[{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47296","language":[{"iso":"eng"}],"type":"journal_article","publication":"CoRR","status":"public","date_created":"2023-09-22T13:25:55Z","author":[{"first_name":"Tadayoshi","last_name":"Kohno","full_name":"Kohno, Tadayoshi"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Loh, Wulf","last_name":"Loh","first_name":"Wulf"}],"volume":"abs/2302.14326","date_updated":"2024-06-05T12:39:48Z","doi":"10.48550/arXiv.2302.14326","title":"Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations","citation":{"bibtex":"@article{Kohno_Acar_Loh_2023, title={Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, volume={abs/2302.14326}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>}, journal={CoRR}, author={Kohno, Tadayoshi and Acar, Yasemin and Loh, Wulf}, year={2023} }","short":"T. Kohno, Y. Acar, W. Loh, CoRR abs/2302.14326 (2023).","mla":"Kohno, Tadayoshi, et al. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>CoRR</i>, vol. abs/2302.14326, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>.","apa":"Kohno, T., Acar, Y., &#38; Loh, W. (2023). Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. <i>CoRR</i>, <i>abs/2302.14326</i>. <a href=\"https://doi.org/10.48550/arXiv.2302.14326\">https://doi.org/10.48550/arXiv.2302.14326</a>","ama":"Kohno T, Acar Y, Loh W. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. <i>CoRR</i>. 2023;abs/2302.14326. doi:<a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>","chicago":"Kohno, Tadayoshi, Yasemin Acar, and Wulf Loh. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>CoRR</i> abs/2302.14326 (2023). <a href=\"https://doi.org/10.48550/arXiv.2302.14326\">https://doi.org/10.48550/arXiv.2302.14326</a>.","ieee":"T. Kohno, Y. Acar, and W. Loh, “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations,” <i>CoRR</i>, vol. abs/2302.14326, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2302.14326\">10.48550/arXiv.2302.14326</a>."},"year":"2023"},{"type":"conference","publication":"Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023","status":"public","editor":[{"first_name":"Patrick Gage","full_name":"Kelley, Patrick Gage","last_name":"Kelley"},{"last_name":"Kapadia","full_name":"Kapadia, Apu","first_name":"Apu"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47305","language":[{"iso":"eng"}],"citation":{"ama":"Amft S, Höltervennhoff S, Huaman N, Acar Y, Fahl S. “Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup. In: Kelley PG, Kapadia A, eds. <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>. USENIX Association; 2023:171–190.","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, and Sascha Fahl. “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup.” In <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, edited by Patrick Gage Kelley and Apu Kapadia, 171–190. USENIX Association, 2023.","ieee":"S. Amft, S. Höltervennhoff, N. Huaman, Y. Acar, and S. Fahl, “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup,” in <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 2023, pp. 171–190.","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Acar, Y., &#38; Fahl, S. (2023). “Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup. In P. G. Kelley &#38; A. Kapadia (Eds.), <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i> (pp. 171–190). USENIX Association.","bibtex":"@inproceedings{Amft_Höltervennhoff_Huaman_Acar_Fahl_2023, title={“Would You Give the Same Priority to the Bank and a Game? I Do Not!” Exploring Credential Management Strategies and Obstacles during Password Manager Setup}, booktitle={Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023}, publisher={USENIX Association}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Acar, Yasemin and Fahl, Sascha}, editor={Kelley, Patrick Gage and Kapadia, Apu}, year={2023}, pages={171–190} }","short":"S. Amft, S. Höltervennhoff, N. Huaman, Y. Acar, S. Fahl, in: P.G. Kelley, A. Kapadia (Eds.), Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, USENIX Association, 2023, pp. 171–190.","mla":"Amft, Sabrina, et al. “‘Would You Give the Same Priority to the Bank and a Game? I Do Not!’ Exploring Credential Management Strategies and Obstacles during Password Manager Setup.” <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, edited by Patrick Gage Kelley and Apu Kapadia, USENIX Association, 2023, pp. 171–190."},"page":"171–190","year":"2023","author":[{"first_name":"Sabrina","last_name":"Amft","full_name":"Amft, Sabrina"},{"first_name":"Sandra","full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff"},{"full_name":"Huaman, Nicolas","last_name":"Huaman","first_name":"Nicolas"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T13:29:29Z","date_updated":"2024-06-05T12:44:28Z","publisher":"USENIX Association","title":"\"Would You Give the Same Priority to the Bank and a Game? I Do Not!\" Exploring Credential Management Strategies and Obstacles during Password Manager Setup"},{"language":[{"iso":"eng"}],"_id":"47301","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"editor":[{"full_name":"Calandrino, Joseph A.","last_name":"Calandrino","first_name":"Joseph A."},{"first_name":"Carmela","full_name":"Troncoso, Carmela","last_name":"Troncoso"}],"status":"public","type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","title":"\"I wouldn’t want my unsafe code to run my pacemaker\": An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust","publisher":"USENIX Association","date_updated":"2024-06-05T12:49:13Z","author":[{"first_name":"Sandra","full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff"},{"first_name":"Philip","full_name":"Klostermeyer, Philip","last_name":"Klostermeyer"},{"first_name":"Noah","last_name":"Wöhler","full_name":"Wöhler, Noah"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2023-09-22T13:27:45Z","year":"2023","citation":{"chicago":"Höltervennhoff, Sandra, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, and Sascha Fahl. “‘I Wouldn’t Want My Unsafe Code to Run My Pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ieee":"S. Höltervennhoff, P. Klostermeyer, N. Wöhler, Y. Acar, and S. Fahl, “‘I wouldn’t want my unsafe code to run my pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","ama":"Höltervennhoff S, Klostermeyer P, Wöhler N, Acar Y, Fahl S. “I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","apa":"Höltervennhoff, S., Klostermeyer, P., Wöhler, N., Acar, Y., &#38; Fahl, S. (2023). “I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","mla":"Höltervennhoff, Sandra, et al. “‘I Wouldn’t Want My Unsafe Code to Run My Pacemaker’: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","short":"S. Höltervennhoff, P. Klostermeyer, N. Wöhler, Y. Acar, S. Fahl, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","bibtex":"@inproceedings{Höltervennhoff_Klostermeyer_Wöhler_Acar_Fahl_2023, title={“I wouldn’t want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Höltervennhoff, Sandra and Klostermeyer, Philip and Wöhler, Noah and Acar, Yasemin and Fahl, Sascha}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }"}},{"title":"\"Security is not my field, I’m a stats guy\": A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry","date_updated":"2024-06-05T12:42:46Z","publisher":"USENIX Association","date_created":"2023-09-22T13:26:37Z","author":[{"last_name":"Mink","full_name":"Mink, Jaron","first_name":"Jaron"},{"first_name":"Harjot","full_name":"Kaur, Harjot","last_name":"Kaur"},{"first_name":"Juliane","full_name":"Schmüser, Juliane","last_name":"Schmüser"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"}],"year":"2023","citation":{"apa":"Mink, J., Kaur, H., Schmüser, J., Fahl, S., &#38; Acar, Y. (2023). “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association.","bibtex":"@inproceedings{Mink_Kaur_Schmüser_Fahl_Acar_2023, title={“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Mink, Jaron and Kaur, Harjot and Schmüser, Juliane and Fahl, Sascha and Acar, Yasemin}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","mla":"Mink, Jaron, et al. “‘Security Is Not My Field, I’m a Stats Guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","short":"J. Mink, H. Kaur, J. Schmüser, S. Fahl, Y. Acar, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","ama":"Mink J, Kaur H, Schmüser J, Fahl S, Acar Y. “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","chicago":"Mink, Jaron, Harjot Kaur, Juliane Schmüser, Sascha Fahl, and Yasemin Acar. “‘Security Is Not My Field, I’m a Stats Guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","ieee":"J. Mink, H. Kaur, J. Schmüser, S. Fahl, and Y. Acar, “‘Security is not my field, I’m a stats guy’: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023."},"language":[{"iso":"eng"}],"_id":"47298","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"editor":[{"first_name":"Joseph A.","last_name":"Calandrino","full_name":"Calandrino, Joseph A."},{"first_name":"Carmela","last_name":"Troncoso","full_name":"Troncoso, Carmela"}],"status":"public","type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023"},{"department":[{"_id":"858"}],"user_id":"14931","_id":"47842","language":[{"iso":"eng"}],"extern":"1","publication":"2023 IEEE Symposium on Security and Privacy (SP)","type":"conference","status":"public","author":[{"first_name":"Marcel","last_name":"Fourné","full_name":"Fourné, Marcel","id":"99291"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"William","last_name":"Enck","full_name":"Enck, William"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"}],"date_created":"2023-10-06T16:11:54Z","publisher":"IEEE","date_updated":"2024-06-05T12:44:03Z","doi":"10.1109/sp46215.2023.10179320","title":"It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security","publication_status":"published","citation":{"ama":"Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. In: <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>","ieee":"M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security,” 2023, doi: <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","chicago":"Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” In <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>.","apa":"Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. <i>2023 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">https://doi.org/10.1109/sp46215.2023.10179320</a>","mla":"Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.” <i>2023 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>.","short":"M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 2023 IEEE Symposium on Security and Privacy (SP), IEEE, 2023.","bibtex":"@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, DOI={<a href=\"https://doi.org/10.1109/sp46215.2023.10179320\">10.1109/sp46215.2023.10179320</a>}, booktitle={2023 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023} }"},"year":"2023"},{"publication":"CoRR","type":"journal_article","status":"public","_id":"47295","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"year":"2023","citation":{"ieee":"S. Amft <i>et al.</i>, “Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication,” <i>CoRR</i>, vol. abs/2306.09708, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>.","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “Lost and Not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.” <i>CoRR</i> abs/2306.09708 (2023). <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">https://doi.org/10.48550/arXiv.2306.09708</a>.","bibtex":"@article{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication}, volume={abs/2306.09708}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>}, journal={CoRR}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, year={2023} }","short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, CoRR abs/2306.09708 (2023).","mla":"Amft, Sabrina, et al. “Lost and Not Found: An Investigation of Recovery Methods for Multi-Factor Authentication.” <i>CoRR</i>, vol. abs/2306.09708, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>.","ama":"Amft S, Höltervennhoff S, Huaman N, et al. Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. <i>CoRR</i>. 2023;abs/2306.09708. doi:<a href=\"https://doi.org/10.48550/arXiv.2306.09708\">10.48550/arXiv.2306.09708</a>","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. <i>CoRR</i>, <i>abs/2306.09708</i>. <a href=\"https://doi.org/10.48550/arXiv.2306.09708\">https://doi.org/10.48550/arXiv.2306.09708</a>"},"date_updated":"2024-06-05T12:43:30Z","volume":"abs/2306.09708","date_created":"2023-09-22T13:25:13Z","author":[{"last_name":"Amft","full_name":"Amft, Sabrina","first_name":"Sabrina"},{"full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff","first_name":"Sandra"},{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"full_name":"Krause, Alexander","last_name":"Krause","first_name":"Alexander"},{"first_name":"Lucy","last_name":"Simko","full_name":"Simko, Lucy"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"title":"Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication","doi":"10.48550/arXiv.2306.09708"},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47294","language":[{"iso":"eng"}],"type":"journal_article","publication":"CoRR","status":"public","date_created":"2023-09-22T13:24:55Z","author":[{"last_name":"Tran","id":"99001","full_name":"Tran, Mindy","first_name":"Mindy"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"first_name":"Michel","last_name":"Cucker","full_name":"Cucker, Michel"},{"last_name":"Enck","full_name":"Enck, William","first_name":"William"},{"full_name":"Kapravelos, Alexandros","last_name":"Kapravelos","first_name":"Alexandros"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"first_name":"Laurie A.","last_name":"Williams","full_name":"Williams, Laurie A."}],"volume":"abs/2307.15642","date_updated":"2024-06-05T12:41:36Z","doi":"10.48550/arXiv.2307.15642","title":"S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit","citation":{"ama":"Tran M, Acar Y, Cucker M, et al. S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>. 2023;abs/2307.15642. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>","ieee":"M. Tran <i>et al.</i>, “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit,” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>.","chicago":"Tran, Mindy, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i> abs/2307.15642 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>.","apa":"Tran, M., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. <i>CoRR</i>, <i>abs/2307.15642</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.15642\">https://doi.org/10.48550/arXiv.2307.15642</a>","bibtex":"@article{Tran_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit}, volume={abs/2307.15642}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>}, journal={CoRR}, author={Tran, Mindy and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","short":"M. Tran, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.15642 (2023).","mla":"Tran, Mindy, et al. “S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.” <i>CoRR</i>, vol. abs/2307.15642, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.15642\">10.48550/arXiv.2307.15642</a>."},"year":"2023"},{"language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47293","status":"public","publication":"CoRR","type":"journal_article","doi":"10.48550/arXiv.2307.16557","title":"S3C2 Summit 2023-02: Industry Secure Supply Chain Summit","volume":"abs/2307.16557","author":[{"full_name":"Dunlap, Trevor","last_name":"Dunlap","first_name":"Trevor"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Michel","full_name":"Cucker, Michel","last_name":"Cucker"},{"first_name":"William","full_name":"Enck, William","last_name":"Enck"},{"full_name":"Kapravelos, Alexandros","last_name":"Kapravelos","first_name":"Alexandros"},{"last_name":"Kästner","full_name":"Kästner, Christian","first_name":"Christian"},{"last_name":"Williams","full_name":"Williams, Laurie A.","first_name":"Laurie A."}],"date_created":"2023-09-22T13:24:29Z","date_updated":"2024-06-05T12:41:59Z","citation":{"apa":"Dunlap, T., Acar, Y., Cucker, M., Enck, W., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2307.16557</i>. <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>","mla":"Dunlap, Trevor, et al. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>.","bibtex":"@article{Dunlap_Acar_Cucker_Enck_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-02: Industry Secure Supply Chain Summit}, volume={abs/2307.16557}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>}, journal={CoRR}, author={Dunlap, Trevor and Acar, Yasemin and Cucker, Michel and Enck, William and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","short":"T. Dunlap, Y. Acar, M. Cucker, W. Enck, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2307.16557 (2023).","ama":"Dunlap T, Acar Y, Cucker M, et al. S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2307.16557. doi:<a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>","chicago":"Dunlap, Trevor, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.” <i>CoRR</i> abs/2307.16557 (2023). <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">https://doi.org/10.48550/arXiv.2307.16557</a>.","ieee":"T. Dunlap <i>et al.</i>, “S3C2 Summit 2023-02: Industry Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2307.16557, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2307.16557\">10.48550/arXiv.2307.16557</a>."},"year":"2023"},{"citation":{"ama":"Enck W, Acar Y, Cukier M, Kapravelos A, Kästner C, Williams LA. S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>. 2023;abs/2308.06850. doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>","ieee":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, and L. A. Williams, “S3C2 Summit 2023-06: Government Secure Supply Chain Summit,” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","chicago":"Enck, William, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, and Laurie A. Williams. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i> abs/2308.06850 (2023). <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>.","mla":"Enck, William, et al. “S3C2 Summit 2023-06: Government Secure Supply Chain Summit.” <i>CoRR</i>, vol. abs/2308.06850, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>.","short":"W. Enck, Y. Acar, M. Cukier, A. Kapravelos, C. Kästner, L.A. Williams, CoRR abs/2308.06850 (2023).","bibtex":"@article{Enck_Acar_Cukier_Kapravelos_Kästner_Williams_2023, title={S3C2 Summit 2023-06: Government Secure Supply Chain Summit}, volume={abs/2308.06850}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2308.06850\">10.48550/arXiv.2308.06850</a>}, journal={CoRR}, author={Enck, William and Acar, Yasemin and Cukier, Michel and Kapravelos, Alexandros and Kästner, Christian and Williams, Laurie A.}, year={2023} }","apa":"Enck, W., Acar, Y., Cukier, M., Kapravelos, A., Kästner, C., &#38; Williams, L. A. (2023). S3C2 Summit 2023-06: Government Secure Supply Chain Summit. <i>CoRR</i>, <i>abs/2308.06850</i>. <a href=\"https://doi.org/10.48550/arXiv.2308.06850\">https://doi.org/10.48550/arXiv.2308.06850</a>"},"year":"2023","volume":"abs/2308.06850","author":[{"first_name":"William","full_name":"Enck, William","last_name":"Enck"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"first_name":"Michel","full_name":"Cukier, Michel","last_name":"Cukier"},{"full_name":"Kapravelos, Alexandros","last_name":"Kapravelos","first_name":"Alexandros"},{"first_name":"Christian","full_name":"Kästner, Christian","last_name":"Kästner"},{"full_name":"Williams, Laurie A.","last_name":"Williams","first_name":"Laurie A."}],"date_created":"2023-09-22T13:23:45Z","date_updated":"2024-06-05T12:42:20Z","doi":"10.48550/arXiv.2308.06850","title":"S3C2 Summit 2023-06: Government Secure Supply Chain Summit","publication":"CoRR","type":"journal_article","status":"public","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47292","language":[{"iso":"eng"}]},{"_id":"47300","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"type":"conference","publication":"32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023","editor":[{"full_name":"Calandrino, Joseph A.","last_name":"Calandrino","first_name":"Joseph A."},{"first_name":"Carmela","last_name":"Troncoso","full_name":"Troncoso, Carmela"}],"status":"public","date_updated":"2024-06-05T12:49:39Z","publisher":"USENIX Association","date_created":"2023-09-22T13:27:24Z","author":[{"full_name":"Kohno, Tadayoshi","last_name":"Kohno","first_name":"Tadayoshi"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Wulf","last_name":"Loh","full_name":"Loh, Wulf"}],"title":"Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations","year":"2023","citation":{"ama":"Kohno T, Acar Y, Loh W. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association; 2023.","ieee":"T. Kohno, Y. Acar, and W. Loh, “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations,” in <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.","chicago":"Kohno, Tadayoshi, Yasemin Acar, and Wulf Loh. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” In <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.","mla":"Kohno, Tadayoshi, et al. “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.” <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.","bibtex":"@inproceedings{Kohno_Acar_Loh_2023, title={Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations}, booktitle={32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association}, author={Kohno, Tadayoshi and Acar, Yasemin and Loh, Wulf}, editor={Calandrino, Joseph A. and Troncoso, Carmela}, year={2023} }","short":"T. Kohno, Y. Acar, W. Loh, in: J.A. Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.","apa":"Kohno, T., Acar, Y., &#38; Loh, W. (2023). Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. In J. A. Calandrino &#38; C. Troncoso (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association."}},{"status":"public","publication":"Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47312","page":"283–299","citation":{"ama":"Neil L, Sri Ramulu H, Acar Y, Reaves B. Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. In: <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>. USENIX Association; 2023:283–299.","ieee":"L. Neil, H. Sri Ramulu, Y. Acar, and B. Reaves, “Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice,” in <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 2023, pp. 283–299.","chicago":"Neil, Lorenzo, Harshini Sri Ramulu, Yasemin Acar, and Bradley Reaves. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” In <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299. USENIX Association, 2023.","mla":"Neil, Lorenzo, et al. “Who Comes Up with This Stuff? Interviewing Authors to Understand How They Produce Security Advice.” <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, USENIX Association, 2023, pp. 283–299.","short":"L. Neil, H. Sri Ramulu, Y. Acar, B. Reaves, in: Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, USENIX Association, 2023, pp. 283–299.","bibtex":"@inproceedings{Neil_Sri Ramulu_Acar_Reaves_2023, title={Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice}, booktitle={Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023}, publisher={USENIX Association}, author={Neil, Lorenzo and Sri Ramulu, Harshini and Acar, Yasemin and Reaves, Bradley}, year={2023}, pages={283–299} }","apa":"Neil, L., Sri Ramulu, H., Acar, Y., &#38; Reaves, B. (2023). Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice. <i>Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023</i>, 283–299."},"year":"2023","title":"Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice","date_created":"2023-09-22T13:45:47Z","author":[{"first_name":"Lorenzo","last_name":"Neil","full_name":"Neil, Lorenzo"},{"first_name":"Harshini","orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","full_name":"Sri Ramulu, Harshini","id":"99000"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"first_name":"Bradley","full_name":"Reaves, Bradley","last_name":"Reaves"}],"date_updated":"2024-06-05T12:50:02Z","publisher":"USENIX Association"},{"status":"public","publication":"CoRR","type":"journal_article","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47291","citation":{"ama":"Klemmer JH, Gutfleisch M, Stransky C, Acar Y, Sasse MA, Fahl S. “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>. 2023;abs/2309.00744. doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>","ieee":"J. H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M. A. Sasse, and S. Fahl, “‘Make Them Change it Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication,” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi: <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>.","chicago":"Klemmer, Jan H., Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, and Sascha Fahl. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i> abs/2309.00744 (2023). <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>.","short":"J.H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M.A. Sasse, S. Fahl, CoRR abs/2309.00744 (2023).","bibtex":"@article{Klemmer_Gutfleisch_Stransky_Acar_Sasse_Fahl_2023, title={“Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication}, volume={abs/2309.00744}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>}, journal={CoRR}, author={Klemmer, Jan H. and Gutfleisch, Marco and Stransky, Christian and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha}, year={2023} }","mla":"Klemmer, Jan H., et al. “‘Make Them Change It Every Week!’: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.” <i>CoRR</i>, vol. abs/2309.00744, 2023, doi:<a href=\"https://doi.org/10.48550/arXiv.2309.00744\">10.48550/arXiv.2309.00744</a>.","apa":"Klemmer, J. H., Gutfleisch, M., Stransky, C., Acar, Y., Sasse, M. A., &#38; Fahl, S. (2023). “Make Them Change it Every Week!”: A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. <i>CoRR</i>, <i>abs/2309.00744</i>. <a href=\"https://doi.org/10.48550/arXiv.2309.00744\">https://doi.org/10.48550/arXiv.2309.00744</a>"},"year":"2023","doi":"10.48550/arXiv.2309.00744","title":"\"Make Them Change it Every Week!\": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication","volume":"abs/2309.00744","author":[{"first_name":"Jan H.","last_name":"Klemmer","full_name":"Klemmer, Jan H."},{"full_name":"Gutfleisch, Marco","last_name":"Gutfleisch","first_name":"Marco"},{"last_name":"Stransky","full_name":"Stransky, Christian","first_name":"Christian"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"M. Angela","full_name":"Sasse, M. Angela","last_name":"Sasse"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T13:23:22Z","date_updated":"2024-06-05T13:38:52Z"},{"title":"\"We’ve Disabled MFA for You\": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments","doi":"10.1145/3576915.3623180","date_updated":"2024-06-05T13:52:15Z","publisher":"ACM","date_created":"2024-04-09T06:22:43Z","author":[{"last_name":"Amft","full_name":"Amft, Sabrina","first_name":"Sabrina"},{"first_name":"Sandra","full_name":"Höltervennhoff, Sandra","last_name":"Höltervennhoff"},{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"first_name":"Alexander","last_name":"Krause","full_name":"Krause, Alexander"},{"full_name":"Simko, Lucy","last_name":"Simko","first_name":"Lucy"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"year":"2023","page":"3138–3152","citation":{"ama":"Amft S, Höltervennhoff S, Huaman N, et al. “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In: Meng W, Jensen CD, Cremers C, Kirda E, eds. <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>. ACM; 2023:3138–3152. doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>","ieee":"S. Amft <i>et al.</i>, “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments,” in <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, 2023, pp. 3138–3152, doi: <a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>.","chicago":"Amft, Sabrina, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, and Sascha Fahl. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” In <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, and Engin Kirda, 3138–3152. ACM, 2023. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>.","bibtex":"@inproceedings{Amft_Höltervennhoff_Huaman_Krause_Simko_Acar_Fahl_2023, title={“We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments}, DOI={<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>}, booktitle={Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023}, publisher={ACM}, author={Amft, Sabrina and Höltervennhoff, Sandra and Huaman, Nicolas and Krause, Alexander and Simko, Lucy and Acar, Yasemin and Fahl, Sascha}, editor={Meng, Weizhi and Jensen, Christian Damsgaard and Cremers, Cas and Kirda, Engin}, year={2023}, pages={3138–3152} }","short":"S. Amft, S. Höltervennhoff, N. Huaman, A. Krause, L. Simko, Y. Acar, S. Fahl, in: W. Meng, C.D. Jensen, C. Cremers, E. Kirda (Eds.), Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, ACM, 2023, pp. 3138–3152.","mla":"Amft, Sabrina, et al. “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.” <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i>, edited by Weizhi Meng et al., ACM, 2023, pp. 3138–3152, doi:<a href=\"https://doi.org/10.1145/3576915.3623180\">10.1145/3576915.3623180</a>.","apa":"Amft, S., Höltervennhoff, S., Huaman, N., Krause, A., Simko, L., Acar, Y., &#38; Fahl, S. (2023). “We’ve Disabled MFA for You”: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. In W. Meng, C. D. Jensen, C. Cremers, &#38; E. Kirda (Eds.), <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023</i> (pp. 3138–3152). ACM. <a href=\"https://doi.org/10.1145/3576915.3623180\">https://doi.org/10.1145/3576915.3623180</a>"},"language":[{"iso":"eng"}],"_id":"53362","department":[{"_id":"858"}],"user_id":"14931","editor":[{"first_name":"Weizhi","last_name":"Meng","full_name":"Meng, Weizhi"},{"full_name":"Jensen, Christian Damsgaard","last_name":"Jensen","first_name":"Christian Damsgaard"},{"first_name":"Cas","last_name":"Cremers","full_name":"Cremers, Cas"},{"first_name":"Engin","full_name":"Kirda, Engin","last_name":"Kirda"}],"status":"public","publication":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023","type":"conference"},{"language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"76"},{"_id":"858"}],"_id":"49438","status":"public","type":"conference","publication":"2023 IEEE Secure Development Conference (SecDev)","doi":"10.1109/secdev56634.2023.00015","title":"Securing Your Crypto-API Usage Through Tool Support - A Usability Study","date_created":"2023-12-04T11:07:08Z","author":[{"last_name":"Krüger","full_name":"Krüger, Stefan","first_name":"Stefan"},{"first_name":"Michael","full_name":"Reif, Michael","last_name":"Reif"},{"last_name":"Wickert","full_name":"Wickert, Anna-Katharina","first_name":"Anna-Katharina"},{"first_name":"Sarah","full_name":"Nadi, Sarah","last_name":"Nadi"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Mezini, Mira","last_name":"Mezini","first_name":"Mira"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"publisher":"IEEE","date_updated":"2024-06-05T13:51:00Z","citation":{"ama":"Krüger S, Reif M, Wickert A-K, et al. Securing Your Crypto-API Usage Through Tool Support - A Usability Study. In: <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>","ieee":"S. Krüger <i>et al.</i>, “Securing Your Crypto-API Usage Through Tool Support - A Usability Study,” 2023, doi: <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>.","chicago":"Krüger, Stefan, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, and Sascha Fahl. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” In <i>2023 IEEE Secure Development Conference (SecDev)</i>. IEEE, 2023. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>.","bibtex":"@inproceedings{Krüger_Reif_Wickert_Nadi_Ali_Bodden_Acar_Mezini_Fahl_2023, title={Securing Your Crypto-API Usage Through Tool Support - A Usability Study}, DOI={<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>}, booktitle={2023 IEEE Secure Development Conference (SecDev)}, publisher={IEEE}, author={Krüger, Stefan and Reif, Michael and Wickert, Anna-Katharina and Nadi, Sarah and Ali, Karim and Bodden, Eric and Acar, Yasemin and Mezini, Mira and Fahl, Sascha}, year={2023} }","short":"S. Krüger, M. Reif, A.-K. Wickert, S. Nadi, K. Ali, E. Bodden, Y. Acar, M. Mezini, S. Fahl, in: 2023 IEEE Secure Development Conference (SecDev), IEEE, 2023.","mla":"Krüger, Stefan, et al. “Securing Your Crypto-API Usage Through Tool Support - A Usability Study.” <i>2023 IEEE Secure Development Conference (SecDev)</i>, IEEE, 2023, doi:<a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">10.1109/secdev56634.2023.00015</a>.","apa":"Krüger, S., Reif, M., Wickert, A.-K., Nadi, S., Ali, K., Bodden, E., Acar, Y., Mezini, M., &#38; Fahl, S. (2023). Securing Your Crypto-API Usage Through Tool Support - A Usability Study. <i>2023 IEEE Secure Development Conference (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev56634.2023.00015\">https://doi.org/10.1109/secdev56634.2023.00015</a>"},"year":"2023","publication_status":"published"},{"volume":21,"author":[{"id":"99291","full_name":"Fourné, Marcel","last_name":"Fourné","first_name":"Marcel"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"}],"date_created":"2024-04-09T07:14:43Z","date_updated":"2024-06-05T13:53:18Z","publisher":"IEEE","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","issue":"6","page":"59–63","intvolume":"        21","citation":{"ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>. 2023;21(6):59–63.","chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i> 21, no. 6 (2023): 59–63.","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, pp. 59–63, 2023.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, number={6}, journal={IEEE Security &#38; Privacy}, publisher={IEEE}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Security &#38; Privacy</i>, vol. 21, no. 6, IEEE, 2023, pp. 59–63.","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Security &#38; Privacy 21 (2023) 59–63.","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Security &#38; Privacy</i>, <i>21</i>(6), 59–63."},"year":"2023","department":[{"_id":"858"}],"user_id":"14931","_id":"53368","language":[{"iso":"eng"}],"publication":"IEEE Security & Privacy","type":"journal_article","status":"public"},{"date_created":"2024-04-09T07:11:01Z","author":[{"first_name":"Mindy","last_name":"Tran","full_name":"Tran, Mindy","id":"99001"},{"full_name":"Munyendo, Collins W","last_name":"Munyendo","first_name":"Collins W"},{"first_name":"Harshini","id":"99000","full_name":"Sri Ramulu, Harshini","last_name":"Sri Ramulu","orcid":"0000-0002-0000-5843"},{"last_name":"Rodriguez","full_name":"Rodriguez, Rachel Gonzalez","first_name":"Rachel Gonzalez"},{"last_name":"Schnell","full_name":"Schnell, Luisa Ball","first_name":"Luisa Ball"},{"first_name":"Cora","full_name":"Sula, Cora","last_name":"Sula"},{"last_name":"Simko","full_name":"Simko, Lucy","first_name":"Lucy"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"}],"date_updated":"2024-06-05T13:52:39Z","title":"Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study","citation":{"apa":"Tran, M., Munyendo, C. W., Sri Ramulu, H., Rodriguez, R. G., Schnell, L. B., Sula, C., Simko, L., &#38; Acar, Y. (2023). Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 4–4.","mla":"Tran, Mindy, et al. “Security, Privacy, and Data-Sharing Trade-Offs When Moving to the United States: Insights from a Qualitative Study.” <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 2023, pp. 4–4.","bibtex":"@inproceedings{Tran_Munyendo_Sri Ramulu_Rodriguez_Schnell_Sula_Simko_Acar_2023, title={Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study}, booktitle={2024 IEEE Symposium on Security and Privacy (SP)}, author={Tran, Mindy and Munyendo, Collins W and Sri Ramulu, Harshini and Rodriguez, Rachel Gonzalez and Schnell, Luisa Ball and Sula, Cora and Simko, Lucy and Acar, Yasemin}, year={2023}, pages={4–4} }","short":"M. Tran, C.W. Munyendo, H. Sri Ramulu, R.G. Rodriguez, L.B. Schnell, C. Sula, L. Simko, Y. Acar, in: 2024 IEEE Symposium on Security and Privacy (SP), 2023, pp. 4–4.","ama":"Tran M, Munyendo CW, Sri Ramulu H, et al. Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. In: <i>2024 IEEE Symposium on Security and Privacy (SP)</i>. ; 2023:4–4.","ieee":"M. Tran <i>et al.</i>, “Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study,” in <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 2023, pp. 4–4.","chicago":"Tran, Mindy, Collins W Munyendo, Harshini Sri Ramulu, Rachel Gonzalez Rodriguez, Luisa Ball Schnell, Cora Sula, Lucy Simko, and Yasemin Acar. “Security, Privacy, and Data-Sharing Trade-Offs When Moving to the United States: Insights from a Qualitative Study.” In <i>2024 IEEE Symposium on Security and Privacy (SP)</i>, 4–4, 2023."},"page":"4–4","year":"2023","user_id":"14931","department":[{"_id":"858"}],"_id":"53366","language":[{"iso":"eng"}],"type":"conference","publication":"2024 IEEE Symposium on Security and Privacy (SP)","status":"public"},{"issue":"6","intvolume":"        21","page":"59–63","citation":{"ama":"Fourné M, Wermke D, Fahl S, Acar Y. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur Priv</i>. 2023;21(6):59–63. doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>","apa":"Fourné, M., Wermke, D., Fahl, S., &#38; Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. <i>IEEE Secur. Priv.</i>, <i>21</i>(6), 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>","mla":"Fourné, Marcel, et al. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, 2023, pp. 59–63, doi:<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","short":"M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Secur. Priv. 21 (2023) 59–63.","bibtex":"@article{Fourné_Wermke_Fahl_Acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, DOI={<a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>}, number={6}, journal={IEEE Secur. Priv.}, author={Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={59–63} }","ieee":"M. Fourné, D. Wermke, S. Fahl, and Y. Acar, “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda,” <i>IEEE Secur. Priv.</i>, vol. 21, no. 6, pp. 59–63, 2023, doi: <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">10.1109/MSEC.2023.3316569</a>.","chicago":"Fourné, Marcel, Dominik Wermke, Sascha Fahl, and Yasemin Acar. “A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.” <i>IEEE Secur. Priv.</i> 21, no. 6 (2023): 59–63. <a href=\"https://doi.org/10.1109/MSEC.2023.3316569\">https://doi.org/10.1109/MSEC.2023.3316569</a>."},"year":"2023","volume":21,"date_created":"2024-04-08T09:02:04Z","author":[{"last_name":"Fourné","full_name":"Fourné, Marcel","id":"99291","first_name":"Marcel"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"}],"date_updated":"2024-06-05T13:51:52Z","doi":"10.1109/MSEC.2023.3316569","title":"A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda","publication":"IEEE Secur. Priv.","type":"journal_article","status":"public","department":[{"_id":"858"}],"user_id":"14931","_id":"53348","language":[{"iso":"eng"}]},{"date_updated":"2024-06-05T13:53:38Z","volume":7,"date_created":"2024-04-08T09:22:02Z","author":[{"first_name":"Lucy","last_name":"Simko","full_name":"Simko, Lucy"},{"orcid":"0000-0002-0000-5843","last_name":"Sri Ramulu","full_name":"Sri Ramulu, Harshini","id":"99000","first_name":"Harshini"},{"last_name":"Kohno","full_name":"Kohno, Tadayoshi","first_name":"Tadayoshi"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"}],"title":"The Use and Non-Use of Technology During Hurricanes","doi":"10.1145/3610215","issue":"CSCW2","year":"2023","intvolume":"         7","page":"1–54","citation":{"short":"L. Simko, H. Sri Ramulu, T. Kohno, Y. Acar, Proc. ACM Hum. Comput. Interact. 7 (2023) 1–54.","mla":"Simko, Lucy, et al. “The Use and Non-Use of Technology During Hurricanes.” <i>Proc. ACM Hum. Comput. Interact.</i>, vol. 7, no. CSCW2, 2023, pp. 1–54, doi:<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>.","bibtex":"@article{Simko_Sri Ramulu_Kohno_Acar_2023, title={The Use and Non-Use of Technology During Hurricanes}, volume={7}, DOI={<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>}, number={CSCW2}, journal={Proc. ACM Hum. Comput. Interact.}, author={Simko, Lucy and Sri Ramulu, Harshini and Kohno, Tadayoshi and Acar, Yasemin}, year={2023}, pages={1–54} }","apa":"Simko, L., Sri Ramulu, H., Kohno, T., &#38; Acar, Y. (2023). The Use and Non-Use of Technology During Hurricanes. <i>Proc. ACM Hum. Comput. Interact.</i>, <i>7</i>(CSCW2), 1–54. <a href=\"https://doi.org/10.1145/3610215\">https://doi.org/10.1145/3610215</a>","ama":"Simko L, Sri Ramulu H, Kohno T, Acar Y. The Use and Non-Use of Technology During Hurricanes. <i>Proc ACM Hum Comput Interact</i>. 2023;7(CSCW2):1–54. doi:<a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>","chicago":"Simko, Lucy, Harshini Sri Ramulu, Tadayoshi Kohno, and Yasemin Acar. “The Use and Non-Use of Technology During Hurricanes.” <i>Proc. ACM Hum. Comput. Interact.</i> 7, no. CSCW2 (2023): 1–54. <a href=\"https://doi.org/10.1145/3610215\">https://doi.org/10.1145/3610215</a>.","ieee":"L. Simko, H. Sri Ramulu, T. Kohno, and Y. Acar, “The Use and Non-Use of Technology During Hurricanes,” <i>Proc. ACM Hum. Comput. Interact.</i>, vol. 7, no. CSCW2, pp. 1–54, 2023, doi: <a href=\"https://doi.org/10.1145/3610215\">10.1145/3610215</a>."},"_id":"53352","department":[{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"publication":"Proc. ACM Hum. Comput. Interact.","type":"journal_article","status":"public"},{"quality_controlled":"1","year":"2023","date_created":"2023-08-15T12:21:05Z","publisher":"IEEE","title":"Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth","publication":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","file":[{"file_size":197727,"file_id":"56077","access_level":"closed","file_name":"Re_envisioning_Industrial_Control_Systems_security.pdf","date_updated":"2024-09-05T13:00:09Z","creator":"jrossel","date_created":"2024-09-05T13:00:09Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"text":"The security of Industrial Control Systems is relevant both for reliable production system operations and for high-quality throughput in terms of manufactured products. Security measures are designed, operated and maintained by different roles along product and production system lifecycles. Defense-in-Depth as a paradigm builds upon the assumption that breaches are unavoidable. The paper at hand provides an analysis of roles, corresponding Human Factors and their relevance for data theft and sabotage attacks. The resulting taxonomy is reflected by an example related to Additive Manufacturing. The results assist in both designing and redesigning Industrial Control System as part of an entire production system so that Defense-in-Depth with regard to Human Factors is built in by design.","lang":"eng"}],"language":[{"iso":"eng"}],"ddc":["000"],"keyword":["Defense-in-Depth","Human Factors","Production Engineering","Product Design","Systems Engineering"],"publication_status":"published","has_accepted_license":"1","citation":{"mla":"Pottebaum, Jens, et al. “Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth.” <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>, IEEE, 2023, pp. 379–85, doi:<a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">10.1109/eurospw59978.2023.00048</a>.","short":"J. Pottebaum, J. Rossel, J. Somorovsky, Y. Acar, R. Fahr, P. Arias Cabarcos, E. Bodden, I. Gräßler, in: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW), IEEE, 2023, pp. 379–385.","bibtex":"@inproceedings{Pottebaum_Rossel_Somorovsky_Acar_Fahr_Arias Cabarcos_Bodden_Gräßler_2023, title={Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth}, DOI={<a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">10.1109/eurospw59978.2023.00048</a>}, booktitle={2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)}, publisher={IEEE}, author={Pottebaum, Jens and Rossel, Jost and Somorovsky, Juraj and Acar, Yasemin and Fahr, René and Arias Cabarcos, Patricia and Bodden, Eric and Gräßler, Iris}, year={2023}, pages={379–385} }","apa":"Pottebaum, J., Rossel, J., Somorovsky, J., Acar, Y., Fahr, R., Arias Cabarcos, P., Bodden, E., &#38; Gräßler, I. (2023). Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth. <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>, 379–385. <a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">https://doi.org/10.1109/eurospw59978.2023.00048</a>","chicago":"Pottebaum, Jens, Jost Rossel, Juraj Somorovsky, Yasemin Acar, René Fahr, Patricia Arias Cabarcos, Eric Bodden, and Iris Gräßler. “Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth.” In <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>, 379–85. IEEE, 2023. <a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">https://doi.org/10.1109/eurospw59978.2023.00048</a>.","ieee":"J. Pottebaum <i>et al.</i>, “Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth,” in <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>, Delft, Netherlands, 2023, pp. 379–385, doi: <a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">10.1109/eurospw59978.2023.00048</a>.","ama":"Pottebaum J, Rossel J, Somorovsky J, et al. Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth. In: <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>. IEEE; 2023:379-385. doi:<a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">10.1109/eurospw59978.2023.00048</a>"},"page":"379-385","author":[{"first_name":"Jens","full_name":"Pottebaum, Jens","id":"405","last_name":"Pottebaum","orcid":"http://orcid.org/0000-0001-8778-2989"},{"id":"58331","full_name":"Rossel, Jost","orcid":"0000-0002-3182-4059","last_name":"Rossel","first_name":"Jost"},{"orcid":"0000-0002-3593-7720","last_name":"Somorovsky","full_name":"Somorovsky, Juraj","id":"83504","first_name":"Juraj"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"id":"111","full_name":"Fahr, René","last_name":"Fahr","first_name":"René"},{"first_name":"Patricia","full_name":"Arias Cabarcos, Patricia","id":"92804","last_name":"Arias Cabarcos"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"},{"last_name":"Gräßler","orcid":"0000-0001-5765-971X","id":"47565","full_name":"Gräßler, Iris","first_name":"Iris"}],"date_updated":"2025-07-16T11:06:47Z","main_file_link":[{"url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10190647"}],"conference":{"name":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","start_date":"2023-07-03","end_date":"2023-07-07","location":"Delft, Netherlands"},"doi":"10.1109/eurospw59978.2023.00048","type":"conference","status":"public","user_id":"58331","department":[{"_id":"34"},{"_id":"152"},{"_id":"76"},{"_id":"632"},{"_id":"858"}],"_id":"46500","file_date_updated":"2024-09-05T13:00:09Z"},{"date_created":"2023-09-22T13:21:22Z","author":[{"first_name":"Nicolas","full_name":"Huaman, Nicolas","last_name":"Huaman"},{"last_name":"Krause","full_name":"Krause, Alexander","first_name":"Alexander"},{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"first_name":"Jan H.","full_name":"Klemmer, Jan H.","last_name":"Klemmer"},{"last_name":"Stransky","full_name":"Stransky, Christian","first_name":"Christian"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"publisher":"USENIX Association","date_updated":"2024-06-05T12:52:28Z","title":"If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers","citation":{"chicago":"Huaman, Nicolas, Alexander Krause, Dominik Wermke, Jan H. Klemmer, Christian Stransky, Yasemin Acar, and Sascha Fahl. “If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.” In <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>, edited by Sonia Chiasson and Apu Kapadia, 313–330. USENIX Association, 2022.","ieee":"N. Huaman <i>et al.</i>, “If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers,” in <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>, 2022, pp. 313–330.","mla":"Huaman, Nicolas, et al. “If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.” <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>, edited by Sonia Chiasson and Apu Kapadia, USENIX Association, 2022, pp. 313–330.","short":"N. Huaman, A. Krause, D. Wermke, J.H. Klemmer, C. Stransky, Y. Acar, S. Fahl, in: S. Chiasson, A. Kapadia (Eds.), Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022, USENIX Association, 2022, pp. 313–330.","bibtex":"@inproceedings{Huaman_Krause_Wermke_Klemmer_Stransky_Acar_Fahl_2022, title={If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers}, booktitle={Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022}, publisher={USENIX Association}, author={Huaman, Nicolas and Krause, Alexander and Wermke, Dominik and Klemmer, Jan H. and Stransky, Christian and Acar, Yasemin and Fahl, Sascha}, editor={Chiasson, Sonia and Kapadia, Apu}, year={2022}, pages={313–330} }","ama":"Huaman N, Krause A, Wermke D, et al. If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. In: Chiasson S, Kapadia A, eds. <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i>. USENIX Association; 2022:313–330.","apa":"Huaman, N., Krause, A., Wermke, D., Klemmer, J. H., Stransky, C., Acar, Y., &#38; Fahl, S. (2022). If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. In S. Chiasson &#38; A. Kapadia (Eds.), <i>Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022</i> (pp. 313–330). USENIX Association."},"page":"313–330","year":"2022","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47289","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022","status":"public","editor":[{"full_name":"Chiasson, Sonia","last_name":"Chiasson","first_name":"Sonia"},{"last_name":"Kapadia","full_name":"Kapadia, Apu","first_name":"Apu"}]}]
