[{"date_updated":"2024-06-05T12:55:00Z","publisher":"IEEE","date_created":"2023-10-06T16:12:30Z","author":[{"last_name":"Jancar","full_name":"Jancar, Jan","first_name":"Jan"},{"first_name":"Marcel","last_name":"Fourné","id":"99291","full_name":"Fourné, Marcel"},{"first_name":"Daniel De Almeida","last_name":"Braga","full_name":"Braga, Daniel De Almeida"},{"full_name":"Sabt, Mohamed","last_name":"Sabt","first_name":"Mohamed"},{"last_name":"Schwabe","full_name":"Schwabe, Peter","first_name":"Peter"},{"first_name":"Gilles","full_name":"Barthe, Gilles","last_name":"Barthe"},{"first_name":"Pierre-Alain","full_name":"Fouque, Pierre-Alain","last_name":"Fouque"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"}],"title":"“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks","doi":"10.1109/sp46214.2022.9833713","publication_status":"published","year":"2022","citation":{"apa":"Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G., Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">https://doi.org/10.1109/sp46214.2022.9833713</a>","bibtex":"@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022, title={“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks}, DOI={<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt, Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, year={2022} }","short":"J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A. Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.","mla":"Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” <i>2022 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>.","chicago":"Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">https://doi.org/10.1109/sp46214.2022.9833713</a>.","ieee":"J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” 2022, doi: <a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>.","ama":"Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833713\">10.1109/sp46214.2022.9833713</a>"},"_id":"47844","user_id":"14931","department":[{"_id":"858"}],"language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"2022 IEEE Symposium on Security and Privacy (SP)","status":"public"},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47286","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022","status":"public","date_created":"2023-09-22T13:18:54Z","author":[{"last_name":"Gutfleisch","full_name":"Gutfleisch, Marco","first_name":"Marco"},{"full_name":"Klemmer, Jan H.","last_name":"Klemmer","first_name":"Jan H."},{"first_name":"Niklas","last_name":"Busch","full_name":"Busch, Niklas"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"M. Angela","last_name":"Sasse","full_name":"Sasse, M. Angela"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_updated":"2024-06-05T12:53:00Z","publisher":"IEEE","doi":"10.1109/SP46214.2022.9833756","title":"How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study","citation":{"apa":"Gutfleisch, M., Klemmer, J. H., Busch, N., Acar, Y., Sasse, M. A., &#38; Fahl, S. (2022). How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study. <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 893–910. <a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">https://doi.org/10.1109/SP46214.2022.9833756</a>","bibtex":"@inproceedings{Gutfleisch_Klemmer_Busch_Acar_Sasse_Fahl_2022, title={How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study}, DOI={<a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">10.1109/SP46214.2022.9833756</a>}, booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Gutfleisch, Marco and Klemmer, Jan H. and Busch, Niklas and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha}, year={2022}, pages={893–910} }","short":"M. Gutfleisch, J.H. Klemmer, N. Busch, Y. Acar, M.A. Sasse, S. Fahl, in: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 893–910.","mla":"Gutfleisch, Marco, et al. “How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.” <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022, pp. 893–910, doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">10.1109/SP46214.2022.9833756</a>.","ama":"Gutfleisch M, Klemmer JH, Busch N, Acar Y, Sasse MA, Fahl S. How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study. In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>. IEEE; 2022:893–910. doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">10.1109/SP46214.2022.9833756</a>","chicago":"Gutfleisch, Marco, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse, and Sascha Fahl. “How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.” In <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 893–910. IEEE, 2022. <a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">https://doi.org/10.1109/SP46214.2022.9833756</a>.","ieee":"M. Gutfleisch, J. H. Klemmer, N. Busch, Y. Acar, M. A. Sasse, and S. Fahl, “How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 893–910, doi: <a href=\"https://doi.org/10.1109/SP46214.2022.9833756\">10.1109/SP46214.2022.9833756</a>."},"page":"893–910","year":"2022"},{"date_updated":"2024-06-05T12:53:20Z","publisher":"IEEE","date_created":"2023-09-22T13:19:56Z","author":[{"first_name":"Christian","last_name":"Stransky","full_name":"Stransky, Christian"},{"first_name":"Oliver","last_name":"Wiese","full_name":"Wiese, Oliver"},{"first_name":"Volker","full_name":"Roth, Volker","last_name":"Roth"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"title":"27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University","doi":"10.1109/SP46214.2022.9833755","year":"2022","page":"860–875","citation":{"apa":"Stransky, C., Wiese, O., Roth, V., Acar, Y., &#38; Fahl, S. (2022). 27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University. <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 860–875. <a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">https://doi.org/10.1109/SP46214.2022.9833755</a>","mla":"Stransky, Christian, et al. “27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University.” <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022, pp. 860–875, doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">10.1109/SP46214.2022.9833755</a>.","short":"C. Stransky, O. Wiese, V. Roth, Y. Acar, S. Fahl, in: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 860–875.","bibtex":"@inproceedings{Stransky_Wiese_Roth_Acar_Fahl_2022, title={27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University}, DOI={<a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">10.1109/SP46214.2022.9833755</a>}, booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Stransky, Christian and Wiese, Oliver and Roth, Volker and Acar, Yasemin and Fahl, Sascha}, year={2022}, pages={860–875} }","ama":"Stransky C, Wiese O, Roth V, Acar Y, Fahl S. 27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University. In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>. IEEE; 2022:860–875. doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">10.1109/SP46214.2022.9833755</a>","ieee":"C. Stransky, O. Wiese, V. Roth, Y. Acar, and S. Fahl, “27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 860–875, doi: <a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">10.1109/SP46214.2022.9833755</a>.","chicago":"Stransky, Christian, Oliver Wiese, Volker Roth, Yasemin Acar, and Sascha Fahl. “27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University.” In <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 860–875. IEEE, 2022. <a href=\"https://doi.org/10.1109/SP46214.2022.9833755\">https://doi.org/10.1109/SP46214.2022.9833755</a>."},"_id":"47287","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"extern":"1","publication":"43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022","type":"conference","status":"public"},{"language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47283","status":"public","editor":[{"first_name":"Kevin R. B.","last_name":"Butler","full_name":"Butler, Kevin R. B."},{"first_name":"Kurt","last_name":"Thomas","full_name":"Thomas, Kurt"}],"publication":"31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022","type":"conference","title":"Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples","author":[{"last_name":"Kaur","full_name":"Kaur, Harjot","first_name":"Harjot"},{"first_name":"Sabrina","last_name":"Amft","full_name":"Amft, Sabrina"},{"last_name":"Votipka","full_name":"Votipka, Daniel","first_name":"Daniel"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2023-09-22T13:17:23Z","date_updated":"2024-06-05T12:53:43Z","publisher":"USENIX Association","page":"4041–4058","citation":{"short":"H. Kaur, S. Amft, D. Votipka, Y. Acar, S. Fahl, in: K.R.B. Butler, K. Thomas (Eds.), 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, USENIX Association, 2022, pp. 4041–4058.","bibtex":"@inproceedings{Kaur_Amft_Votipka_Acar_Fahl_2022, title={Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples}, booktitle={31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022}, publisher={USENIX Association}, author={Kaur, Harjot and Amft, Sabrina and Votipka, Daniel and Acar, Yasemin and Fahl, Sascha}, editor={Butler, Kevin R. B. and Thomas, Kurt}, year={2022}, pages={4041–4058} }","mla":"Kaur, Harjot, et al. “Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples.” <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i>, edited by Kevin R. B. Butler and Kurt Thomas, USENIX Association, 2022, pp. 4041–4058.","ama":"Kaur H, Amft S, Votipka D, Acar Y, Fahl S. Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples. In: Butler KRB, Thomas K, eds. <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i>. USENIX Association; 2022:4041–4058.","apa":"Kaur, H., Amft, S., Votipka, D., Acar, Y., &#38; Fahl, S. (2022). Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples. In K. R. B. Butler &#38; K. Thomas (Eds.), <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i> (pp. 4041–4058). USENIX Association.","ieee":"H. Kaur, S. Amft, D. Votipka, Y. Acar, and S. Fahl, “Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples,” in <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i>, 2022, pp. 4041–4058.","chicago":"Kaur, Harjot, Sabrina Amft, Daniel Votipka, Yasemin Acar, and Sascha Fahl. “Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples.” In <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i>, edited by Kevin R. B. Butler and Kurt Thomas, 4041–4058. USENIX Association, 2022."},"year":"2022"},{"status":"public","publication":"IEEE Secur. Priv.","type":"journal_article","extern":"1","language":[{"iso":"eng"}],"_id":"47290","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","year":"2022","intvolume":"        20","page":"49–60","citation":{"ama":"Huaman N, Amft S, Oltrogge M, Acar Y, Fahl S. They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web. <i>IEEE Secur Priv</i>. 2022;20(2):49–60. doi:<a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">10.1109/MSEC.2021.3123795</a>","ieee":"N. Huaman, S. Amft, M. Oltrogge, Y. Acar, and S. Fahl, “They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web,” <i>IEEE Secur. Priv.</i>, vol. 20, no. 2, pp. 49–60, 2022, doi: <a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">10.1109/MSEC.2021.3123795</a>.","chicago":"Huaman, Nicolas, Sabrina Amft, Marten Oltrogge, Yasemin Acar, and Sascha Fahl. “They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web.” <i>IEEE Secur. Priv.</i> 20, no. 2 (2022): 49–60. <a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">https://doi.org/10.1109/MSEC.2021.3123795</a>.","apa":"Huaman, N., Amft, S., Oltrogge, M., Acar, Y., &#38; Fahl, S. (2022). They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web. <i>IEEE Secur. Priv.</i>, <i>20</i>(2), 49–60. <a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">https://doi.org/10.1109/MSEC.2021.3123795</a>","bibtex":"@article{Huaman_Amft_Oltrogge_Acar_Fahl_2022, title={They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web}, volume={20}, DOI={<a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">10.1109/MSEC.2021.3123795</a>}, number={2}, journal={IEEE Secur. Priv.}, author={Huaman, Nicolas and Amft, Sabrina and Oltrogge, Marten and Acar, Yasemin and Fahl, Sascha}, year={2022}, pages={49–60} }","mla":"Huaman, Nicolas, et al. “They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web.” <i>IEEE Secur. Priv.</i>, vol. 20, no. 2, 2022, pp. 49–60, doi:<a href=\"https://doi.org/10.1109/MSEC.2021.3123795\">10.1109/MSEC.2021.3123795</a>.","short":"N. Huaman, S. Amft, M. Oltrogge, Y. Acar, S. Fahl, IEEE Secur. Priv. 20 (2022) 49–60."},"issue":"2","title":"They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web","doi":"10.1109/MSEC.2021.3123795","date_updated":"2024-06-05T12:54:05Z","volume":20,"date_created":"2023-09-22T13:22:05Z","author":[{"first_name":"Nicolas","full_name":"Huaman, Nicolas","last_name":"Huaman"},{"first_name":"Sabrina","full_name":"Amft, Sabrina","last_name":"Amft"},{"first_name":"Marten","last_name":"Oltrogge","full_name":"Oltrogge, Marten"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}]},{"user_id":"14931","department":[{"_id":"858"}],"_id":"47843","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"2022 IEEE Symposium on Security and Privacy (SP)","status":"public","date_created":"2023-10-06T16:12:18Z","author":[{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"first_name":"Noah","last_name":"Wohler","full_name":"Wohler, Noah"},{"first_name":"Jan H.","last_name":"Klemmer","full_name":"Klemmer, Jan H."},{"first_name":"Marcel","last_name":"Fourné","full_name":"Fourné, Marcel","id":"99291"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"publisher":"IEEE","date_updated":"2024-06-05T12:55:32Z","doi":"10.1109/sp46214.2022.9833686","title":"Committed to Trust: A Qualitative Study on Security &amp; Trust in Open Source Software Projects","publication_status":"published","citation":{"chicago":"Wermke, Dominik, Noah Wohler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, and Sascha Fahl. “Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects.” In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">https://doi.org/10.1109/sp46214.2022.9833686</a>.","ieee":"D. Wermke, N. Wohler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects,” 2022, doi: <a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>.","ama":"Wermke D, Wohler N, Klemmer JH, Fourné M, Acar Y, Fahl S. Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects. In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>","apa":"Wermke, D., Wohler, N., Klemmer, J. H., Fourné, M., Acar, Y., &#38; Fahl, S. (2022). Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects. <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">https://doi.org/10.1109/sp46214.2022.9833686</a>","short":"D. Wermke, N. Wohler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.","mla":"Wermke, Dominik, et al. “Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects.” <i>2022 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2022, doi:<a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>.","bibtex":"@inproceedings{Wermke_Wohler_Klemmer_Fourné_Acar_Fahl_2022, title={Committed to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects}, DOI={<a href=\"https://doi.org/10.1109/sp46214.2022.9833686\">10.1109/sp46214.2022.9833686</a>}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Wermke, Dominik and Wohler, Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha}, year={2022} }"},"year":"2022"},{"year":"2022","citation":{"chicago":"Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” In <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 632–649. IEEE, 2022. <a href=\"https://doi.org/10.1109/SP46214.2022.9833713\">https://doi.org/10.1109/SP46214.2022.9833713</a>.","ieee":"J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 632–649, doi: <a href=\"https://doi.org/10.1109/SP46214.2022.9833713\">10.1109/SP46214.2022.9833713</a>.","ama":"Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>. IEEE; 2022:632–649. doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833713\">10.1109/SP46214.2022.9833713</a>","bibtex":"@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022, title={“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks}, DOI={<a href=\"https://doi.org/10.1109/SP46214.2022.9833713\">10.1109/SP46214.2022.9833713</a>}, booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt, Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, year={2022}, pages={632–649} }","mla":"Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022, pp. 632–649, doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833713\">10.1109/SP46214.2022.9833713</a>.","short":"J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A. Fouque, Y. Acar, in: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 632–649.","apa":"Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G., Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 632–649. <a href=\"https://doi.org/10.1109/SP46214.2022.9833713\">https://doi.org/10.1109/SP46214.2022.9833713</a>"},"page":"632–649","date_updated":"2024-06-05T13:20:54Z","publisher":"IEEE","author":[{"full_name":"Jancar, Jan","last_name":"Jancar","first_name":"Jan"},{"first_name":"Marcel","full_name":"Fourné, Marcel","last_name":"Fourné"},{"first_name":"Daniel De Almeida","last_name":"Braga","full_name":"Braga, Daniel De Almeida"},{"full_name":"Sabt, Mohamed","last_name":"Sabt","first_name":"Mohamed"},{"first_name":"Peter","full_name":"Schwabe, Peter","last_name":"Schwabe"},{"first_name":"Gilles","full_name":"Barthe, Gilles","last_name":"Barthe"},{"full_name":"Fouque, Pierre-Alain","last_name":"Fouque","first_name":"Pierre-Alain"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"}],"date_created":"2023-09-22T13:20:28Z","title":"\"They’re not that hard to mitigate\": What Cryptographic Library Developers Think About Timing Attacks","doi":"10.1109/SP46214.2022.9833713","type":"conference","publication":"43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022","status":"public","_id":"47288","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"extern":"1"},{"year":"2022","page":"1880–1896","citation":{"apa":"Wermke, D., Wöhler, N., Klemmer, J. H., Fourné, M., Acar, Y., &#38; Fahl, S. (2022). Committed to Trust: A Qualitative Study on Security &#38; Trust in Open Source Software Projects. <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 1880–1896. <a href=\"https://doi.org/10.1109/SP46214.2022.9833686\">https://doi.org/10.1109/SP46214.2022.9833686</a>","bibtex":"@inproceedings{Wermke_Wöhler_Klemmer_Fourné_Acar_Fahl_2022, title={Committed to Trust: A Qualitative Study on Security &#38; Trust in Open Source Software Projects}, DOI={<a href=\"https://doi.org/10.1109/SP46214.2022.9833686\">10.1109/SP46214.2022.9833686</a>}, booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Wermke, Dominik and Wöhler, Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha}, year={2022}, pages={1880–1896} }","short":"D. Wermke, N. Wöhler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 1880–1896.","mla":"Wermke, Dominik, et al. “Committed to Trust: A Qualitative Study on Security &#38; Trust in Open Source Software Projects.” <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022, pp. 1880–1896, doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833686\">10.1109/SP46214.2022.9833686</a>.","ama":"Wermke D, Wöhler N, Klemmer JH, Fourné M, Acar Y, Fahl S. Committed to Trust: A Qualitative Study on Security &#38; Trust in Open Source Software Projects. In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>. IEEE; 2022:1880–1896. doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833686\">10.1109/SP46214.2022.9833686</a>","ieee":"D. Wermke, N. Wöhler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed to Trust: A Qualitative Study on Security &#38; Trust in Open Source Software Projects,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 1880–1896, doi: <a href=\"https://doi.org/10.1109/SP46214.2022.9833686\">10.1109/SP46214.2022.9833686</a>.","chicago":"Wermke, Dominik, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, and Sascha Fahl. “Committed to Trust: A Qualitative Study on Security &#38; Trust in Open Source Software Projects.” In <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 1880–1896. IEEE, 2022. <a href=\"https://doi.org/10.1109/SP46214.2022.9833686\">https://doi.org/10.1109/SP46214.2022.9833686</a>."},"title":"Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects","doi":"10.1109/SP46214.2022.9833686","date_updated":"2024-06-05T13:34:37Z","publisher":"IEEE","author":[{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"Noah","last_name":"Wöhler","full_name":"Wöhler, Noah"},{"full_name":"Klemmer, Jan H.","last_name":"Klemmer","first_name":"Jan H."},{"last_name":"Fourné","full_name":"Fourné, Marcel","first_name":"Marcel"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T13:18:27Z","status":"public","publication":"43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022","type":"conference","extern":"1","language":[{"iso":"eng"}],"_id":"47285","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931"},{"extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47284","status":"public","publication":"43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022","type":"conference","doi":"10.1109/SP46214.2022.9833779","title":"\"Desperate Times Call for Desperate Measures\": User Concerns with Mobile Loan Apps in Kenya","date_created":"2023-09-22T13:18:01Z","author":[{"last_name":"Munyendo","full_name":"Munyendo, Collins W.","first_name":"Collins W."},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Aviv, Adam J.","last_name":"Aviv","first_name":"Adam J."}],"date_updated":"2024-06-05T13:34:58Z","publisher":"IEEE","page":"2304–2319","citation":{"apa":"Munyendo, C. W., Acar, Y., &#38; Aviv, A. J. (2022). “Desperate Times Call for Desperate Measures”: User Concerns with Mobile Loan Apps in Kenya. <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2304–2319. <a href=\"https://doi.org/10.1109/SP46214.2022.9833779\">https://doi.org/10.1109/SP46214.2022.9833779</a>","short":"C.W. Munyendo, Y. Acar, A.J. Aviv, in: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 2304–2319.","bibtex":"@inproceedings{Munyendo_Acar_Aviv_2022, title={“Desperate Times Call for Desperate Measures”: User Concerns with Mobile Loan Apps in Kenya}, DOI={<a href=\"https://doi.org/10.1109/SP46214.2022.9833779\">10.1109/SP46214.2022.9833779</a>}, booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Munyendo, Collins W. and Acar, Yasemin and Aviv, Adam J.}, year={2022}, pages={2304–2319} }","mla":"Munyendo, Collins W., et al. “‘Desperate Times Call for Desperate Measures’: User Concerns with Mobile Loan Apps in Kenya.” <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022, pp. 2304–2319, doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833779\">10.1109/SP46214.2022.9833779</a>.","chicago":"Munyendo, Collins W., Yasemin Acar, and Adam J. Aviv. “‘Desperate Times Call for Desperate Measures’: User Concerns with Mobile Loan Apps in Kenya.” In <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2304–2319. IEEE, 2022. <a href=\"https://doi.org/10.1109/SP46214.2022.9833779\">https://doi.org/10.1109/SP46214.2022.9833779</a>.","ieee":"C. W. Munyendo, Y. Acar, and A. J. Aviv, “‘Desperate Times Call for Desperate Measures’: User Concerns with Mobile Loan Apps in Kenya,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 2304–2319, doi: <a href=\"https://doi.org/10.1109/SP46214.2022.9833779\">10.1109/SP46214.2022.9833779</a>.","ama":"Munyendo CW, Acar Y, Aviv AJ. “Desperate Times Call for Desperate Measures”: User Concerns with Mobile Loan Apps in Kenya. In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>. IEEE; 2022:2304–2319. doi:<a href=\"https://doi.org/10.1109/SP46214.2022.9833779\">10.1109/SP46214.2022.9833779</a>"},"year":"2022"},{"citation":{"bibtex":"@article{Krause_Klemmer_Huaman_Wermke_Acar_Fahl_2022, title={Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories}, volume={abs/2211.06213}, DOI={<a href=\"https://doi.org/10.48550/arXiv.2211.06213\">10.48550/arXiv.2211.06213</a>}, journal={CoRR}, author={Krause, Alexander and Klemmer, Jan H. and Huaman, Nicolas and Wermke, Dominik and Acar, Yasemin and Fahl, Sascha}, year={2022} }","mla":"Krause, Alexander, et al. “Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories.” <i>CoRR</i>, vol. abs/2211.06213, 2022, doi:<a href=\"https://doi.org/10.48550/arXiv.2211.06213\">10.48550/arXiv.2211.06213</a>.","short":"A. Krause, J.H. Klemmer, N. Huaman, D. Wermke, Y. Acar, S. Fahl, CoRR abs/2211.06213 (2022).","apa":"Krause, A., Klemmer, J. H., Huaman, N., Wermke, D., Acar, Y., &#38; Fahl, S. (2022). Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories. <i>CoRR</i>, <i>abs/2211.06213</i>. <a href=\"https://doi.org/10.48550/arXiv.2211.06213\">https://doi.org/10.48550/arXiv.2211.06213</a>","chicago":"Krause, Alexander, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, and Sascha Fahl. “Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories.” <i>CoRR</i> abs/2211.06213 (2022). <a href=\"https://doi.org/10.48550/arXiv.2211.06213\">https://doi.org/10.48550/arXiv.2211.06213</a>.","ieee":"A. Krause, J. H. Klemmer, N. Huaman, D. Wermke, Y. Acar, and S. Fahl, “Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories,” <i>CoRR</i>, vol. abs/2211.06213, 2022, doi: <a href=\"https://doi.org/10.48550/arXiv.2211.06213\">10.48550/arXiv.2211.06213</a>.","ama":"Krause A, Klemmer JH, Huaman N, Wermke D, Acar Y, Fahl S. Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories. <i>CoRR</i>. 2022;abs/2211.06213. doi:<a href=\"https://doi.org/10.48550/arXiv.2211.06213\">10.48550/arXiv.2211.06213</a>"},"year":"2022","doi":"10.48550/arXiv.2211.06213","title":"Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories","author":[{"first_name":"Alexander","last_name":"Krause","full_name":"Krause, Alexander"},{"full_name":"Klemmer, Jan H.","last_name":"Klemmer","first_name":"Jan H."},{"full_name":"Huaman, Nicolas","last_name":"Huaman","first_name":"Nicolas"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T13:16:33Z","volume":"abs/2211.06213","date_updated":"2024-06-05T13:36:09Z","status":"public","type":"journal_article","publication":"CoRR","language":[{"iso":"eng"}],"extern":"1","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47281"},{"language":[{"iso":"eng"}],"extern":"1","_id":"47265","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","editor":[{"first_name":"Michael","full_name":"Bailey, Michael","last_name":"Bailey"},{"first_name":"Rachel","full_name":"Greenstadt, Rachel","last_name":"Greenstadt"}],"status":"public","publication":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","type":"conference","title":"A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises","publisher":"USENIX Association","date_updated":"2024-06-05T12:57:43Z","date_created":"2023-09-22T13:02:54Z","author":[{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"full_name":"von Skarczinski, Bennet","last_name":"von Skarczinski","first_name":"Bennet"},{"full_name":"Stransky, Christian","last_name":"Stransky","first_name":"Christian"},{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"Arne","full_name":"Dreißigacker, Arne","last_name":"Dreißigacker"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"year":"2021","page":"1235–1252","citation":{"apa":"Huaman, N., von Skarczinski, B., Stransky, C., Wermke, D., Acar, Y., Dreißigacker, A., &#38; Fahl, S. (2021). A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i> (pp. 1235–1252). USENIX Association.","ama":"Huaman N, von Skarczinski B, Stransky C, et al. A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. In: Bailey M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>. USENIX Association; 2021:1235–1252.","bibtex":"@inproceedings{Huaman_von Skarczinski_Stransky_Wermke_Acar_Dreißigacker_Fahl_2021, title={A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises}, booktitle={30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021}, publisher={USENIX Association}, author={Huaman, Nicolas and von Skarczinski, Bennet and Stransky, Christian and Wermke, Dominik and Acar, Yasemin and Dreißigacker, Arne and Fahl, Sascha}, editor={Bailey, Michael and Greenstadt, Rachel}, year={2021}, pages={1235–1252} }","short":"N. Huaman, B. von Skarczinski, C. Stransky, D. Wermke, Y. Acar, A. Dreißigacker, S. Fahl, in: M. Bailey, R. Greenstadt (Eds.), 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, USENIX Association, 2021, pp. 1235–1252.","mla":"Huaman, Nicolas, et al. “A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-Sized Enterprises.” <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, USENIX Association, 2021, pp. 1235–1252.","ieee":"N. Huaman <i>et al.</i>, “A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises,” in <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, 2021, pp. 1235–1252.","chicago":"Huaman, Nicolas, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, and Sascha Fahl. “A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-Sized Enterprises.” In <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, 1235–1252. USENIX Association, 2021."}},{"page":"437–454","citation":{"ama":"Stransky C, Wermke D, Schrader J, et al. On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. In: Chiasson S, ed. <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>. USENIX Association; 2021:437–454.","ieee":"C. Stransky <i>et al.</i>, “On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security,” in <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, 2021, pp. 437–454.","chicago":"Stransky, Christian, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, and Sascha Fahl. “On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.” In <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, 437–454. USENIX Association, 2021.","apa":"Stransky, C., Wermke, D., Schrader, J., Huaman, N., Acar, Y., Fehlhaber, A. L., Wei, M., Ur, B., &#38; Fahl, S. (2021). On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. In S. Chiasson (Ed.), <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i> (pp. 437–454). USENIX Association.","short":"C. Stransky, D. Wermke, J. Schrader, N. Huaman, Y. Acar, A.L. Fehlhaber, M. Wei, B. Ur, S. Fahl, in: S. Chiasson (Ed.), Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021, USENIX Association, 2021, pp. 437–454.","bibtex":"@inproceedings{Stransky_Wermke_Schrader_Huaman_Acar_Fehlhaber_Wei_Ur_Fahl_2021, title={On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security}, booktitle={Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021}, publisher={USENIX Association}, author={Stransky, Christian and Wermke, Dominik and Schrader, Johanna and Huaman, Nicolas and Acar, Yasemin and Fehlhaber, Anna Lena and Wei, Miranda and Ur, Blase and Fahl, Sascha}, editor={Chiasson, Sonia}, year={2021}, pages={437–454} }","mla":"Stransky, Christian, et al. “On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.” <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, USENIX Association, 2021, pp. 437–454."},"year":"2021","title":"On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security","author":[{"full_name":"Stransky, Christian","last_name":"Stransky","first_name":"Christian"},{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"last_name":"Schrader","full_name":"Schrader, Johanna","first_name":"Johanna"},{"last_name":"Huaman","full_name":"Huaman, Nicolas","first_name":"Nicolas"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"last_name":"Fehlhaber","full_name":"Fehlhaber, Anna Lena","first_name":"Anna Lena"},{"full_name":"Wei, Miranda","last_name":"Wei","first_name":"Miranda"},{"last_name":"Ur","full_name":"Ur, Blase","first_name":"Blase"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T13:04:56Z","publisher":"USENIX Association","date_updated":"2024-06-05T13:02:20Z","status":"public","editor":[{"first_name":"Sonia","last_name":"Chiasson","full_name":"Chiasson, Sonia"}],"publication":"Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021","type":"conference","extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47268"},{"author":[{"first_name":"Nicolas","full_name":"Huaman, Nicolas","last_name":"Huaman"},{"first_name":"Sabrina","last_name":"Amft","full_name":"Amft, Sabrina"},{"first_name":"Marten","last_name":"Oltrogge","full_name":"Oltrogge, Marten"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2023-09-22T13:04:10Z","date_updated":"2024-06-05T13:02:40Z","publisher":"IEEE","doi":"10.1109/sp40001.2021.00094","title":"They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites","publication_status":"published","citation":{"ieee":"N. Huaman, S. Amft, M. Oltrogge, Y. Acar, and S. Fahl, “They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites,” 2021, doi: <a href=\"https://doi.org/10.1109/sp40001.2021.00094\">10.1109/sp40001.2021.00094</a>.","chicago":"Huaman, Nicolas, Sabrina Amft, Marten Oltrogge, Yasemin Acar, and Sascha Fahl. “They Would Do Better If They Worked Together: The Case of Interaction Problems Between Password Managers and Websites.” In <i>2021 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2021. <a href=\"https://doi.org/10.1109/sp40001.2021.00094\">https://doi.org/10.1109/sp40001.2021.00094</a>.","ama":"Huaman N, Amft S, Oltrogge M, Acar Y, Fahl S. They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites. In: <i>2021 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2021. doi:<a href=\"https://doi.org/10.1109/sp40001.2021.00094\">10.1109/sp40001.2021.00094</a>","bibtex":"@inproceedings{Huaman_Amft_Oltrogge_Acar_Fahl_2021, title={They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites}, DOI={<a href=\"https://doi.org/10.1109/sp40001.2021.00094\">10.1109/sp40001.2021.00094</a>}, booktitle={2021 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Huaman, Nicolas and Amft, Sabrina and Oltrogge, Marten and Acar, Yasemin and Fahl, Sascha}, year={2021} }","mla":"Huaman, Nicolas, et al. “They Would Do Better If They Worked Together: The Case of Interaction Problems Between Password Managers and Websites.” <i>2021 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2021, doi:<a href=\"https://doi.org/10.1109/sp40001.2021.00094\">10.1109/sp40001.2021.00094</a>.","short":"N. Huaman, S. Amft, M. Oltrogge, Y. Acar, S. Fahl, in: 2021 IEEE Symposium on Security and Privacy (SP), IEEE, 2021.","apa":"Huaman, N., Amft, S., Oltrogge, M., Acar, Y., &#38; Fahl, S. (2021). They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites. <i>2021 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp40001.2021.00094\">https://doi.org/10.1109/sp40001.2021.00094</a>"},"year":"2021","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47267","language":[{"iso":"eng"}],"extern":"1","publication":"2021 IEEE Symposium on Security and Privacy (SP)","type":"conference","status":"public"},{"year":"2021","page":"411–428","citation":{"apa":"Haney, J. M., Acar, Y., &#38; Furman, S. (2021). “It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security. In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i> (pp. 411–428). USENIX Association.","bibtex":"@inproceedings{Haney_Acar_Furman_2021, title={“It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security}, booktitle={30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021}, publisher={USENIX Association}, author={Haney, Julie M. and Acar, Yasemin and Furman, Susanne}, editor={Bailey, Michael and Greenstadt, Rachel}, year={2021}, pages={411–428} }","mla":"Haney, Julie M., et al. “‘It’s the Company, the Government, You and I’: User Perceptions of Responsibility for Smart Home Privacy and Security.” <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, USENIX Association, 2021, pp. 411–428.","short":"J.M. Haney, Y. Acar, S. Furman, in: M. Bailey, R. Greenstadt (Eds.), 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, USENIX Association, 2021, pp. 411–428.","ama":"Haney JM, Acar Y, Furman S. “It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security. In: Bailey M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>. USENIX Association; 2021:411–428.","ieee":"J. M. Haney, Y. Acar, and S. Furman, “‘It’s the Company, the Government, You and I’: User Perceptions of Responsibility for Smart Home Privacy and Security,” in <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, 2021, pp. 411–428.","chicago":"Haney, Julie M., Yasemin Acar, and Susanne Furman. “‘It’s the Company, the Government, You and I’: User Perceptions of Responsibility for Smart Home Privacy and Security.” In <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, 411–428. USENIX Association, 2021."},"date_updated":"2024-06-05T13:03:16Z","publisher":"USENIX Association","author":[{"first_name":"Julie M.","last_name":"Haney","full_name":"Haney, Julie M."},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"full_name":"Furman, Susanne","last_name":"Furman","first_name":"Susanne"}],"date_created":"2023-09-22T13:03:50Z","title":"\"It’s the Company, the Government, You and I\": User Perceptions of Responsibility for Smart Home Privacy and Security","publication":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","type":"conference","editor":[{"first_name":"Michael","last_name":"Bailey","full_name":"Bailey, Michael"},{"last_name":"Greenstadt","full_name":"Greenstadt, Rachel","first_name":"Rachel"}],"status":"public","_id":"47266","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"extern":"1"},{"language":[{"iso":"eng"}],"extern":"1","_id":"47264","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"editor":[{"first_name":"Michael","last_name":"Bailey","full_name":"Bailey, Michael"},{"first_name":"Rachel","last_name":"Greenstadt","full_name":"Greenstadt, Rachel"}],"status":"public","type":"conference","publication":"30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021","title":"Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications","publisher":"USENIX Association","date_updated":"2024-06-05T13:01:22Z","author":[{"first_name":"Marten","last_name":"Oltrogge","full_name":"Oltrogge, Marten"},{"last_name":"Huaman","full_name":"Huaman, Nicolas","first_name":"Nicolas"},{"last_name":"Amft","full_name":"Amft, Sabrina","first_name":"Sabrina"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"first_name":"Michael","last_name":"Backes","full_name":"Backes, Michael"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"date_created":"2023-09-22T13:02:22Z","year":"2021","citation":{"apa":"Oltrogge, M., Huaman, N., Amft, S., Acar, Y., Backes, M., &#38; Fahl, S. (2021). Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i> (pp. 4347–4364). USENIX Association.","short":"M. Oltrogge, N. Huaman, S. Amft, Y. Acar, M. Backes, S. Fahl, in: M. Bailey, R. Greenstadt (Eds.), 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, USENIX Association, 2021, pp. 4347–4364.","bibtex":"@inproceedings{Oltrogge_Huaman_Amft_Acar_Backes_Fahl_2021, title={Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications}, booktitle={30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021}, publisher={USENIX Association}, author={Oltrogge, Marten and Huaman, Nicolas and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha}, editor={Bailey, Michael and Greenstadt, Rachel}, year={2021}, pages={4347–4364} }","mla":"Oltrogge, Marten, et al. “Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.” <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, USENIX Association, 2021, pp. 4347–4364.","chicago":"Oltrogge, Marten, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, and Sascha Fahl. “Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.” In <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, 4347–4364. USENIX Association, 2021.","ieee":"M. Oltrogge, N. Huaman, S. Amft, Y. Acar, M. Backes, and S. Fahl, “Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications,” in <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, 2021, pp. 4347–4364.","ama":"Oltrogge M, Huaman N, Amft S, Acar Y, Backes M, Fahl S. Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. In: Bailey M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>. USENIX Association; 2021:4347–4364."},"page":"4347–4364"},{"title":"Investigating Web Service Account Remediation Advice","date_created":"2023-09-22T13:05:16Z","author":[{"first_name":"Lorenzo","last_name":"Neil","full_name":"Neil, Lorenzo"},{"first_name":"Elijah","full_name":"Bouma-Sims, Elijah","last_name":"Bouma-Sims"},{"first_name":"Evan","full_name":"Lafontaine, Evan","last_name":"Lafontaine"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Bradley","full_name":"Reaves, Bradley","last_name":"Reaves"}],"date_updated":"2024-06-05T13:03:38Z","publisher":"USENIX Association","citation":{"ama":"Neil L, Bouma-Sims E, Lafontaine E, Acar Y, Reaves B. Investigating Web Service Account Remediation Advice. In: Chiasson S, ed. <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>. USENIX Association; 2021:359–376.","ieee":"L. Neil, E. Bouma-Sims, E. Lafontaine, Y. Acar, and B. Reaves, “Investigating Web Service Account Remediation Advice,” in <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, 2021, pp. 359–376.","chicago":"Neil, Lorenzo, Elijah Bouma-Sims, Evan Lafontaine, Yasemin Acar, and Bradley Reaves. “Investigating Web Service Account Remediation Advice.” In <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, 359–376. USENIX Association, 2021.","apa":"Neil, L., Bouma-Sims, E., Lafontaine, E., Acar, Y., &#38; Reaves, B. (2021). Investigating Web Service Account Remediation Advice. In S. Chiasson (Ed.), <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i> (pp. 359–376). USENIX Association.","bibtex":"@inproceedings{Neil_Bouma-Sims_Lafontaine_Acar_Reaves_2021, title={Investigating Web Service Account Remediation Advice}, booktitle={Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021}, publisher={USENIX Association}, author={Neil, Lorenzo and Bouma-Sims, Elijah and Lafontaine, Evan and Acar, Yasemin and Reaves, Bradley}, editor={Chiasson, Sonia}, year={2021}, pages={359–376} }","mla":"Neil, Lorenzo, et al. “Investigating Web Service Account Remediation Advice.” <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, USENIX Association, 2021, pp. 359–376.","short":"L. Neil, E. Bouma-Sims, E. Lafontaine, Y. Acar, B. Reaves, in: S. Chiasson (Ed.), Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021, USENIX Association, 2021, pp. 359–376."},"page":"359–376","year":"2021","extern":"1","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47269","status":"public","editor":[{"full_name":"Chiasson, Sonia","last_name":"Chiasson","first_name":"Sonia"}],"type":"conference","publication":"Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021"},{"title":"Human Factors in Secure Software Development","author":[{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"}],"date_created":"2023-09-22T13:06:40Z","date_updated":"2024-06-05T12:56:39Z","publisher":"University of Marburg, Germany","citation":{"chicago":"Acar, Yasemin. <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany, 2021.","ieee":"Y. Acar, <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany, 2021.","ama":"Acar Y. <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany; 2021.","bibtex":"@book{Acar_2021, title={Human Factors in Secure Software Development}, publisher={University of Marburg, Germany}, author={Acar, Yasemin}, year={2021} }","short":"Y. Acar, Human Factors in Secure Software Development, University of Marburg, Germany, 2021.","mla":"Acar, Yasemin. <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany, 2021.","apa":"Acar, Y. (2021). <i>Human Factors in Secure Software Development</i>. University of Marburg, Germany."},"year":"2021","extern":"1","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47271","status":"public","type":"dissertation"},{"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47261","language":[{"iso":"eng"}],"extern":"1","publication":"HCI for Cybersecurity, Privacy and Trust","type":"book_chapter","status":"public","author":[{"first_name":"Julie M.","last_name":"Haney","full_name":"Haney, Julie M."},{"full_name":"Furman, Susanne M.","last_name":"Furman","first_name":"Susanne M."},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"}],"date_created":"2023-09-22T12:59:53Z","date_updated":"2024-06-05T13:04:23Z","publisher":"Springer International Publishing","doi":"10.1007/978-3-030-50309-3_26","title":"Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges","publication_identifier":{"isbn":["9783030503086","9783030503093"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","citation":{"bibtex":"@inbook{Haney_Furman_Acar_2020, place={Cham}, title={Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-50309-3_26\">10.1007/978-3-030-50309-3_26</a>}, booktitle={HCI for Cybersecurity, Privacy and Trust}, publisher={Springer International Publishing}, author={Haney, Julie M. and Furman, Susanne M. and Acar, Yasemin}, year={2020} }","mla":"Haney, Julie M., et al. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” <i>HCI for Cybersecurity, Privacy and Trust</i>, Springer International Publishing, 2020, doi:<a href=\"https://doi.org/10.1007/978-3-030-50309-3_26\">10.1007/978-3-030-50309-3_26</a>.","short":"J.M. Haney, S.M. Furman, Y. Acar, in: HCI for Cybersecurity, Privacy and Trust, Springer International Publishing, Cham, 2020.","apa":"Haney, J. M., Furman, S. M., &#38; Acar, Y. (2020). Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In <i>HCI for Cybersecurity, Privacy and Trust</i>. Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-030-50309-3_26\">https://doi.org/10.1007/978-3-030-50309-3_26</a>","ieee":"J. M. Haney, S. M. Furman, and Y. Acar, “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges,” in <i>HCI for Cybersecurity, Privacy and Trust</i>, Cham: Springer International Publishing, 2020.","chicago":"Haney, Julie M., Susanne M. Furman, and Yasemin Acar. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” In <i>HCI for Cybersecurity, Privacy and Trust</i>. Cham: Springer International Publishing, 2020. <a href=\"https://doi.org/10.1007/978-3-030-50309-3_26\">https://doi.org/10.1007/978-3-030-50309-3_26</a>.","ama":"Haney JM, Furman SM, Acar Y. Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In: <i>HCI for Cybersecurity, Privacy and Trust</i>. Springer International Publishing; 2020. doi:<a href=\"https://doi.org/10.1007/978-3-030-50309-3_26\">10.1007/978-3-030-50309-3_26</a>"},"year":"2020","place":"Cham"},{"_id":"47260","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","extern":"1","language":[{"iso":"eng"}],"publication":"Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020","type":"conference","editor":[{"full_name":"Lipford, Heather Richter","last_name":"Lipford","first_name":"Heather Richter"},{"full_name":"Chiasson, Sonia","last_name":"Chiasson","first_name":"Sonia"}],"status":"public","publisher":"USENIX Association","date_updated":"2024-06-05T13:04:48Z","author":[{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"first_name":"Nicolas","last_name":"Huaman","full_name":"Huaman, Nicolas"},{"full_name":"Stransky, Christian","last_name":"Stransky","first_name":"Christian"},{"first_name":"Niklas","last_name":"Busch","full_name":"Busch, Niklas"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T12:59:31Z","title":"Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites","year":"2020","page":"359–377","citation":{"bibtex":"@inproceedings{Wermke_Huaman_Stransky_Busch_Acar_Fahl_2020, title={Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites}, booktitle={Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020}, publisher={USENIX Association}, author={Wermke, Dominik and Huaman, Nicolas and Stransky, Christian and Busch, Niklas and Acar, Yasemin and Fahl, Sascha}, editor={Lipford, Heather Richter and Chiasson, Sonia}, year={2020}, pages={359–377} }","short":"D. Wermke, N. Huaman, C. Stransky, N. Busch, Y. Acar, S. Fahl, in: H.R. Lipford, S. Chiasson (Eds.), Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020, USENIX Association, 2020, pp. 359–377.","mla":"Wermke, Dominik, et al. “Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites.” <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>, edited by Heather Richter Lipford and Sonia Chiasson, USENIX Association, 2020, pp. 359–377.","apa":"Wermke, D., Huaman, N., Stransky, C., Busch, N., Acar, Y., &#38; Fahl, S. (2020). Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites. In H. R. Lipford &#38; S. Chiasson (Eds.), <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i> (pp. 359–377). USENIX Association.","ama":"Wermke D, Huaman N, Stransky C, Busch N, Acar Y, Fahl S. Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites. In: Lipford HR, Chiasson S, eds. <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>. USENIX Association; 2020:359–377.","chicago":"Wermke, Dominik, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, and Sascha Fahl. “Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites.” In <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>, edited by Heather Richter Lipford and Sonia Chiasson, 359–377. USENIX Association, 2020.","ieee":"D. Wermke, N. Huaman, C. Stransky, N. Busch, Y. Acar, and S. Fahl, “Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites,” in <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>, 2020, pp. 359–377."}},{"doi":"10.1145/3313831.3376142","title":"Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs","author":[{"full_name":"Gorski, Peter Leo","last_name":"Gorski","first_name":"Peter Leo"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"last_name":"Lo Iacono","full_name":"Lo Iacono, Luigi","first_name":"Luigi"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T13:00:15Z","publisher":"ACM","date_updated":"2024-06-05T13:05:10Z","citation":{"ama":"Gorski PL, Acar Y, Lo Iacono L, Fahl S. Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs. In: <i>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</i>. ACM; 2020. doi:<a href=\"https://doi.org/10.1145/3313831.3376142\">10.1145/3313831.3376142</a>","chicago":"Gorski, Peter Leo, Yasemin Acar, Luigi Lo Iacono, and Sascha Fahl. “Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs.” In <i>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</i>. ACM, 2020. <a href=\"https://doi.org/10.1145/3313831.3376142\">https://doi.org/10.1145/3313831.3376142</a>.","ieee":"P. L. Gorski, Y. Acar, L. Lo Iacono, and S. Fahl, “Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs,” 2020, doi: <a href=\"https://doi.org/10.1145/3313831.3376142\">10.1145/3313831.3376142</a>.","mla":"Gorski, Peter Leo, et al. “Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs.” <i>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</i>, ACM, 2020, doi:<a href=\"https://doi.org/10.1145/3313831.3376142\">10.1145/3313831.3376142</a>.","short":"P.L. Gorski, Y. Acar, L. Lo Iacono, S. Fahl, in: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, 2020.","bibtex":"@inproceedings{Gorski_Acar_Lo Iacono_Fahl_2020, title={Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1145/3313831.3376142\">10.1145/3313831.3376142</a>}, booktitle={Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems}, publisher={ACM}, author={Gorski, Peter Leo and Acar, Yasemin and Lo Iacono, Luigi and Fahl, Sascha}, year={2020} }","apa":"Gorski, P. L., Acar, Y., Lo Iacono, L., &#38; Fahl, S. (2020). Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs. <i>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</i>. <a href=\"https://doi.org/10.1145/3313831.3376142\">https://doi.org/10.1145/3313831.3376142</a>"},"year":"2020","publication_status":"published","language":[{"iso":"eng"}],"extern":"1","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47262","status":"public","type":"conference","publication":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"}]
