, Stefan and Acar, Yasemin and et al.}, editor={Mueller, Florian ’Floyd’ and Kyburz, Penny and Williamson, Julie R. and Sas, Corina and Wilson, Max L. and Dugas, Phoebe O. Toups and Shklovski, Irina}, year={2024}, pages={574:1–574:16} }","short":"J. Schmüser, H.S. Ramulu, N. Wöhler, C. Stransky, F. Bensmann, D. Dimitrov, S. Schellhammer, D. Wermke, S. Dietze, Y. Acar, S. Fahl, in: F. ’Floyd’ Mueller, P. Kyburz, J.R. Williamson, C. Sas, M.L. Wilson, P.O.T. Dugas, I. Shklovski (Eds.), Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024, ACM, 2024, p. 574:1–574:16.","mla":"Schmüser, Juliane, et al. “Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter.” <i>Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024</i>, edited by Florian ’Floyd’ Mueller et al., ACM, 2024, p. 574:1–574:16, doi:<a href=\"https://doi.org/10.1145/3613904.3642826\">10.1145/3613904.3642826</a>.","apa":"Schmüser, J., Ramulu, H. S., Wöhler, N., Stransky, C., Bensmann, F., Dimitrov, D., Schellhammer, S., Wermke, D., Dietze, S., Acar, Y., &#38; Fahl, S. (2024). Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter. In F. ’Floyd’ Mueller, P. Kyburz, J. R. Williamson, C. Sas, M. L. Wilson, P. O. T. Dugas, &#38; I. Shklovski (Eds.), <i>Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024</i> (p. 574:1–574:16). ACM. <a href=\"https://doi.org/10.1145/3613904.3642826\">https://doi.org/10.1145/3613904.3642826</a>"},"date_updated":"2024-06-24T08:27:55Z","publisher":"ACM","author":[{"first_name":"Juliane","full_name":"Schmüser, Juliane","last_name":"Schmüser"},{"full_name":"Ramulu, Harshini Sri","last_name":"Ramulu","first_name":"Harshini Sri"},{"last_name":"Wöhler","full_name":"Wöhler, Noah","first_name":"Noah"},{"first_name":"Christian","last_name":"Stransky","full_name":"Stransky, Christian"},{"first_name":"Felix","last_name":"Bensmann","full_name":"Bensmann, Felix"},{"last_name":"Dimitrov","full_name":"Dimitrov, Dimitar","first_name":"Dimitar"},{"last_name":"Schellhammer","full_name":"Schellhammer, Sebastian","first_name":"Sebastian"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"first_name":"Stefan","full_name":"Dietze, Stefan","last_name":"Dietze"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2024-06-24T08:23:26Z","title":"Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter","doi":"10.1145/3613904.3642826"},{"status":"public","type":"conference","publication":"Proceedings of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20, 2024","language":[{"iso":"eng"}],"_id":"54862","user_id":"15458","department":[{"_id":"740"}],"year":"2024","citation":{"ama":"Boughton L, Miller C, Acar Y, Wermke D, Kästner C. Decomposing and Measuring Trust in Open-Source Software Supply Chains. In: <i>Proceedings of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20, 2024</i>. ACM; 2024:57–61. doi:<a href=\"https://doi.org/10.1145/3639476.3639775\">10.1145/3639476.3639775</a>","ieee":"L. Boughton, C. Miller, Y. Acar, D. Wermke, and C. Kästner, “Decomposing and Measuring Trust in Open-Source Software Supply Chains,” in <i>Proceedings of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20, 2024</i>, 2024, pp. 57–61, doi: <a href=\"https://doi.org/10.1145/3639476.3639775\">10.1145/3639476.3639775</a>.","chicago":"Boughton, Lina, Courtney Miller, Yasemin Acar, Dominik Wermke, and Christian Kästner. “Decomposing and Measuring Trust in Open-Source Software Supply Chains.” In <i>Proceedings of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20, 2024</i>, 57–61. ACM, 2024. <a href=\"https://doi.org/10.1145/3639476.3639775\">https://doi.org/10.1145/3639476.3639775</a>.","mla":"Boughton, Lina, et al. “Decomposing and Measuring Trust in Open-Source Software Supply Chains.” <i>Proceedings of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20, 2024</i>, ACM, 2024, pp. 57–61, doi:<a href=\"https://doi.org/10.1145/3639476.3639775\">10.1145/3639476.3639775</a>.","bibtex":"@inproceedings{Boughton_Miller_Acar_Wermke_Kästner_2024, title={Decomposing and Measuring Trust in Open-Source Software Supply Chains}, DOI={<a href=\"https://doi.org/10.1145/3639476.3639775\">10.1145/3639476.3639775</a>}, booktitle={Proceedings of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20, 2024}, publisher={ACM}, author={Boughton, Lina and Miller, Courtney and Acar, Yasemin and Wermke, Dominik and Kästner, Christian}, year={2024}, pages={57–61} }","short":"L. Boughton, C. Miller, Y. Acar, D. Wermke, C. Kästner, in: Proceedings of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20, 2024, ACM, 2024, pp. 57–61.","apa":"Boughton, L., Miller, C., Acar, Y., Wermke, D., &#38; Kästner, C. (2024). Decomposing and Measuring Trust in Open-Source Software Supply Chains. <i>Proceedings of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20, 2024</i>, 57–61. <a href=\"https://doi.org/10.1145/3639476.3639775\">https://doi.org/10.1145/3639476.3639775</a>"},"page":"57–61","title":"Decomposing and Measuring Trust in Open-Source Software Supply Chains","doi":"10.1145/3639476.3639775","publisher":"ACM","date_updated":"2024-06-24T08:28:17Z","date_created":"2024-06-24T08:21:50Z","author":[{"first_name":"Lina","full_name":"Boughton, Lina","last_name":"Boughton"},{"first_name":"Courtney","full_name":"Miller, Courtney","last_name":"Miller"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"Christian","last_name":"Kästner","full_name":"Kästner, Christian"}]},{"status":"public","publication":"Proc. Priv. Enhancing Technol.","type":"journal_article","language":[{"iso":"eng"}],"_id":"54864","department":[{"_id":"740"}],"user_id":"15458","year":"2024","intvolume":"      2024","page":"151–170","citation":{"short":"S.A. Horstmann, S. Domiks, M. Gutfleisch, M. Tran, Y. Acar, V. Moonsamy, A. Naiakshina, Proc. Priv. Enhancing Technol. 2024 (2024) 151–170.","mla":"Horstmann, Stefan Albert, et al. “‘Those Things Are Written by Lawyers, and Programmers Are Reading That.’ Mapping the Communication Gap Between Software Developers and Privacy Experts.” <i>Proc. Priv. Enhancing Technol.</i>, vol. 2024, no. 1, 2024, pp. 151–170, doi:<a href=\"https://doi.org/10.56553/POPETS-2024-0010\">10.56553/POPETS-2024-0010</a>.","bibtex":"@article{Horstmann_Domiks_Gutfleisch_Tran_Acar_Moonsamy_Naiakshina_2024, title={“Those things are written by lawyers, and programmers are reading that.” Mapping the Communication Gap Between Software Developers and Privacy Experts}, volume={2024}, DOI={<a href=\"https://doi.org/10.56553/POPETS-2024-0010\">10.56553/POPETS-2024-0010</a>}, number={1}, journal={Proc. Priv. Enhancing Technol.}, author={Horstmann, Stefan Albert and Domiks, Samuel and Gutfleisch, Marco and Tran, Mindy and Acar, Yasemin and Moonsamy, Veelasha and Naiakshina, Alena}, year={2024}, pages={151–170} }","apa":"Horstmann, S. A., Domiks, S., Gutfleisch, M., Tran, M., Acar, Y., Moonsamy, V., &#38; Naiakshina, A. (2024). “Those things are written by lawyers, and programmers are reading that.” Mapping the Communication Gap Between Software Developers and Privacy Experts. <i>Proc. Priv. Enhancing Technol.</i>, <i>2024</i>(1), 151–170. <a href=\"https://doi.org/10.56553/POPETS-2024-0010\">https://doi.org/10.56553/POPETS-2024-0010</a>","ama":"Horstmann SA, Domiks S, Gutfleisch M, et al. “Those things are written by lawyers, and programmers are reading that.” Mapping the Communication Gap Between Software Developers and Privacy Experts. <i>Proc Priv Enhancing Technol</i>. 2024;2024(1):151–170. doi:<a href=\"https://doi.org/10.56553/POPETS-2024-0010\">10.56553/POPETS-2024-0010</a>","ieee":"S. A. Horstmann <i>et al.</i>, “‘Those things are written by lawyers, and programmers are reading that.’ Mapping the Communication Gap Between Software Developers and Privacy Experts,” <i>Proc. Priv. Enhancing Technol.</i>, vol. 2024, no. 1, pp. 151–170, 2024, doi: <a href=\"https://doi.org/10.56553/POPETS-2024-0010\">10.56553/POPETS-2024-0010</a>.","chicago":"Horstmann, Stefan Albert, Samuel Domiks, Marco Gutfleisch, Mindy Tran, Yasemin Acar, Veelasha Moonsamy, and Alena Naiakshina. “‘Those Things Are Written by Lawyers, and Programmers Are Reading That.’ Mapping the Communication Gap Between Software Developers and Privacy Experts.” <i>Proc. Priv. Enhancing Technol.</i> 2024, no. 1 (2024): 151–170. <a href=\"https://doi.org/10.56553/POPETS-2024-0010\">https://doi.org/10.56553/POPETS-2024-0010</a>."},"issue":"1","title":"\"Those things are written by lawyers, and programmers are reading that.\" Mapping the Communication Gap Between Software Developers and Privacy Experts","doi":"10.56553/POPETS-2024-0010","date_updated":"2024-06-24T08:27:41Z","volume":2024,"date_created":"2024-06-24T08:25:24Z","author":[{"first_name":"Stefan Albert","last_name":"Horstmann","full_name":"Horstmann, Stefan Albert"},{"first_name":"Samuel","full_name":"Domiks, Samuel","last_name":"Domiks"},{"last_name":"Gutfleisch","full_name":"Gutfleisch, Marco","first_name":"Marco"},{"last_name":"Tran","full_name":"Tran, Mindy","first_name":"Mindy"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"last_name":"Moonsamy","full_name":"Moonsamy, Veelasha","first_name":"Veelasha"},{"first_name":"Alena","last_name":"Naiakshina","full_name":"Naiakshina, Alena"}]},{"date_updated":"2024-08-19T08:04:17Z","publisher":"USENIX Association","author":[{"first_name":"Sandra","last_name":"Höltervennhoff","full_name":"Höltervennhoff, Sandra"},{"last_name":"Wöhler","full_name":"Wöhler, Noah","first_name":"Noah"},{"last_name":"Möhle","full_name":"Möhle, Arne","first_name":"Arne"},{"full_name":"Oltrogge, Marten","last_name":"Oltrogge","first_name":"Marten"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Oliver","last_name":"Wiese","full_name":"Wiese, Oliver"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2024-08-19T08:02:52Z","title":"A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service","year":"2024","citation":{"mla":"Höltervennhoff, Sandra, et al. “A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service.” <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu, USENIX Association, 2024.","bibtex":"@inproceedings{Höltervennhoff_Wöhler_Möhle_Oltrogge_Acar_Wiese_Fahl_2024, title={A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service}, booktitle={33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher={USENIX Association}, author={Höltervennhoff, Sandra and Wöhler, Noah and Möhle, Arne and Oltrogge, Marten and Acar, Yasemin and Wiese, Oliver and Fahl, Sascha}, editor={Balzarotti, Davide and Xu, Wenyuan}, year={2024} }","short":"S. Höltervennhoff, N. Wöhler, A. Möhle, M. Oltrogge, Y. Acar, O. Wiese, S. Fahl, in: D. Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association, 2024.","apa":"Höltervennhoff, S., Wöhler, N., Möhle, A., Oltrogge, M., Acar, Y., Wiese, O., &#38; Fahl, S. (2024). A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service. In D. Balzarotti &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association.","chicago":"Höltervennhoff, Sandra, Noah Wöhler, Arne Möhle, Marten Oltrogge, Yasemin Acar, Oliver Wiese, and Sascha Fahl. “A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service.” In <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX Association, 2024.","ieee":"S. Höltervennhoff <i>et al.</i>, “A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service,” in <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, 2024.","ama":"Höltervennhoff S, Wöhler N, Möhle A, et al. A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service. In: Balzarotti D, Xu W, eds. <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association; 2024."},"_id":"55633","department":[{"_id":"740"}],"user_id":"15458","language":[{"iso":"eng"}],"publication":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","type":"conference","editor":[{"last_name":"Balzarotti","full_name":"Balzarotti, Davide","first_name":"Davide"},{"first_name":"Wenyuan","full_name":"Xu, Wenyuan","last_name":"Xu"}],"status":"public"},{"citation":{"ieee":"K. Fischer, I. Trummová, P. Gajland, Y. Acar, S. Fahl, and M. A. Sasse, “The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts,” in <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, 2024.","chicago":"Fischer, Konstantin, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, and M. Angela Sasse. “The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts.” In <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX Association, 2024.","ama":"Fischer K, Trummová I, Gajland P, Acar Y, Fahl S, Sasse MA. The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts. In: Balzarotti D, Xu W, eds. <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association; 2024.","short":"K. Fischer, I. Trummová, P. Gajland, Y. Acar, S. Fahl, M.A. Sasse, in: D. Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association, 2024.","bibtex":"@inproceedings{Fischer_Trummová_Gajland_Acar_Fahl_Sasse_2024, title={The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts}, booktitle={33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher={USENIX Association}, author={Fischer, Konstantin and Trummová, Ivana and Gajland, Phillip and Acar, Yasemin and Fahl, Sascha and Sasse, M. Angela}, editor={Balzarotti, Davide and Xu, Wenyuan}, year={2024} }","mla":"Fischer, Konstantin, et al. “The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts.” <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu, USENIX Association, 2024.","apa":"Fischer, K., Trummová, I., Gajland, P., Acar, Y., Fahl, S., &#38; Sasse, M. A. (2024). The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts. In D. Balzarotti &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association."},"year":"2024","date_created":"2024-08-19T07:56:08Z","author":[{"first_name":"Konstantin","last_name":"Fischer","full_name":"Fischer, Konstantin"},{"first_name":"Ivana","full_name":"Trummová, Ivana","last_name":"Trummová"},{"first_name":"Phillip","full_name":"Gajland, Phillip","last_name":"Gajland"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"first_name":"M. Angela","full_name":"Sasse, M. Angela","last_name":"Sasse"}],"publisher":"USENIX Association","date_updated":"2024-08-19T08:04:21Z","title":"The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts","publication":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","type":"conference","status":"public","editor":[{"first_name":"Davide","last_name":"Balzarotti","full_name":"Balzarotti, Davide"},{"first_name":"Wenyuan","last_name":"Xu","full_name":"Xu, Wenyuan"}],"department":[{"_id":"740"}],"user_id":"15458","_id":"55632","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"user_id":"15458","department":[{"_id":"740"}],"_id":"55634","status":"public","editor":[{"first_name":"Davide","full_name":"Balzarotti, Davide","last_name":"Balzarotti"},{"first_name":"Wenyuan","full_name":"Xu, Wenyuan","last_name":"Xu"}],"type":"conference","publication":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","title":"\"These results must be false\": A usability evaluation of constant-time analysis tools","author":[{"first_name":"Marcel","full_name":"Fourné, Marcel","last_name":"Fourné"},{"first_name":"Daniel De Almeida","full_name":"Braga, Daniel De Almeida","last_name":"Braga"},{"full_name":"Jancar, Jan","last_name":"Jancar","first_name":"Jan"},{"full_name":"Sabt, Mohamed","last_name":"Sabt","first_name":"Mohamed"},{"first_name":"Peter","last_name":"Schwabe","full_name":"Schwabe, Peter"},{"last_name":"Barthe","full_name":"Barthe, Gilles","first_name":"Gilles"},{"first_name":"Pierre-Alain","full_name":"Fouque, Pierre-Alain","last_name":"Fouque"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"}],"date_created":"2024-08-19T08:14:13Z","date_updated":"2024-08-19T08:25:10Z","publisher":"USENIX Association","citation":{"ieee":"M. Fourné <i>et al.</i>, “‘These results must be false’: A usability evaluation of constant-time analysis tools,” in <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, 2024.","chicago":"Fourné, Marcel, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘These Results Must Be False’: A Usability Evaluation of Constant-Time Analysis Tools.” In <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX Association, 2024.","ama":"Fourné M, Braga DDA, Jancar J, et al. “These results must be false”: A usability evaluation of constant-time analysis tools. In: Balzarotti D, Xu W, eds. <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association; 2024.","short":"M. Fourné, D.D.A. Braga, J. Jancar, M. Sabt, P. Schwabe, G. Barthe, P.-A. Fouque, Y. Acar, in: D. Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association, 2024.","bibtex":"@inproceedings{Fourné_Braga_Jancar_Sabt_Schwabe_Barthe_Fouque_Acar_2024, title={“These results must be false”: A usability evaluation of constant-time analysis tools}, booktitle={33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher={USENIX Association}, author={Fourné, Marcel and Braga, Daniel De Almeida and Jancar, Jan and Sabt, Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, editor={Balzarotti, Davide and Xu, Wenyuan}, year={2024} }","mla":"Fourné, Marcel, et al. “‘These Results Must Be False’: A Usability Evaluation of Constant-Time Analysis Tools.” <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu, USENIX Association, 2024.","apa":"Fourné, M., Braga, D. D. A., Jancar, J., Sabt, M., Schwabe, P., Barthe, G., Fouque, P.-A., &#38; Acar, Y. (2024). “These results must be false”: A usability evaluation of constant-time analysis tools. In D. Balzarotti &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association."},"year":"2024"},{"year":"2024","citation":{"ama":"Huaman N, Suray J, Klemmer JH, et al. “You have to read 50 different RFCs that contradict each other”: An Interview Study on the Experiences of Implementing Cryptographic Standards. In: Balzarotti D, Xu W, eds. <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association; 2024.","ieee":"N. Huaman <i>et al.</i>, “‘You have to read 50 different RFCs that contradict each other’: An Interview Study on the Experiences of Implementing Cryptographic Standards,” in <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, 2024.","chicago":"Huaman, Nicolas, Jacques Suray, Jan H. Klemmer, Marcel Fourné, Sabrina Amft, Ivana Trummová, Yasemin Acar, and Sascha Fahl. “‘You Have to Read 50 Different RFCs That Contradict Each Other’: An Interview Study on the Experiences of Implementing Cryptographic Standards.” In <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX Association, 2024.","bibtex":"@inproceedings{Huaman_Suray_Klemmer_Fourné_Amft_Trummová_Acar_Fahl_2024, title={“You have to read 50 different RFCs that contradict each other”: An Interview Study on the Experiences of Implementing Cryptographic Standards}, booktitle={33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher={USENIX Association}, author={Huaman, Nicolas and Suray, Jacques and Klemmer, Jan H. and Fourné, Marcel and Amft, Sabrina and Trummová, Ivana and Acar, Yasemin and Fahl, Sascha}, editor={Balzarotti, Davide and Xu, Wenyuan}, year={2024} }","mla":"Huaman, Nicolas, et al. “‘You Have to Read 50 Different RFCs That Contradict Each Other’: An Interview Study on the Experiences of Implementing Cryptographic Standards.” <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu, USENIX Association, 2024.","short":"N. Huaman, J. Suray, J.H. Klemmer, M. Fourné, S. Amft, I. Trummová, Y. Acar, S. Fahl, in: D. Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association, 2024.","apa":"Huaman, N., Suray, J., Klemmer, J. H., Fourné, M., Amft, S., Trummová, I., Acar, Y., &#38; Fahl, S. (2024). “You have to read 50 different RFCs that contradict each other”: An Interview Study on the Experiences of Implementing Cryptographic Standards. In D. Balzarotti &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association."},"publisher":"USENIX Association","date_updated":"2024-08-19T08:54:05Z","author":[{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"last_name":"Suray","full_name":"Suray, Jacques","first_name":"Jacques"},{"first_name":"Jan H.","full_name":"Klemmer, Jan H.","last_name":"Klemmer"},{"first_name":"Marcel","full_name":"Fourné, Marcel","last_name":"Fourné"},{"first_name":"Sabrina","full_name":"Amft, Sabrina","last_name":"Amft"},{"last_name":"Trummová","full_name":"Trummová, Ivana","first_name":"Ivana"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2024-08-19T08:26:29Z","title":"\"You have to read 50 different RFCs that contradict each other\": An Interview Study on the Experiences of Implementing Cryptographic Standards","type":"conference","publication":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","editor":[{"last_name":"Balzarotti","full_name":"Balzarotti, Davide","first_name":"Davide"},{"full_name":"Xu, Wenyuan","last_name":"Xu","first_name":"Wenyuan"}],"status":"public","_id":"55636","user_id":"15458","department":[{"_id":"740"}],"language":[{"iso":"eng"}]},{"year":"2024","citation":{"short":"K. Panahi, S. Robertson, Y. Acar, A.G. Bardas, T. Kohno, L. Simko, in: D. Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association, 2024.","bibtex":"@inproceedings{Panahi_Robertson_Acar_Bardas_Kohno_Simko_2024, title={\"But they have overlooked a few things in Afghanistan: \" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections}, booktitle={33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher={USENIX Association}, author={Panahi, Kabir and Robertson, Shawn and Acar, Yasemin and Bardas, Alexandru G. and Kohno, Tadayoshi and Simko, Lucy}, editor={Balzarotti, Davide and Xu, Wenyuan}, year={2024} }","mla":"Panahi, Kabir, et al. “\"But They Have Overlooked a Few Things in Afghanistan: \" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections.” <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu, USENIX Association, 2024.","apa":"Panahi, K., Robertson, S., Acar, Y., Bardas, A. G., Kohno, T., &#38; Simko, L. (2024). \"But they have overlooked a few things in Afghanistan: \" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections. In D. Balzarotti &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association.","ama":"Panahi K, Robertson S, Acar Y, Bardas AG, Kohno T, Simko L. \"But they have overlooked a few things in Afghanistan: \" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections. In: Balzarotti D, Xu W, eds. <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association; 2024.","ieee":"K. Panahi, S. Robertson, Y. Acar, A. G. Bardas, T. Kohno, and L. Simko, “\"But they have overlooked a few things in Afghanistan: \" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections,” in <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, 2024.","chicago":"Panahi, Kabir, Shawn Robertson, Yasemin Acar, Alexandru G. Bardas, Tadayoshi Kohno, and Lucy Simko. “\"But They Have Overlooked a Few Things in Afghanistan: \" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections.” In <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX Association, 2024."},"title":"\"But they have overlooked a few things in Afghanistan: \" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections","date_updated":"2024-08-19T08:53:38Z","publisher":"USENIX Association","author":[{"last_name":"Panahi","full_name":"Panahi, Kabir","first_name":"Kabir"},{"first_name":"Shawn","last_name":"Robertson","full_name":"Robertson, Shawn"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"last_name":"Bardas","full_name":"Bardas, Alexandru G.","first_name":"Alexandru G."},{"last_name":"Kohno","full_name":"Kohno, Tadayoshi","first_name":"Tadayoshi"},{"last_name":"Simko","full_name":"Simko, Lucy","first_name":"Lucy"}],"date_created":"2024-08-19T08:34:15Z","editor":[{"first_name":"Davide","full_name":"Balzarotti, Davide","last_name":"Balzarotti"},{"full_name":"Xu, Wenyuan","last_name":"Xu","first_name":"Wenyuan"}],"status":"public","publication":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","type":"conference","language":[{"iso":"eng"}],"_id":"55641","department":[{"_id":"740"}],"user_id":"15458"},{"language":[{"iso":"eng"}],"user_id":"15458","department":[{"_id":"740"}],"_id":"55642","status":"public","editor":[{"full_name":"Balzarotti, Davide","last_name":"Balzarotti","first_name":"Davide"},{"first_name":"Wenyuan","last_name":"Xu","full_name":"Xu, Wenyuan"}],"type":"conference","publication":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","title":"Security and Privacy Software Creators’ Perspectives on Unintended Consequences","author":[{"first_name":"Harshini Sri","full_name":"Ramulu, Harshini Sri","last_name":"Ramulu"},{"first_name":"Helen","full_name":"Schmitt, Helen","last_name":"Schmitt"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"}],"date_created":"2024-08-19T08:42:02Z","publisher":"USENIX Association","date_updated":"2024-08-19T08:53:32Z","citation":{"ama":"Ramulu HS, Schmitt H, Wermke D, Acar Y. Security and Privacy Software Creators’ Perspectives on Unintended Consequences. In: Balzarotti D, Xu W, eds. <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association; 2024.","chicago":"Ramulu, Harshini Sri, Helen Schmitt, Dominik Wermke, and Yasemin Acar. “Security and Privacy Software Creators’ Perspectives on Unintended Consequences.” In <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX Association, 2024.","ieee":"H. S. Ramulu, H. Schmitt, D. Wermke, and Y. Acar, “Security and Privacy Software Creators’ Perspectives on Unintended Consequences,” in <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, 2024.","mla":"Ramulu, Harshini Sri, et al. “Security and Privacy Software Creators’ Perspectives on Unintended Consequences.” <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu, USENIX Association, 2024.","bibtex":"@inproceedings{Ramulu_Schmitt_Wermke_Acar_2024, title={Security and Privacy Software Creators’ Perspectives on Unintended Consequences}, booktitle={33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher={USENIX Association}, author={Ramulu, Harshini Sri and Schmitt, Helen and Wermke, Dominik and Acar, Yasemin}, editor={Balzarotti, Davide and Xu, Wenyuan}, year={2024} }","short":"H.S. Ramulu, H. Schmitt, D. Wermke, Y. Acar, in: D. Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association, 2024.","apa":"Ramulu, H. S., Schmitt, H., Wermke, D., &#38; Acar, Y. (2024). Security and Privacy Software Creators’ Perspectives on Unintended Consequences. In D. Balzarotti &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association."},"year":"2024"},{"language":[{"iso":"eng"}],"department":[{"_id":"740"}],"user_id":"15458","_id":"58368","status":"public","publication":"CoRR","type":"journal_article","doi":"10.48550/ARXIV.2408.16529","title":"S3C2 Summit 2023-11: Industry Secure Supply Chain Summit","volume":"abs/2408.16529","author":[{"first_name":"Nusrat","full_name":"Zahan, Nusrat","last_name":"Zahan"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"last_name":"Cukier","full_name":"Cukier, Michel","first_name":"Michel"},{"full_name":"Enck, William","last_name":"Enck","first_name":"William"},{"first_name":"Christian","last_name":"Kästner","full_name":"Kästner, Christian"},{"first_name":"Alexandros","full_name":"Kapravelos, Alexandros","last_name":"Kapravelos"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"full_name":"Williams, Laurie A.","last_name":"Williams","first_name":"Laurie A."}],"date_created":"2025-01-27T10:22:03Z","date_updated":"2025-01-27T10:24:06Z","citation":{"apa":"Zahan, N., Acar, Y., Cukier, M., Enck, W., Kästner, C., Kapravelos, A., Wermke, D., &#38; Williams, L. A. (2024). S3C2 Summit 2023-11: Industry Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2408.16529</i>. <a href=\"https://doi.org/10.48550/ARXIV.2408.16529\">https://doi.org/10.48550/ARXIV.2408.16529</a>","bibtex":"@article{Zahan_Acar_Cukier_Enck_Kästner_Kapravelos_Wermke_Williams_2024, title={S3C2 Summit 2023-11: Industry Secure Supply Chain Summit}, volume={abs/2408.16529}, DOI={<a href=\"https://doi.org/10.48550/ARXIV.2408.16529\">10.48550/ARXIV.2408.16529</a>}, journal={CoRR}, author={Zahan, Nusrat and Acar, Yasemin and Cukier, Michel and Enck, William and Kästner, Christian and Kapravelos, Alexandros and Wermke, Dominik and Williams, Laurie A.}, year={2024} }","mla":"Zahan, Nusrat, et al. “S3C2 Summit 2023-11: Industry Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2408.16529, 2024, doi:<a href=\"https://doi.org/10.48550/ARXIV.2408.16529\">10.48550/ARXIV.2408.16529</a>.","short":"N. Zahan, Y. Acar, M. Cukier, W. Enck, C. Kästner, A. Kapravelos, D. Wermke, L.A. Williams, CoRR abs/2408.16529 (2024).","ama":"Zahan N, Acar Y, Cukier M, et al. S3C2 Summit 2023-11: Industry Secure Supply Chain Summit. <i>CoRR</i>. 2024;abs/2408.16529. doi:<a href=\"https://doi.org/10.48550/ARXIV.2408.16529\">10.48550/ARXIV.2408.16529</a>","chicago":"Zahan, Nusrat, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, and Laurie A. Williams. “S3C2 Summit 2023-11: Industry Secure Supply Chain Summit.” <i>CoRR</i> abs/2408.16529 (2024). <a href=\"https://doi.org/10.48550/ARXIV.2408.16529\">https://doi.org/10.48550/ARXIV.2408.16529</a>.","ieee":"N. Zahan <i>et al.</i>, “S3C2 Summit 2023-11: Industry Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2408.16529, 2024, doi: <a href=\"https://doi.org/10.48550/ARXIV.2408.16529\">10.48550/ARXIV.2408.16529</a>."},"year":"2024"},{"status":"public","publication":"CoRR","type":"journal_article","language":[{"iso":"eng"}],"_id":"58369","department":[{"_id":"740"}],"user_id":"15458","year":"2024","citation":{"mla":"Tystahl, Greg, et al. “S3C2 Summit 2024-03: Industry Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2405.08762, 2024, doi:<a href=\"https://doi.org/10.48550/ARXIV.2405.08762\">10.48550/ARXIV.2405.08762</a>.","short":"G. Tystahl, Y. Acar, M. Cukier, W. Enck, C. Kästner, A. Kapravelos, D. Wermke, L.A. Williams, CoRR abs/2405.08762 (2024).","bibtex":"@article{Tystahl_Acar_Cukier_Enck_Kästner_Kapravelos_Wermke_Williams_2024, title={S3C2 Summit 2024-03: Industry Secure Supply Chain Summit}, volume={abs/2405.08762}, DOI={<a href=\"https://doi.org/10.48550/ARXIV.2405.08762\">10.48550/ARXIV.2405.08762</a>}, journal={CoRR}, author={Tystahl, Greg and Acar, Yasemin and Cukier, Michel and Enck, William and Kästner, Christian and Kapravelos, Alexandros and Wermke, Dominik and Williams, Laurie A.}, year={2024} }","apa":"Tystahl, G., Acar, Y., Cukier, M., Enck, W., Kästner, C., Kapravelos, A., Wermke, D., &#38; Williams, L. A. (2024). S3C2 Summit 2024-03: Industry Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2405.08762</i>. <a href=\"https://doi.org/10.48550/ARXIV.2405.08762\">https://doi.org/10.48550/ARXIV.2405.08762</a>","chicago":"Tystahl, Greg, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, and Laurie A. Williams. “S3C2 Summit 2024-03: Industry Secure Supply Chain Summit.” <i>CoRR</i> abs/2405.08762 (2024). <a href=\"https://doi.org/10.48550/ARXIV.2405.08762\">https://doi.org/10.48550/ARXIV.2405.08762</a>.","ieee":"G. Tystahl <i>et al.</i>, “S3C2 Summit 2024-03: Industry Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2405.08762, 2024, doi: <a href=\"https://doi.org/10.48550/ARXIV.2405.08762\">10.48550/ARXIV.2405.08762</a>.","ama":"Tystahl G, Acar Y, Cukier M, et al. S3C2 Summit 2024-03: Industry Secure Supply Chain Summit. <i>CoRR</i>. 2024;abs/2405.08762. doi:<a href=\"https://doi.org/10.48550/ARXIV.2405.08762\">10.48550/ARXIV.2405.08762</a>"},"title":"S3C2 Summit 2024-03: Industry Secure Supply Chain Summit","doi":"10.48550/ARXIV.2405.08762","date_updated":"2025-01-27T10:33:06Z","volume":"abs/2405.08762","date_created":"2025-01-27T10:32:20Z","author":[{"last_name":"Tystahl","full_name":"Tystahl, Greg","first_name":"Greg"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Michel","last_name":"Cukier","full_name":"Cukier, Michel"},{"full_name":"Enck, William","last_name":"Enck","first_name":"William"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"last_name":"Kapravelos","full_name":"Kapravelos, Alexandros","first_name":"Alexandros"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Laurie A.","full_name":"Williams, Laurie A.","last_name":"Williams"}]},{"main_file_link":[{"url":"https://www.usenix.org/system/files/usenixsecurity24-kostan.pdf","open_access":"1"}],"title":"Exploring digital security and privacy in relative poverty in Germany through qualitative interviews","date_created":"2024-10-15T08:43:15Z","author":[{"first_name":"Anastassija","last_name":"Kostan","full_name":"Kostan, Anastassija","id":"99059"},{"first_name":"Sara","last_name":"Olschar","id":"100387","full_name":"Olschar, Sara"},{"full_name":"Simko, Lucy","last_name":"Simko","first_name":"Lucy"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"}],"oa":"1","date_updated":"2024-12-11T14:50:21Z","page":"2029–2046","citation":{"bibtex":"@inproceedings{Kostan_Olschar_Simko_Acar_2024, title={Exploring digital security and privacy in relative poverty in Germany through qualitative interviews}, booktitle={33rd USENIX Security Symposium (USENIX Security 24)}, author={Kostan, Anastassija and Olschar, Sara and Simko, Lucy and Acar, Yasemin}, year={2024}, pages={2029–2046} }","mla":"Kostan, Anastassija, et al. “Exploring Digital Security and Privacy in Relative Poverty in Germany through Qualitative Interviews.” <i>33rd USENIX Security Symposium (USENIX Security 24)</i>, 2024, pp. 2029–2046.","short":"A. Kostan, S. Olschar, L. Simko, Y. Acar, in: 33rd USENIX Security Symposium (USENIX Security 24), 2024, pp. 2029–2046.","apa":"Kostan, A., Olschar, S., Simko, L., &#38; Acar, Y. (2024). Exploring digital security and privacy in relative poverty in Germany through qualitative interviews. <i>33rd USENIX Security Symposium (USENIX Security 24)</i>, 2029–2046.","ama":"Kostan A, Olschar S, Simko L, Acar Y. Exploring digital security and privacy in relative poverty in Germany through qualitative interviews. In: <i>33rd USENIX Security Symposium (USENIX Security 24)</i>. ; 2024:2029–2046.","chicago":"Kostan, Anastassija, Sara Olschar, Lucy Simko, and Yasemin Acar. “Exploring Digital Security and Privacy in Relative Poverty in Germany through Qualitative Interviews.” In <i>33rd USENIX Security Symposium (USENIX Security 24)</i>, 2029–2046, 2024.","ieee":"A. Kostan, S. Olschar, L. Simko, and Y. Acar, “Exploring digital security and privacy in relative poverty in Germany through qualitative interviews,” in <i>33rd USENIX Security Symposium (USENIX Security 24)</i>, 2024, pp. 2029–2046."},"year":"2024","language":[{"iso":"eng"}],"user_id":"51999","_id":"56624","status":"public","publication":"33rd USENIX Security Symposium (USENIX Security 24)","type":"conference"},{"citation":{"apa":"Kostan, A., Olschar, S., Simko, L., &#38; Acar, Y. (2024). Exploring digital security and privacy in relative poverty in Germany through qualitative interviews. In D. Balzarotti &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association.","short":"A. Kostan, S. Olschar, L. Simko, Y. Acar, in: D. Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association, 2024.","bibtex":"@inproceedings{Kostan_Olschar_Simko_Acar_2024, title={Exploring digital security and privacy in relative poverty in Germany through qualitative interviews}, booktitle={33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher={USENIX Association}, author={Kostan, Anastassija and Olschar, Sara and Simko, Lucy and Acar, Yasemin}, editor={Balzarotti, Davide and Xu, Wenyuan}, year={2024} }","mla":"Kostan, Anastassija, et al. “Exploring Digital Security and Privacy in Relative Poverty in Germany through Qualitative Interviews.” <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu, USENIX Association, 2024.","ama":"Kostan A, Olschar S, Simko L, Acar Y. Exploring digital security and privacy in relative poverty in Germany through qualitative interviews. In: Balzarotti D, Xu W, eds. <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association; 2024.","ieee":"A. Kostan, S. Olschar, L. Simko, and Y. Acar, “Exploring digital security and privacy in relative poverty in Germany through qualitative interviews,” in <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, 2024.","chicago":"Kostan, Anastassija, Sara Olschar, Lucy Simko, and Yasemin Acar. “Exploring Digital Security and Privacy in Relative Poverty in Germany through Qualitative Interviews.” In <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX Association, 2024."},"year":"2024","title":"Exploring digital security and privacy in relative poverty in Germany through qualitative interviews","author":[{"first_name":"Anastassija","last_name":"Kostan","full_name":"Kostan, Anastassija"},{"full_name":"Olschar, Sara","last_name":"Olschar","first_name":"Sara"},{"first_name":"Lucy","last_name":"Simko","full_name":"Simko, Lucy"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"}],"date_created":"2024-08-19T08:27:57Z","date_updated":"2025-09-04T11:19:24Z","publisher":"USENIX Association","status":"public","editor":[{"first_name":"Davide","last_name":"Balzarotti","full_name":"Balzarotti, Davide"},{"first_name":"Wenyuan","last_name":"Xu","full_name":"Xu, Wenyuan"}],"type":"conference","publication":"33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024","language":[{"iso":"eng"}],"user_id":"15458","department":[{"_id":"740"}],"_id":"55637"},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47306","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023","status":"public","editor":[{"last_name":"Schmidt","full_name":"Schmidt, Albrecht","first_name":"Albrecht"},{"last_name":"Väänänen","full_name":"Väänänen, Kaisa","first_name":"Kaisa"},{"full_name":"Goyal, Tesh","last_name":"Goyal","first_name":"Tesh"},{"first_name":"Per Ola","last_name":"Kristensson","full_name":"Kristensson, Per Ola"},{"first_name":"Anicia","full_name":"Peters, Anicia","last_name":"Peters"},{"full_name":"Mueller, Stefanie","last_name":"Mueller","first_name":"Stefanie"},{"first_name":"Julie R.","full_name":"Williamson, Julie R.","last_name":"Williamson"},{"last_name":"Wilson","full_name":"Wilson, Max L.","first_name":"Max L."}],"author":[{"first_name":"Franziska","full_name":"Herbert, Franziska","last_name":"Herbert"},{"last_name":"Becker","full_name":"Becker, Steffen","first_name":"Steffen"},{"first_name":"Leonie","last_name":"Schaewitz","full_name":"Schaewitz, Leonie"},{"first_name":"Jonas","full_name":"Hielscher, Jonas","last_name":"Hielscher"},{"first_name":"Marvin","last_name":"Kowalewski","full_name":"Kowalewski, Marvin"},{"first_name":"M. Angela","last_name":"Sasse","full_name":"Sasse, M. Angela"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"Markus","full_name":"Dürmuth, Markus","last_name":"Dürmuth"}],"date_created":"2023-09-22T13:30:58Z","date_updated":"2024-06-05T12:40:15Z","publisher":"ACM","doi":"10.1145/3544548.3581410","title":"A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries","citation":{"ieee":"F. Herbert <i>et al.</i>, “A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries,” in <i>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i>, 2023, p. 582:1–582:23, doi: <a href=\"https://doi.org/10.1145/3544548.3581410\">10.1145/3544548.3581410</a>.","chicago":"Herbert, Franziska, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, and Markus Dürmuth. “A World Full of Privacy and Security (Mis)Conceptions? Findings of a Representative Survey in 12 Countries.” In <i>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i>, edited by Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters, Stefanie Mueller, Julie R. Williamson, and Max L. Wilson, 582:1–582:23. ACM, 2023. <a href=\"https://doi.org/10.1145/3544548.3581410\">https://doi.org/10.1145/3544548.3581410</a>.","apa":"Herbert, F., Becker, S., Schaewitz, L., Hielscher, J., Kowalewski, M., Sasse, M. A., Acar, Y., &#38; Dürmuth, M. (2023). A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. In A. Schmidt, K. Väänänen, T. Goyal, P. O. Kristensson, A. Peters, S. Mueller, J. R. Williamson, &#38; M. L. Wilson (Eds.), <i>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i> (p. 582:1–582:23). ACM. <a href=\"https://doi.org/10.1145/3544548.3581410\">https://doi.org/10.1145/3544548.3581410</a>","ama":"Herbert F, Becker S, Schaewitz L, et al. A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries. In: Schmidt A, Väänänen K, Goyal T, et al., eds. <i>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i>. ACM; 2023:582:1–582:23. doi:<a href=\"https://doi.org/10.1145/3544548.3581410\">10.1145/3544548.3581410</a>","mla":"Herbert, Franziska, et al. “A World Full of Privacy and Security (Mis)Conceptions? Findings of a Representative Survey in 12 Countries.” <i>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i>, edited by Albrecht Schmidt et al., ACM, 2023, p. 582:1–582:23, doi:<a href=\"https://doi.org/10.1145/3544548.3581410\">10.1145/3544548.3581410</a>.","short":"F. Herbert, S. Becker, L. Schaewitz, J. Hielscher, M. Kowalewski, M.A. Sasse, Y. Acar, M. Dürmuth, in: A. Schmidt, K. Väänänen, T. Goyal, P.O. Kristensson, A. Peters, S. Mueller, J.R. Williamson, M.L. Wilson (Eds.), Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023, ACM, 2023, p. 582:1–582:23.","bibtex":"@inproceedings{Herbert_Becker_Schaewitz_Hielscher_Kowalewski_Sasse_Acar_Dürmuth_2023, title={A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries}, DOI={<a href=\"https://doi.org/10.1145/3544548.3581410\">10.1145/3544548.3581410</a>}, booktitle={Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023}, publisher={ACM}, author={Herbert, Franziska and Becker, Steffen and Schaewitz, Leonie and Hielscher, Jonas and Kowalewski, Marvin and Sasse, M. Angela and Acar, Yasemin and Dürmuth, Markus}, editor={Schmidt, Albrecht and Väänänen, Kaisa and Goyal, Tesh and Kristensson, Per Ola and Peters, Anicia and Mueller, Stefanie and Williamson, Julie R. and Wilson, Max L.}, year={2023}, pages={582:1–582:23} }"},"page":"582:1–582:23","year":"2023"},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47304","language":[{"iso":"eng"}],"type":"conference","publication":"44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023","status":"public","date_created":"2023-09-22T13:28:42Z","author":[{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"last_name":"Klemmer","full_name":"Klemmer, Jan H.","first_name":"Jan H."},{"first_name":"Noah","last_name":"Wöhler","full_name":"Wöhler, Noah"},{"full_name":"Schmüser, Juliane","last_name":"Schmüser","first_name":"Juliane"},{"first_name":"Harshini","full_name":"Sri Ramulu, Harshini","id":"99000","orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_updated":"2024-06-05T12:37:40Z","publisher":"IEEE","doi":"10.1109/SP46215.2023.10179378","title":"\"Always Contribute Back\": A Qualitative Study on Security Challenges of the Open Source Supply Chain","citation":{"ieee":"D. Wermke <i>et al.</i>, “‘Always Contribute Back’: A Qualitative Study on Security Challenges of the Open Source Supply Chain,” in <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2023, pp. 1545–1560, doi: <a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">10.1109/SP46215.2023.10179378</a>.","chicago":"Wermke, Dominik, Jan H. Klemmer, Noah Wöhler, Juliane Schmüser, Harshini Sri Ramulu, Yasemin Acar, and Sascha Fahl. “‘Always Contribute Back’: A Qualitative Study on Security Challenges of the Open Source Supply Chain.” In <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1545–1560. IEEE, 2023. <a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">https://doi.org/10.1109/SP46215.2023.10179378</a>.","mla":"Wermke, Dominik, et al. “‘Always Contribute Back’: A Qualitative Study on Security Challenges of the Open Source Supply Chain.” <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, IEEE, 2023, pp. 1545–1560, doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">10.1109/SP46215.2023.10179378</a>.","short":"D. Wermke, J.H. Klemmer, N. Wöhler, J. Schmüser, H. Sri Ramulu, Y. Acar, S. Fahl, in: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE, 2023, pp. 1545–1560.","bibtex":"@inproceedings{Wermke_Klemmer_Wöhler_Schmüser_Sri Ramulu_Acar_Fahl_2023, title={“Always Contribute Back”: A Qualitative Study on Security Challenges of the Open Source Supply Chain}, DOI={<a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">10.1109/SP46215.2023.10179378</a>}, booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Wermke, Dominik and Klemmer, Jan H. and Wöhler, Noah and Schmüser, Juliane and Sri Ramulu, Harshini and Acar, Yasemin and Fahl, Sascha}, year={2023}, pages={1545–1560} }","ama":"Wermke D, Klemmer JH, Wöhler N, et al. “Always Contribute Back”: A Qualitative Study on Security Challenges of the Open Source Supply Chain. In: <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>. IEEE; 2023:1545–1560. doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">10.1109/SP46215.2023.10179378</a>","apa":"Wermke, D., Klemmer, J. H., Wöhler, N., Schmüser, J., Sri Ramulu, H., Acar, Y., &#38; Fahl, S. (2023). “Always Contribute Back”: A Qualitative Study on Security Challenges of the Open Source Supply Chain. <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1545–1560. <a href=\"https://doi.org/10.1109/SP46215.2023.10179378\">https://doi.org/10.1109/SP46215.2023.10179378</a>"},"page":"1545–1560","year":"2023"},{"year":"2023","citation":{"ama":"Krause A, Klemmer JH, Huaman N, Wermke D, Acar Y, Fahl S. Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","chicago":"Krause, Alexander, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, and Sascha Fahl. “Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ieee":"A. Krause, J. H. Klemmer, N. Huaman, D. Wermke, Y. Acar, and S. Fahl, “Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","apa":"Krause, A., Klemmer, J. H., Huaman, N., Wermke, D., Acar, Y., &#38; Fahl, S. (2023). Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","mla":"Krause, Alexander, et al. “Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","short":"A. Krause, J.H. Klemmer, N. Huaman, D. Wermke, Y. Acar, S. Fahl, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","bibtex":"@inproceedings{Krause_Klemmer_Huaman_Wermke_Acar_Fahl_2023, title={Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Krause, Alexander and Klemmer, Jan H. and Huaman, Nicolas and Wermke, Dominik and Acar, Yasemin and Fahl, Sascha}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }"},"title":"Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories","date_updated":"2024-06-05T12:38:22Z","publisher":"USENIX Association","author":[{"first_name":"Alexander","last_name":"Krause","full_name":"Krause, Alexander"},{"first_name":"Jan H.","full_name":"Klemmer, Jan H.","last_name":"Klemmer"},{"first_name":"Nicolas","full_name":"Huaman, Nicolas","last_name":"Huaman"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T13:26:59Z","editor":[{"first_name":"Joseph A.","last_name":"Calandrino","full_name":"Calandrino, Joseph A."},{"first_name":"Carmela","last_name":"Troncoso","full_name":"Troncoso, Carmela"}],"status":"public","type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","language":[{"iso":"eng"}],"_id":"47299","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}]},{"date_updated":"2024-06-05T12:38:52Z","publisher":"IEEE","author":[{"first_name":"Marcel","full_name":"Fourné, Marcel","last_name":"Fourné"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"last_name":"Enck","full_name":"Enck, William","first_name":"William"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"}],"date_created":"2023-09-22T13:44:47Z","title":"It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security","doi":"10.1109/SP46215.2023.10179320","year":"2023","citation":{"ama":"Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. In: <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>. IEEE; 2023:1527–1544. doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">10.1109/SP46215.2023.10179320</a>","chicago":"Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” In <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1527–1544. IEEE, 2023. <a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">https://doi.org/10.1109/SP46215.2023.10179320</a>.","ieee":"M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” in <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2023, pp. 1527–1544, doi: <a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">10.1109/SP46215.2023.10179320</a>.","apa":"Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1527–1544. <a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">https://doi.org/10.1109/SP46215.2023.10179320</a>","short":"M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE, 2023, pp. 1527–1544.","bibtex":"@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, DOI={<a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">10.1109/SP46215.2023.10179320</a>}, booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={1527–1544} }","mla":"Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, IEEE, 2023, pp. 1527–1544, doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179320\">10.1109/SP46215.2023.10179320</a>."},"page":"1527–1544","_id":"47310","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"type":"conference","publication":"44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023","status":"public"},{"type":"conference","publication":"44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023","status":"public","_id":"47311","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"year":"2023","citation":{"bibtex":"@inproceedings{Munyendo_Acar_Aviv_2023, title={“In Eighty Percent of the Cases, I Select the Password for Them”: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya}, DOI={<a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">10.1109/SP46215.2023.10179410</a>}, booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Munyendo, Collins W. and Acar, Yasemin and Aviv, Adam J.}, year={2023}, pages={570–587} }","short":"C.W. Munyendo, Y. Acar, A.J. Aviv, in: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE, 2023, pp. 570–587.","mla":"Munyendo, Collins W., et al. “‘In Eighty Percent of the Cases, I Select the Password for Them’: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.” <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, IEEE, 2023, pp. 570–587, doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">10.1109/SP46215.2023.10179410</a>.","apa":"Munyendo, C. W., Acar, Y., &#38; Aviv, A. J. (2023). “In Eighty Percent of the Cases, I Select the Password for Them”: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya. <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 570–587. <a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">https://doi.org/10.1109/SP46215.2023.10179410</a>","ieee":"C. W. Munyendo, Y. Acar, and A. J. Aviv, “‘In Eighty Percent of the Cases, I Select the Password for Them’: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya,” in <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2023, pp. 570–587, doi: <a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">10.1109/SP46215.2023.10179410</a>.","chicago":"Munyendo, Collins W., Yasemin Acar, and Adam J. Aviv. “‘In Eighty Percent of the Cases, I Select the Password for Them’: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.” In <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 570–587. IEEE, 2023. <a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">https://doi.org/10.1109/SP46215.2023.10179410</a>.","ama":"Munyendo CW, Acar Y, Aviv AJ. “In Eighty Percent of the Cases, I Select the Password for Them”: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya. In: <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>. IEEE; 2023:570–587. doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179410\">10.1109/SP46215.2023.10179410</a>"},"page":"570–587","publisher":"IEEE","date_updated":"2024-06-05T12:39:19Z","date_created":"2023-09-22T13:45:16Z","author":[{"full_name":"Munyendo, Collins W.","last_name":"Munyendo","first_name":"Collins W."},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Adam J.","last_name":"Aviv","full_name":"Aviv, Adam J."}],"title":"\"In Eighty Percent of the Cases, I Select the Password for Them\": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya","doi":"10.1109/SP46215.2023.10179410"},{"language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47303","status":"public","type":"conference","publication":"44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023","doi":"10.1109/SP46215.2023.10179339","title":"\"We are a startup to the core\": A qualitative interview study on the security and privacy development practices in Turkish software startups","author":[{"full_name":"Keküllüoglu, Dilara","last_name":"Keküllüoglu","first_name":"Dilara"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"}],"date_created":"2023-09-22T13:28:23Z","publisher":"IEEE","date_updated":"2024-06-05T12:40:37Z","citation":{"apa":"Keküllüoglu, D., &#38; Acar, Y. (2023). “We are a startup to the core”: A qualitative interview study on the security and privacy development practices in Turkish software startups. <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2015–2031. <a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">https://doi.org/10.1109/SP46215.2023.10179339</a>","short":"D. Keküllüoglu, Y. Acar, in: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE, 2023, pp. 2015–2031.","bibtex":"@inproceedings{Keküllüoglu_Acar_2023, title={“We are a startup to the core”: A qualitative interview study on the security and privacy development practices in Turkish software startups}, DOI={<a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">10.1109/SP46215.2023.10179339</a>}, booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Keküllüoglu, Dilara and Acar, Yasemin}, year={2023}, pages={2015–2031} }","mla":"Keküllüoglu, Dilara, and Yasemin Acar. “‘We Are a Startup to the Core’: A Qualitative Interview Study on the Security and Privacy Development Practices in Turkish Software Startups.” <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, IEEE, 2023, pp. 2015–2031, doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">10.1109/SP46215.2023.10179339</a>.","ieee":"D. Keküllüoglu and Y. Acar, “‘We are a startup to the core’: A qualitative interview study on the security and privacy development practices in Turkish software startups,” in <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2023, pp. 2015–2031, doi: <a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">10.1109/SP46215.2023.10179339</a>.","chicago":"Keküllüoglu, Dilara, and Yasemin Acar. “‘We Are a Startup to the Core’: A Qualitative Interview Study on the Security and Privacy Development Practices in Turkish Software Startups.” In <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2015–2031. IEEE, 2023. <a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">https://doi.org/10.1109/SP46215.2023.10179339</a>.","ama":"Keküllüoglu D, Acar Y. “We are a startup to the core”: A qualitative interview study on the security and privacy development practices in Turkish software startups. In: <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>. IEEE; 2023:2015–2031. doi:<a href=\"https://doi.org/10.1109/SP46215.2023.10179339\">10.1109/SP46215.2023.10179339</a>"},"page":"2015–2031","year":"2023"}]
