[{"type":"conference","status":"public","_id":"47879","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","extern":"1","language":[{"iso":"eng"}],"year":"2020","citation":{"bibtex":"@inproceedings{Haney_Furman_Acar_2020, title={Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}, publisher={International Conference on Human-Computer Interaction, Copenhagen, -1}, author={Haney, Julie and Furman, Susanne and Acar, Yasemin}, year={2020} }","short":"J. Haney, S. Furman, Y. Acar, in: International Conference on Human-Computer Interaction, Copenhagen, -1, 2020.","mla":"Haney, Julie, et al. <i>Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges</i>. International Conference on Human-Computer Interaction, Copenhagen, -1, 2020.","apa":"Haney, J., Furman, S., &#38; Acar, Y. (2020). <i>Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges</i>.","ama":"Haney J, Furman S, Acar Y. Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In: International Conference on Human-Computer Interaction, Copenhagen, -1; 2020.","chicago":"Haney, Julie, Susanne Furman, and Yasemin Acar. “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” International Conference on Human-Computer Interaction, Copenhagen, -1, 2020.","ieee":"J. Haney, S. Furman, and Y. Acar, “Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges,” 2020."},"date_updated":"2024-06-05T13:04:04Z","publisher":"International Conference on Human-Computer Interaction, Copenhagen, -1","author":[{"first_name":"Julie","last_name":"Haney","full_name":"Haney, Julie"},{"last_name":"Furman","full_name":"Furman, Susanne","first_name":"Susanne"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"}],"date_created":"2023-10-09T13:20:44Z","title":"Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges"},{"alternative_title":["How Browsers' Explanations Impact Misconceptions About Private Browsing Mode"],"extern":"1","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47253","status":"public","type":"conference","publication":"Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18","doi":"10.1145/3178876.3186088","title":"Your Secrets Are Safe","author":[{"last_name":"Wu","full_name":"Wu, Yuxi","first_name":"Yuxi"},{"full_name":"Gupta, Panya","last_name":"Gupta","first_name":"Panya"},{"last_name":"Wei","full_name":"Wei, Miranda","first_name":"Miranda"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"last_name":"Ur","full_name":"Ur, Blase","first_name":"Blase"}],"date_created":"2023-09-22T12:52:15Z","publisher":"ACM Press","date_updated":"2024-06-05T13:06:44Z","citation":{"chicago":"Wu, Yuxi, Panya Gupta, Miranda Wei, Yasemin Acar, Sascha Fahl, and Blase Ur. “Your Secrets Are Safe.” In <i>Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18</i>. ACM Press, 2018. <a href=\"https://doi.org/10.1145/3178876.3186088\">https://doi.org/10.1145/3178876.3186088</a>.","ieee":"Y. Wu, P. Gupta, M. Wei, Y. Acar, S. Fahl, and B. Ur, “Your Secrets Are Safe,” 2018, doi: <a href=\"https://doi.org/10.1145/3178876.3186088\">10.1145/3178876.3186088</a>.","short":"Y. Wu, P. Gupta, M. Wei, Y. Acar, S. Fahl, B. Ur, in: Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18, ACM Press, 2018.","bibtex":"@inproceedings{Wu_Gupta_Wei_Acar_Fahl_Ur_2018, title={Your Secrets Are Safe}, DOI={<a href=\"https://doi.org/10.1145/3178876.3186088\">10.1145/3178876.3186088</a>}, booktitle={Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18}, publisher={ACM Press}, author={Wu, Yuxi and Gupta, Panya and Wei, Miranda and Acar, Yasemin and Fahl, Sascha and Ur, Blase}, year={2018} }","mla":"Wu, Yuxi, et al. “Your Secrets Are Safe.” <i>Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18</i>, ACM Press, 2018, doi:<a href=\"https://doi.org/10.1145/3178876.3186088\">10.1145/3178876.3186088</a>.","apa":"Wu, Y., Gupta, P., Wei, M., Acar, Y., Fahl, S., &#38; Ur, B. (2018). Your Secrets Are Safe. <i>Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18</i>. <a href=\"https://doi.org/10.1145/3178876.3186088\">https://doi.org/10.1145/3178876.3186088</a>","ama":"Wu Y, Gupta P, Wei M, Acar Y, Fahl S, Ur B. Your Secrets Are Safe. In: <i>Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18</i>. ACM Press; 2018. doi:<a href=\"https://doi.org/10.1145/3178876.3186088\">10.1145/3178876.3186088</a>"},"year":"2018","publication_status":"published"},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47255","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018","status":"public","editor":[{"last_name":"Zurko","full_name":"Zurko, Mary Ellen","first_name":"Mary Ellen"},{"last_name":"Lipford","full_name":"Lipford, Heather Richter","first_name":"Heather Richter"}],"author":[{"full_name":"Haney, Julie M.","last_name":"Haney","first_name":"Julie M."},{"full_name":"Theofanos, Mary","last_name":"Theofanos","first_name":"Mary"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"last_name":"Prettyman","full_name":"Prettyman, Sandra Spickard","first_name":"Sandra Spickard"}],"date_created":"2023-09-22T12:53:12Z","publisher":"USENIX Association","date_updated":"2024-06-05T13:07:06Z","title":"\"We make it a big deal in the company\": Security Mindsets in Organizations that Develop Cryptographic Products","citation":{"ieee":"J. M. Haney, M. Theofanos, Y. Acar, and S. S. Prettyman, “‘We make it a big deal in the company’: Security Mindsets in Organizations that Develop Cryptographic Products,” in <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, 2018, pp. 357–373.","chicago":"Haney, Julie M., Mary Theofanos, Yasemin Acar, and Sandra Spickard Prettyman. “‘We Make It a Big Deal in the Company’: Security Mindsets in Organizations That Develop Cryptographic Products.” In <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, 357–373. USENIX Association, 2018.","ama":"Haney JM, Theofanos M, Acar Y, Prettyman SS. “We make it a big deal in the company”: Security Mindsets in Organizations that Develop Cryptographic Products. In: Zurko ME, Lipford HR, eds. <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>. USENIX Association; 2018:357–373.","apa":"Haney, J. M., Theofanos, M., Acar, Y., &#38; Prettyman, S. S. (2018). “We make it a big deal in the company”: Security Mindsets in Organizations that Develop Cryptographic Products. In M. E. Zurko &#38; H. R. Lipford (Eds.), <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i> (pp. 357–373). USENIX Association.","mla":"Haney, Julie M., et al. “‘We Make It a Big Deal in the Company’: Security Mindsets in Organizations That Develop Cryptographic Products.” <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, USENIX Association, 2018, pp. 357–373.","short":"J.M. Haney, M. Theofanos, Y. Acar, S.S. Prettyman, in: M.E. Zurko, H.R. Lipford (Eds.), Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, USENIX Association, 2018, pp. 357–373.","bibtex":"@inproceedings{Haney_Theofanos_Acar_Prettyman_2018, title={“We make it a big deal in the company”: Security Mindsets in Organizations that Develop Cryptographic Products}, booktitle={Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018}, publisher={USENIX Association}, author={Haney, Julie M. and Theofanos, Mary and Acar, Yasemin and Prettyman, Sandra Spickard}, editor={Zurko, Mary Ellen and Lipford, Heather Richter}, year={2018}, pages={357–373} }"},"page":"357–373","year":"2018"},{"date_created":"2023-10-09T13:18:41Z","author":[{"last_name":"Haney","full_name":"Haney, Julie","first_name":"Julie"},{"last_name":"Theofanos","full_name":"Theofanos, Mary","first_name":"Mary"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Sandra Spickard","full_name":"Prettyman, Sandra Spickard","last_name":"Prettyman"}],"publisher":"National Institute of Standards and Technology","date_updated":"2024-06-05T13:05:57Z","doi":"10.6028/nist.ir.8241","title":"Organizational views of NIST cryptographic standards and testing and validation programs","publication_status":"published","citation":{"apa":"Haney, J., Theofanos, M., Acar, Y., &#38; Prettyman, S. S. (2018). <i>Organizational views of NIST cryptographic standards and testing and validation programs</i>. National Institute of Standards and Technology. <a href=\"https://doi.org/10.6028/nist.ir.8241\">https://doi.org/10.6028/nist.ir.8241</a>","bibtex":"@book{Haney_Theofanos_Acar_Prettyman_2018, title={Organizational views of NIST cryptographic standards and testing and validation programs}, DOI={<a href=\"https://doi.org/10.6028/nist.ir.8241\">10.6028/nist.ir.8241</a>}, publisher={National Institute of Standards and Technology}, author={Haney, Julie and Theofanos, Mary and Acar, Yasemin and Prettyman, Sandra Spickard}, year={2018} }","short":"J. Haney, M. Theofanos, Y. Acar, S.S. Prettyman, Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs, National Institute of Standards and Technology, 2018.","mla":"Haney, Julie, et al. <i>Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs</i>. National Institute of Standards and Technology, 2018, doi:<a href=\"https://doi.org/10.6028/nist.ir.8241\">10.6028/nist.ir.8241</a>.","chicago":"Haney, Julie, Mary Theofanos, Yasemin Acar, and Sandra Spickard Prettyman. <i>Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs</i>. National Institute of Standards and Technology, 2018. <a href=\"https://doi.org/10.6028/nist.ir.8241\">https://doi.org/10.6028/nist.ir.8241</a>.","ieee":"J. Haney, M. Theofanos, Y. Acar, and S. S. Prettyman, <i>Organizational views of NIST cryptographic standards and testing and validation programs</i>. National Institute of Standards and Technology, 2018.","ama":"Haney J, Theofanos M, Acar Y, Prettyman SS. <i>Organizational Views of NIST Cryptographic Standards and Testing and Validation Programs</i>. National Institute of Standards and Technology; 2018. doi:<a href=\"https://doi.org/10.6028/nist.ir.8241\">10.6028/nist.ir.8241</a>"},"year":"2018","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47876","language":[{"iso":"eng"}],"extern":"1","type":"report","status":"public"},{"publication":"Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018","type":"conference","editor":[{"last_name":"Zurko","full_name":"Zurko, Mary Ellen","first_name":"Mary Ellen"},{"first_name":"Heather Richter","full_name":"Lipford, Heather Richter","last_name":"Lipford"}],"status":"public","_id":"47256","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","language":[{"iso":"eng"}],"extern":"1","year":"2018","page":"265–281","citation":{"chicago":"Gorski, Peter Leo, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, and Sascha Fahl. “Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.” In <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, 265–281. USENIX Association, 2018.","ieee":"P. L. Gorski <i>et al.</i>, “Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse,” in <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, 2018, pp. 265–281.","ama":"Gorski PL, Iacono LL, Wermke D, et al. Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. In: Zurko ME, Lipford HR, eds. <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>. USENIX Association; 2018:265–281.","mla":"Gorski, Peter Leo, et al. “Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.” <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, USENIX Association, 2018, pp. 265–281.","bibtex":"@inproceedings{Gorski_Iacono_Wermke_Stransky_Möller_Acar_Fahl_2018, title={Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse}, booktitle={Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018}, publisher={USENIX Association}, author={Gorski, Peter Leo and Iacono, Luigi Lo and Wermke, Dominik and Stransky, Christian and Möller, Sebastian and Acar, Yasemin and Fahl, Sascha}, editor={Zurko, Mary Ellen and Lipford, Heather Richter}, year={2018}, pages={265–281} }","short":"P.L. Gorski, L.L. Iacono, D. Wermke, C. Stransky, S. Möller, Y. Acar, S. Fahl, in: M.E. Zurko, H.R. Lipford (Eds.), Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, USENIX Association, 2018, pp. 265–281.","apa":"Gorski, P. L., Iacono, L. L., Wermke, D., Stransky, C., Möller, S., Acar, Y., &#38; Fahl, S. (2018). Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. In M. E. Zurko &#38; H. R. Lipford (Eds.), <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i> (pp. 265–281). USENIX Association."},"publisher":"USENIX Association","date_updated":"2024-06-05T13:20:00Z","author":[{"full_name":"Gorski, Peter Leo","last_name":"Gorski","first_name":"Peter Leo"},{"first_name":"Luigi Lo","last_name":"Iacono","full_name":"Iacono, Luigi Lo"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"last_name":"Stransky","full_name":"Stransky, Christian","first_name":"Christian"},{"last_name":"Möller","full_name":"Möller, Sebastian","first_name":"Sebastian"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T12:53:46Z","title":"Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse"},{"type":"conference","publication":"2018 IEEE Symposium on Security and Privacy (SP)","status":"public","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47254","language":[{"iso":"eng"}],"extern":"1","publication_status":"published","citation":{"bibtex":"@inproceedings{Oltrogge_Derr_Stransky_Acar_Fahl_Rossow_Pellegrino_Bugiel_Backes_2018, title={The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators}, DOI={<a href=\"https://doi.org/10.1109/sp.2018.00005\">10.1109/sp.2018.00005</a>}, booktitle={2018 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael}, year={2018} }","mla":"Oltrogge, Marten, et al. “The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.” <i>2018 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2018, doi:<a href=\"https://doi.org/10.1109/sp.2018.00005\">10.1109/sp.2018.00005</a>.","short":"M. Oltrogge, E. Derr, C. Stransky, Y. Acar, S. Fahl, C. Rossow, G. Pellegrino, S. Bugiel, M. Backes, in: 2018 IEEE Symposium on Security and Privacy (SP), IEEE, 2018.","apa":"Oltrogge, M., Derr, E., Stransky, C., Acar, Y., Fahl, S., Rossow, C., Pellegrino, G., Bugiel, S., &#38; Backes, M. (2018). The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. <i>2018 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2018.00005\">https://doi.org/10.1109/sp.2018.00005</a>","ama":"Oltrogge M, Derr E, Stransky C, et al. The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. In: <i>2018 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2018. doi:<a href=\"https://doi.org/10.1109/sp.2018.00005\">10.1109/sp.2018.00005</a>","chicago":"Oltrogge, Marten, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, and Michael Backes. “The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.” In <i>2018 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2018. <a href=\"https://doi.org/10.1109/sp.2018.00005\">https://doi.org/10.1109/sp.2018.00005</a>.","ieee":"M. Oltrogge <i>et al.</i>, “The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators,” 2018, doi: <a href=\"https://doi.org/10.1109/sp.2018.00005\">10.1109/sp.2018.00005</a>."},"year":"2018","date_created":"2023-09-22T12:52:42Z","author":[{"first_name":"Marten","last_name":"Oltrogge","full_name":"Oltrogge, Marten"},{"last_name":"Derr","full_name":"Derr, Erik","first_name":"Erik"},{"first_name":"Christian","last_name":"Stransky","full_name":"Stransky, Christian"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"last_name":"Rossow","full_name":"Rossow, Christian","first_name":"Christian"},{"full_name":"Pellegrino, Giancarlo","last_name":"Pellegrino","first_name":"Giancarlo"},{"first_name":"Sven","full_name":"Bugiel, Sven","last_name":"Bugiel"},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"}],"publisher":"IEEE","date_updated":"2024-06-05T13:19:28Z","doi":"10.1109/sp.2018.00005","title":"The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators"},{"publication":"Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018","type":"conference","status":"public","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47252","extern":"1","language":[{"iso":"eng"}],"page":"222–235","citation":{"chicago":"Wermke, Dominik, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, and Sascha Fahl. “A Large Scale Investigation of Obfuscation Use in Google Play.” In <i>Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, 222–235. ACM, 2018. <a href=\"https://doi.org/10.1145/3274694.3274726\">https://doi.org/10.1145/3274694.3274726</a>.","ieee":"D. Wermke, N. Huaman, Y. Acar, B. Reaves, P. Traynor, and S. Fahl, “A Large Scale Investigation of Obfuscation Use in Google Play,” in <i>Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, 2018, pp. 222–235, doi: <a href=\"https://doi.org/10.1145/3274694.3274726\">10.1145/3274694.3274726</a>.","ama":"Wermke D, Huaman N, Acar Y, Reaves B, Traynor P, Fahl S. A Large Scale Investigation of Obfuscation Use in Google Play. In: <i>Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>. ACM; 2018:222–235. doi:<a href=\"https://doi.org/10.1145/3274694.3274726\">10.1145/3274694.3274726</a>","apa":"Wermke, D., Huaman, N., Acar, Y., Reaves, B., Traynor, P., &#38; Fahl, S. (2018). A Large Scale Investigation of Obfuscation Use in Google Play. <i>Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, 222–235. <a href=\"https://doi.org/10.1145/3274694.3274726\">https://doi.org/10.1145/3274694.3274726</a>","mla":"Wermke, Dominik, et al. “A Large Scale Investigation of Obfuscation Use in Google Play.” <i>Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, ACM, 2018, pp. 222–235, doi:<a href=\"https://doi.org/10.1145/3274694.3274726\">10.1145/3274694.3274726</a>.","bibtex":"@inproceedings{Wermke_Huaman_Acar_Reaves_Traynor_Fahl_2018, title={A Large Scale Investigation of Obfuscation Use in Google Play}, DOI={<a href=\"https://doi.org/10.1145/3274694.3274726\">10.1145/3274694.3274726</a>}, booktitle={Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018}, publisher={ACM}, author={Wermke, Dominik and Huaman, Nicolas and Acar, Yasemin and Reaves, Bradley and Traynor, Patrick and Fahl, Sascha}, year={2018}, pages={222–235} }","short":"D. Wermke, N. Huaman, Y. Acar, B. Reaves, P. Traynor, S. Fahl, in: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018, ACM, 2018, pp. 222–235."},"year":"2018","author":[{"last_name":"Wermke","full_name":"Wermke, Dominik","first_name":"Dominik"},{"full_name":"Huaman, Nicolas","last_name":"Huaman","first_name":"Nicolas"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"last_name":"Reaves","full_name":"Reaves, Bradley","first_name":"Bradley"},{"first_name":"Patrick","full_name":"Traynor, Patrick","last_name":"Traynor"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2023-09-22T12:51:58Z","publisher":"ACM","date_updated":"2024-06-05T13:20:17Z","doi":"10.1145/3274694.3274726","title":"A Large Scale Investigation of Obfuscation Use in Google Play"},{"publication_status":"published","citation":{"ama":"Derr E, Bugiel S, Fahl S, Acar Y, Backes M. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. In: <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>","chicago":"Derr, Erik, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes. “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2017. <a href=\"https://doi.org/10.1145/3133956.3134059\">https://doi.org/10.1145/3133956.3134059</a>.","ieee":"E. Derr, S. Bugiel, S. Fahl, Y. Acar, and M. Backes, “Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android,” 2017, doi: <a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>.","apa":"Derr, E., Bugiel, S., Fahl, S., Acar, Y., &#38; Backes, M. (2017). Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3133956.3134059\">https://doi.org/10.1145/3133956.3134059</a>","short":"E. Derr, S. Bugiel, S. Fahl, Y. Acar, M. Backes, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.","mla":"Derr, Erik, et al. “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2017, doi:<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>.","bibtex":"@inproceedings{Derr_Bugiel_Fahl_Acar_Backes_2017, title={Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android}, DOI={<a href=\"https://doi.org/10.1145/3133956.3134059\">10.1145/3133956.3134059</a>}, booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael}, year={2017} }"},"year":"2017","author":[{"full_name":"Derr, Erik","last_name":"Derr","first_name":"Erik"},{"full_name":"Bugiel, Sven","last_name":"Bugiel","first_name":"Sven"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"first_name":"Michael","last_name":"Backes","full_name":"Backes, Michael"}],"date_created":"2023-09-22T12:50:32Z","date_updated":"2024-06-05T13:09:19Z","publisher":"ACM","doi":"10.1145/3133956.3134059","title":"Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android","type":"conference","publication":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","status":"public","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47249","language":[{"iso":"eng"}],"extern":"1"},{"status":"public","type":"journal_article","publication":"IEEE Secur. Priv.","extern":"1","language":[{"iso":"eng"}],"_id":"47309","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"year":"2017","citation":{"ieee":"Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “How Internet Resources Might Be Helping You Develop Faster but Less Securely,” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, pp. 50–60, 2017, doi: <a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>.","chicago":"Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. “How Internet Resources Might Be Helping You Develop Faster but Less Securely.” <i>IEEE Secur. Priv.</i> 15, no. 2 (2017): 50–60. <a href=\"https://doi.org/10.1109/MSP.2017.24\">https://doi.org/10.1109/MSP.2017.24</a>.","ama":"Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. How Internet Resources Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur Priv</i>. 2017;15(2):50–60. doi:<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>","apa":"Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C. (2017). How Internet Resources Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur. Priv.</i>, <i>15</i>(2), 50–60. <a href=\"https://doi.org/10.1109/MSP.2017.24\">https://doi.org/10.1109/MSP.2017.24</a>","mla":"Acar, Yasemin, et al. “How Internet Resources Might Be Helping You Develop Faster but Less Securely.” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, 2017, pp. 50–60, doi:<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>.","bibtex":"@article{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2017, title={How Internet Resources Might Be Helping You Develop Faster but Less Securely}, volume={15}, DOI={<a href=\"https://doi.org/10.1109/MSP.2017.24\">10.1109/MSP.2017.24</a>}, number={2}, journal={IEEE Secur. Priv.}, author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017}, pages={50–60} }","short":"Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, IEEE Secur. Priv. 15 (2017) 50–60."},"intvolume":"        15","page":"50–60","issue":"2","title":"How Internet Resources Might Be Helping You Develop Faster but Less Securely","doi":"10.1109/MSP.2017.24","date_updated":"2024-06-05T13:09:42Z","author":[{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Backes, Michael","last_name":"Backes","first_name":"Michael"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Doowon","full_name":"Kim, Doowon","last_name":"Kim"},{"first_name":"Michelle L.","full_name":"Mazurek, Michelle L.","last_name":"Mazurek"},{"last_name":"Stransky","full_name":"Stransky, Christian","first_name":"Christian"}],"date_created":"2023-09-22T13:39:01Z","volume":15},{"title":"Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers","publisher":"USENIX Association","date_updated":"2024-06-05T13:12:04Z","author":[{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"full_name":"Nguyen, Duc Cuong","last_name":"Nguyen","first_name":"Duc Cuong"},{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"full_name":"Kim, Doowon","last_name":"Kim","first_name":"Doowon"},{"first_name":"Elissa M.","full_name":"Redmiles, Elissa M.","last_name":"Redmiles"},{"first_name":"Michael","last_name":"Backes","full_name":"Backes, Michael"},{"first_name":"Simson L.","full_name":"Garfinkel, Simson L.","last_name":"Garfinkel"},{"first_name":"Michelle L.","full_name":"Mazurek, Michelle L.","last_name":"Mazurek"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"date_created":"2023-09-22T12:47:30Z","year":"2017","citation":{"apa":"Stransky, C., Acar, Y., Nguyen, D. C., Wermke, D., Kim, D., Redmiles, E. M., Backes, M., Garfinkel, S. L., Mazurek, M. L., &#38; Fahl, S. (2017). Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. In J. M. Fernandez &#38; M. Payer (Eds.), <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association.","bibtex":"@inproceedings{Stransky_Acar_Nguyen_Wermke_Kim_Redmiles_Backes_Garfinkel_Mazurek_Fahl_2017, title={Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers}, booktitle={10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017}, publisher={USENIX Association}, author={Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Kim, Doowon and Redmiles, Elissa M. and Backes, Michael and Garfinkel, Simson L. and Mazurek, Michelle L. and Fahl, Sascha}, editor={Fernandez, José M. and Payer, Mathias}, year={2017} }","mla":"Stransky, Christian, et al. “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.” <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer, USENIX Association, 2017.","short":"C. Stransky, Y. Acar, D.C. Nguyen, D. Wermke, D. Kim, E.M. Redmiles, M. Backes, S.L. Garfinkel, M.L. Mazurek, S. Fahl, in: J.M. Fernandez, M. Payer (Eds.), 10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017, USENIX Association, 2017.","ama":"Stransky C, Acar Y, Nguyen DC, et al. Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. In: Fernandez JM, Payer M, eds. <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association; 2017.","ieee":"C. Stransky <i>et al.</i>, “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers,” in <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, 2017.","chicago":"Stransky, Christian, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, and Sascha Fahl. “Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.” In <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer. USENIX Association, 2017."},"extern":"1","language":[{"iso":"eng"}],"_id":"47245","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"editor":[{"full_name":"Fernandez, José M.","last_name":"Fernandez","first_name":"José M."},{"last_name":"Payer","full_name":"Payer, Mathias","first_name":"Mathias"}],"status":"public","type":"conference","publication":"10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017"},{"year":"2017","page":"121–136","citation":{"short":"F. Fischer, K. Böttinger, H. Xiao, C. Stransky, Y. Acar, M. Backes, S. Fahl, in: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017, IEEE Computer Society, 2017, pp. 121–136.","bibtex":"@inproceedings{Fischer_Böttinger_Xiao_Stransky_Acar_Backes_Fahl_2017, title={Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security}, DOI={<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>}, booktitle={2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017}, publisher={IEEE Computer Society}, author={Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha}, year={2017}, pages={121–136} }","mla":"Fischer, Felix, et al. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security.” <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, IEEE Computer Society, 2017, pp. 121–136, doi:<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>.","apa":"Fischer, F., Böttinger, K., Xiao, H., Stransky, C., Acar, Y., Backes, M., &#38; Fahl, S. (2017). Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security. <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. <a href=\"https://doi.org/10.1109/SP.2017.31\">https://doi.org/10.1109/SP.2017.31</a>","ieee":"F. Fischer <i>et al.</i>, “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security,” in <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 2017, pp. 121–136, doi: <a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>.","chicago":"Fischer, Felix, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, and Sascha Fahl. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security.” In <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. IEEE Computer Society, 2017. <a href=\"https://doi.org/10.1109/SP.2017.31\">https://doi.org/10.1109/SP.2017.31</a>.","ama":"Fischer F, Böttinger K, Xiao H, et al. Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application Security. In: <i>2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>. IEEE Computer Society; 2017:121–136. doi:<a href=\"https://doi.org/10.1109/SP.2017.31\">10.1109/SP.2017.31</a>"},"title":"Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security","doi":"10.1109/SP.2017.31","publisher":"IEEE Computer Society","date_updated":"2024-06-05T13:12:27Z","date_created":"2023-09-22T12:43:27Z","author":[{"first_name":"Felix","last_name":"Fischer","full_name":"Fischer, Felix"},{"last_name":"Böttinger","full_name":"Böttinger, Konstantin","first_name":"Konstantin"},{"full_name":"Xiao, Huang","last_name":"Xiao","first_name":"Huang"},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"first_name":"Michael","last_name":"Backes","full_name":"Backes, Michael"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"status":"public","publication":"2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017","type":"conference","language":[{"iso":"eng"}],"extern":"1","_id":"47243","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931"},{"publication_status":"published","citation":{"short":"D.C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, S. Fahl, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.","bibtex":"@inproceedings{Nguyen_Wermke_Acar_Backes_Weir_Fahl_2017, title={A Stitch in Time: Supporting Android Developers in Writing Secure Code}, DOI={<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>}, booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles and Fahl, Sascha}, year={2017} }","mla":"Nguyen, Duc Cuong, et al. “A Stitch in Time: Supporting Android Developers in Writing Secure Code.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2017, doi:<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>.","apa":"Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., &#38; Fahl, S. (2017). A Stitch in Time: Supporting Android Developers in Writing Secure Code. <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3133956.3133977\">https://doi.org/10.1145/3133956.3133977</a>","ama":"Nguyen DC, Wermke D, Acar Y, Backes M, Weir C, Fahl S. A Stitch in Time: Supporting Android Developers in Writing Secure Code. In: <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>","chicago":"Nguyen, Duc Cuong, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, and Sascha Fahl. “A Stitch in Time: Supporting Android Developers in Writing Secure Code.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2017. <a href=\"https://doi.org/10.1145/3133956.3133977\">https://doi.org/10.1145/3133956.3133977</a>.","ieee":"D. C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, and S. Fahl, “A Stitch in Time: Supporting Android Developers in Writing Secure Code,” 2017, doi: <a href=\"https://doi.org/10.1145/3133956.3133977\">10.1145/3133956.3133977</a>."},"year":"2017","author":[{"last_name":"Nguyen","full_name":"Nguyen, Duc Cuong","first_name":"Duc Cuong"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Michael","full_name":"Backes, Michael","last_name":"Backes"},{"first_name":"Charles","full_name":"Weir, Charles","last_name":"Weir"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"}],"date_created":"2023-09-22T12:50:51Z","date_updated":"2024-06-05T13:12:56Z","publisher":"ACM","doi":"10.1145/3133956.3133977","title":"A Stitch in Time: Supporting Android Developers in Writing Secure Code","type":"conference","publication":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","status":"public","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47250","language":[{"iso":"eng"}],"extern":"1"},{"date_created":"2023-09-22T12:50:12Z","author":[{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Christian","last_name":"Stransky","full_name":"Stransky, Christian"},{"full_name":"Wermke, Dominik","last_name":"Wermke","first_name":"Dominik"},{"last_name":"Weir","full_name":"Weir, Charles","first_name":"Charles"},{"first_name":"Michelle L.","full_name":"Mazurek, Michelle L.","last_name":"Mazurek"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"}],"publisher":"IEEE","date_updated":"2024-06-05T13:11:41Z","doi":"10.1109/secdev.2017.17","title":"Developers Need Support, Too: A Survey of Security Advice for Software Developers","publication_status":"published","citation":{"apa":"Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M. L., &#38; Fahl, S. (2017). Developers Need Support, Too: A Survey of Security Advice for Software Developers. <i>2017 IEEE Cybersecurity Development (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev.2017.17\">https://doi.org/10.1109/secdev.2017.17</a>","bibtex":"@inproceedings{Acar_Stransky_Wermke_Weir_Mazurek_Fahl_2017, title={Developers Need Support, Too: A Survey of Security Advice for Software Developers}, DOI={<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>}, booktitle={2017 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Weir, Charles and Mazurek, Michelle L. and Fahl, Sascha}, year={2017} }","mla":"Acar, Yasemin, et al. “Developers Need Support, Too: A Survey of Security Advice for Software Developers.” <i>2017 IEEE Cybersecurity Development (SecDev)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>.","short":"Y. Acar, C. Stransky, D. Wermke, C. Weir, M.L. Mazurek, S. Fahl, in: 2017 IEEE Cybersecurity Development (SecDev), IEEE, 2017.","ama":"Acar Y, Stransky C, Wermke D, Weir C, Mazurek ML, Fahl S. Developers Need Support, Too: A Survey of Security Advice for Software Developers. In: <i>2017 IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>","chicago":"Acar, Yasemin, Christian Stransky, Dominik Wermke, Charles Weir, Michelle L. Mazurek, and Sascha Fahl. “Developers Need Support, Too: A Survey of Security Advice for Software Developers.” In <i>2017 IEEE Cybersecurity Development (SecDev)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/secdev.2017.17\">https://doi.org/10.1109/secdev.2017.17</a>.","ieee":"Y. Acar, C. Stransky, D. Wermke, C. Weir, M. L. Mazurek, and S. Fahl, “Developers Need Support, Too: A Survey of Security Advice for Software Developers,” 2017, doi: <a href=\"https://doi.org/10.1109/secdev.2017.17\">10.1109/secdev.2017.17</a>."},"year":"2017","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47248","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"2017 IEEE Cybersecurity Development (SecDev)","status":"public"},{"date_created":"2023-09-22T12:42:23Z","author":[{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"last_name":"Mazurek","full_name":"Mazurek, Michelle L.","first_name":"Michelle L."}],"date_updated":"2024-06-05T13:13:34Z","publisher":"IEEE","doi":"10.1109/secdev.2016.013","title":"You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users","publication_status":"published","citation":{"apa":"Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. <i>2016 IEEE Cybersecurity Development (SecDev)</i>. <a href=\"https://doi.org/10.1109/secdev.2016.013\">https://doi.org/10.1109/secdev.2016.013</a>","bibtex":"@inproceedings{Acar_Fahl_Mazurek_2017, title={You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users}, DOI={<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>}, booktitle={2016 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }","mla":"Acar, Yasemin, et al. “You Are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.” <i>2016 IEEE Cybersecurity Development (SecDev)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>.","short":"Y. Acar, S. Fahl, M.L. Mazurek, in: 2016 IEEE Cybersecurity Development (SecDev), IEEE, 2017.","ama":"Acar Y, Fahl S, Mazurek ML. You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. In: <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>","chicago":"Acar, Yasemin, Sascha Fahl, and Michelle L. Mazurek. “You Are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users.” In <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/secdev.2016.013\">https://doi.org/10.1109/secdev.2016.013</a>.","ieee":"Y. Acar, S. Fahl, and M. L. Mazurek, “You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users,” 2017, doi: <a href=\"https://doi.org/10.1109/secdev.2016.013\">10.1109/secdev.2016.013</a>."},"year":"2017","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47242","extern":"1","language":[{"iso":"eng"}],"publication":"2016 IEEE Cybersecurity Development (SecDev)","type":"conference","status":"public"},{"language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47246","status":"public","publication":"2017 IEEE Symposium on Security and Privacy (SP)","type":"conference","doi":"10.1109/sp.2017.52","title":"Comparing the Usability of Cryptographic APIs","author":[{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"last_name":"Backes","full_name":"Backes, Michael","first_name":"Michael"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"first_name":"Simson","last_name":"Garfinkel","full_name":"Garfinkel, Simson"},{"last_name":"Kim","full_name":"Kim, Doowon","first_name":"Doowon"},{"full_name":"Mazurek, Michelle L.","last_name":"Mazurek","first_name":"Michelle L."},{"first_name":"Christian","full_name":"Stransky, Christian","last_name":"Stransky"}],"date_created":"2023-09-22T12:48:37Z","date_updated":"2024-06-05T13:14:03Z","publisher":"IEEE","citation":{"ama":"Acar Y, Backes M, Fahl S, et al. Comparing the Usability of Cryptographic APIs. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>","ieee":"Y. Acar <i>et al.</i>, “Comparing the Usability of Cryptographic APIs,” 2017, doi: <a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>.","chicago":"Acar, Yasemin, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. “Comparing the Usability of Cryptographic APIs.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/sp.2017.52\">https://doi.org/10.1109/sp.2017.52</a>.","apa":"Acar, Y., Backes, M., Fahl, S., Garfinkel, S., Kim, D., Mazurek, M. L., &#38; Stransky, C. (2017). Comparing the Usability of Cryptographic APIs. <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2017.52\">https://doi.org/10.1109/sp.2017.52</a>","bibtex":"@inproceedings{Acar_Backes_Fahl_Garfinkel_Kim_Mazurek_Stransky_2017, title={Comparing the Usability of Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017} }","short":"Y. Acar, M. Backes, S. Fahl, S. Garfinkel, D. Kim, M.L. Mazurek, C. Stransky, in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017.","mla":"Acar, Yasemin, et al. “Comparing the Usability of Cryptographic APIs.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>."},"year":"2017","publication_status":"published"},{"date_updated":"2024-06-05T13:14:32Z","publisher":"USENIX Association","date_created":"2023-09-22T12:45:33Z","author":[{"last_name":"Acar","id":"94636","full_name":"Acar, Yasemin","first_name":"Yasemin"},{"first_name":"Christian","last_name":"Stransky","full_name":"Stransky, Christian"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"}],"title":"Security Developer Studies with GitHub Users: Exploring a Convenience Sample","year":"2017","citation":{"ieee":"Y. Acar, C. Stransky, D. Wermke, M. L. Mazurek, and S. Fahl, “Security Developer Studies with GitHub Users: Exploring a Convenience Sample,” in <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 2017, pp. 81–95.","chicago":"Acar, Yasemin, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, and Sascha Fahl. “Security Developer Studies with GitHub Users: Exploring a Convenience Sample.” In <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95. USENIX Association, 2017.","ama":"Acar Y, Stransky C, Wermke D, Mazurek ML, Fahl S. Security Developer Studies with GitHub Users: Exploring a Convenience Sample. In: <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>. USENIX Association; 2017:81–95.","apa":"Acar, Y., Stransky, C., Wermke, D., Mazurek, M. L., &#38; Fahl, S. (2017). Security Developer Studies with GitHub Users: Exploring a Convenience Sample. <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95.","short":"Y. Acar, C. Stransky, D. Wermke, M.L. Mazurek, S. Fahl, in: Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017, USENIX Association, 2017, pp. 81–95.","bibtex":"@inproceedings{Acar_Stransky_Wermke_Mazurek_Fahl_2017, title={Security Developer Studies with GitHub Users: Exploring a Convenience Sample}, booktitle={Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017}, publisher={USENIX Association}, author={Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle L. and Fahl, Sascha}, year={2017}, pages={81–95} }","mla":"Acar, Yasemin, et al. “Security Developer Studies with GitHub Users: Exploring a Convenience Sample.” <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, USENIX Association, 2017, pp. 81–95."},"page":"81–95","_id":"47244","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017","status":"public"},{"doi":"10.13016/M22K2W","title":"A Summary of Survey Methodology Best Practices for Security and Privacy Researchers","author":[{"first_name":"Elissa M.","full_name":"Redmiles, Elissa M.","last_name":"Redmiles"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"last_name":"Mazurek","full_name":"Mazurek, Michelle L.","first_name":"Michelle L."}],"date_created":"2023-10-09T13:16:14Z","publisher":"University of Maryland Computer Science Department","date_updated":"2024-06-05T13:10:02Z","citation":{"short":"E.M. Redmiles, Y. Acar, S. Fahl, M.L. Mazurek, A Summary of Survey Methodology Best Practices for Security and Privacy Researchers, University of Maryland Computer Science Department, 2017.","bibtex":"@book{Redmiles_Acar_Fahl_Mazurek_2017, title={A Summary of Survey Methodology Best Practices for Security and Privacy Researchers}, DOI={<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>}, publisher={University of Maryland Computer Science Department}, author={Redmiles, Elissa M. and Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }","mla":"Redmiles, Elissa M., et al. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017, doi:<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>.","ama":"Redmiles EM, Acar Y, Fahl S, Mazurek ML. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department; 2017. doi:<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>","apa":"Redmiles, E. M., Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department. <a href=\"https://doi.org/10.13016/M22K2W\">https://doi.org/10.13016/M22K2W</a>","ieee":"E. M. Redmiles, Y. Acar, S. Fahl, and M. L. Mazurek, <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017.","chicago":"Redmiles, Elissa M., Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017. <a href=\"https://doi.org/10.13016/M22K2W\">https://doi.org/10.13016/M22K2W</a>."},"year":"2017","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47873","status":"public","type":"report"},{"language":[{"iso":"eng"}],"extern":"1","_id":"47240","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","status":"public","publication":"2016 IEEE Symposium on Security and Privacy (SP)","type":"conference","title":"SoK: Lessons Learned from Android Security Research for Appified Software Platforms","doi":"10.1109/sp.2016.33","date_updated":"2024-06-05T13:14:55Z","publisher":"IEEE","date_created":"2023-09-22T12:41:43Z","author":[{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Michael","last_name":"Backes","full_name":"Backes, Michael"},{"full_name":"Bugiel, Sven","last_name":"Bugiel","first_name":"Sven"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Patrick","last_name":"McDaniel","full_name":"McDaniel, Patrick"},{"last_name":"Smith","full_name":"Smith, Matthew","first_name":"Matthew"}],"year":"2016","citation":{"short":"Y. Acar, M. Backes, S. Bugiel, S. Fahl, P. McDaniel, M. Smith, in: 2016 IEEE Symposium on Security and Privacy (SP), IEEE, 2016.","bibtex":"@inproceedings{Acar_Backes_Bugiel_Fahl_McDaniel_Smith_2016, title={SoK: Lessons Learned from Android Security Research for Appified Software Platforms}, DOI={<a href=\"https://doi.org/10.1109/sp.2016.33\">10.1109/sp.2016.33</a>}, booktitle={2016 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew}, year={2016} }","mla":"Acar, Yasemin, et al. “SoK: Lessons Learned from Android Security Research for Appified Software Platforms.” <i>2016 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/sp.2016.33\">10.1109/sp.2016.33</a>.","apa":"Acar, Y., Backes, M., Bugiel, S., Fahl, S., McDaniel, P., &#38; Smith, M. (2016). SoK: Lessons Learned from Android Security Research for Appified Software Platforms. <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2016.33\">https://doi.org/10.1109/sp.2016.33</a>","ama":"Acar Y, Backes M, Bugiel S, Fahl S, McDaniel P, Smith M. SoK: Lessons Learned from Android Security Research for Appified Software Platforms. In: <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/sp.2016.33\">10.1109/sp.2016.33</a>","ieee":"Y. Acar, M. Backes, S. Bugiel, S. Fahl, P. McDaniel, and M. Smith, “SoK: Lessons Learned from Android Security Research for Appified Software Platforms,” 2016, doi: <a href=\"https://doi.org/10.1109/sp.2016.33\">10.1109/sp.2016.33</a>.","chicago":"Acar, Yasemin, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel, and Matthew Smith. “SoK: Lessons Learned from Android Security Research for Appified Software Platforms.” In <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/sp.2016.33\">https://doi.org/10.1109/sp.2016.33</a>."},"publication_status":"published"},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47239","language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016","status":"public","editor":[{"full_name":"Holz, Thorsten","last_name":"Holz","first_name":"Thorsten"},{"first_name":"Stefan","last_name":"Savage","full_name":"Savage, Stefan"}],"date_created":"2023-09-22T12:40:35Z","author":[{"first_name":"Sergej","full_name":"Dechand, Sergej","last_name":"Dechand"},{"full_name":"Schürmann, Dominik","last_name":"Schürmann","first_name":"Dominik"},{"last_name":"Busse","full_name":"Busse, Karoline","first_name":"Karoline"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"full_name":"Smith, Matthew","last_name":"Smith","first_name":"Matthew"}],"date_updated":"2024-06-05T13:15:58Z","publisher":"USENIX Association","title":"An Empirical Study of Textual Key-Fingerprint Representations","citation":{"ama":"Dechand S, Schürmann D, Busse K, Acar Y, Fahl S, Smith M. An Empirical Study of Textual Key-Fingerprint Representations. In: Holz T, Savage S, eds. <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i>. USENIX Association; 2016:193–208.","ieee":"S. Dechand, D. Schürmann, K. Busse, Y. Acar, S. Fahl, and M. Smith, “An Empirical Study of Textual Key-Fingerprint Representations,” in <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i>, 2016, pp. 193–208.","chicago":"Dechand, Sergej, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, and Matthew Smith. “An Empirical Study of Textual Key-Fingerprint Representations.” In <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i>, edited by Thorsten Holz and Stefan Savage, 193–208. USENIX Association, 2016.","short":"S. Dechand, D. Schürmann, K. Busse, Y. Acar, S. Fahl, M. Smith, in: T. Holz, S. Savage (Eds.), 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016, USENIX Association, 2016, pp. 193–208.","bibtex":"@inproceedings{Dechand_Schürmann_Busse_Acar_Fahl_Smith_2016, title={An Empirical Study of Textual Key-Fingerprint Representations}, booktitle={25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016}, publisher={USENIX Association}, author={Dechand, Sergej and Schürmann, Dominik and Busse, Karoline and Acar, Yasemin and Fahl, Sascha and Smith, Matthew}, editor={Holz, Thorsten and Savage, Stefan}, year={2016}, pages={193–208} }","mla":"Dechand, Sergej, et al. “An Empirical Study of Textual Key-Fingerprint Representations.” <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i>, edited by Thorsten Holz and Stefan Savage, USENIX Association, 2016, pp. 193–208.","apa":"Dechand, S., Schürmann, D., Busse, K., Acar, Y., Fahl, S., &#38; Smith, M. (2016). An Empirical Study of Textual Key-Fingerprint Representations. In T. Holz &#38; S. Savage (Eds.), <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i> (pp. 193–208). USENIX Association."},"page":"193–208","year":"2016"},{"doi":"10.1109/sp.2016.25","title":"You Get Where You're Looking for: The Impact of Information Sources on Code Security","author":[{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Backes, Michael","last_name":"Backes","first_name":"Michael"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"last_name":"Kim","full_name":"Kim, Doowon","first_name":"Doowon"},{"last_name":"Mazurek","full_name":"Mazurek, Michelle L.","first_name":"Michelle L."},{"full_name":"Stransky, Christian","last_name":"Stransky","first_name":"Christian"}],"date_created":"2023-09-22T12:42:01Z","publisher":"IEEE","date_updated":"2024-06-05T13:15:19Z","citation":{"short":"Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, in: 2016 IEEE Symposium on Security and Privacy (SP), IEEE, 2016.","bibtex":"@inproceedings{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2016, title={You Get Where You’re Looking for: The Impact of Information Sources on Code Security}, DOI={<a href=\"https://doi.org/10.1109/sp.2016.25\">10.1109/sp.2016.25</a>}, booktitle={2016 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2016} }","mla":"Acar, Yasemin, et al. “You Get Where You’re Looking for: The Impact of Information Sources on Code Security.” <i>2016 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/sp.2016.25\">10.1109/sp.2016.25</a>.","apa":"Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C. (2016). You Get Where You’re Looking for: The Impact of Information Sources on Code Security. <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2016.25\">https://doi.org/10.1109/sp.2016.25</a>","ama":"Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. You Get Where You’re Looking for: The Impact of Information Sources on Code Security. In: <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/sp.2016.25\">10.1109/sp.2016.25</a>","ieee":"Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “You Get Where You’re Looking for: The Impact of Information Sources on Code Security,” 2016, doi: <a href=\"https://doi.org/10.1109/sp.2016.25\">10.1109/sp.2016.25</a>.","chicago":"Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. “You Get Where You’re Looking for: The Impact of Information Sources on Code Security.” In <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/sp.2016.25\">https://doi.org/10.1109/sp.2016.25</a>."},"year":"2016","publication_status":"published","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47241","status":"public","publication":"2016 IEEE Symposium on Security and Privacy (SP)","type":"conference"}]
