[{"status":"public","type":"conference","publication":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","extern":"1","language":[{"iso":"eng"}],"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47233","citation":{"ama":"Perl H, Dechand S, Smith M, et al. VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. In: <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2015. doi:<a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>","chicago":"Perl, Henning, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, and Yasemin Acar. “VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.” In <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2015. <a href=\"https://doi.org/10.1145/2810103.2813604\">https://doi.org/10.1145/2810103.2813604</a>.","ieee":"H. Perl <i>et al.</i>, “VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits,” 2015, doi: <a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>.","short":"H. Perl, S. Dechand, M. Smith, D. Arp, F. Yamaguchi, K. Rieck, S. Fahl, Y. Acar, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, 2015.","mla":"Perl, Henning, et al. “VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.” <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2015, doi:<a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>.","bibtex":"@inproceedings{Perl_Dechand_Smith_Arp_Yamaguchi_Rieck_Fahl_Acar_2015, title={VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits}, DOI={<a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>}, booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin}, year={2015} }","apa":"Perl, H., Dechand, S., Smith, M., Arp, D., Yamaguchi, F., Rieck, K., Fahl, S., &#38; Acar, Y. (2015). VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/2810103.2813604\">https://doi.org/10.1145/2810103.2813604</a>"},"year":"2015","publication_status":"published","doi":"10.1145/2810103.2813604","title":"VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits","date_created":"2023-09-22T12:03:10Z","author":[{"first_name":"Henning","full_name":"Perl, Henning","last_name":"Perl"},{"full_name":"Dechand, Sergej","last_name":"Dechand","first_name":"Sergej"},{"first_name":"Matthew","full_name":"Smith, Matthew","last_name":"Smith"},{"first_name":"Daniel","last_name":"Arp","full_name":"Arp, Daniel"},{"full_name":"Yamaguchi, Fabian","last_name":"Yamaguchi","first_name":"Fabian"},{"first_name":"Konrad","last_name":"Rieck","full_name":"Rieck, Konrad"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"}],"publisher":"ACM","date_updated":"2024-06-05T13:16:23Z"},{"date_created":"2023-09-22T12:01:30Z","author":[{"first_name":"Marten","full_name":"Oltrogge, Marten","last_name":"Oltrogge"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"first_name":"Sergej","last_name":"Dechand","full_name":"Dechand, Sergej"},{"first_name":"Matthew","full_name":"Smith, Matthew","last_name":"Smith"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"publisher":"USENIX Association","date_updated":"2024-06-05T13:16:45Z","title":"To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections","citation":{"bibtex":"@inproceedings{Oltrogge_Acar_Dechand_Smith_Fahl_2015, title={To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections}, booktitle={24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015}, publisher={USENIX Association}, author={Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha}, editor={Jung, Jaeyeon and Holz, Thorsten}, year={2015}, pages={239–254} }","short":"M. Oltrogge, Y. Acar, S. Dechand, M. Smith, S. Fahl, in: J. Jung, T. Holz (Eds.), 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015, USENIX Association, 2015, pp. 239–254.","mla":"Oltrogge, Marten, et al. “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections.” <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>, edited by Jaeyeon Jung and Thorsten Holz, USENIX Association, 2015, pp. 239–254.","apa":"Oltrogge, M., Acar, Y., Dechand, S., Smith, M., &#38; Fahl, S. (2015). To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In J. Jung &#38; T. Holz (Eds.), <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i> (pp. 239–254). USENIX Association.","ama":"Oltrogge M, Acar Y, Dechand S, Smith M, Fahl S. To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In: Jung J, Holz T, eds. <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>. USENIX Association; 2015:239–254.","ieee":"M. Oltrogge, Y. Acar, S. Dechand, M. Smith, and S. Fahl, “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections,” in <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>, 2015, pp. 239–254.","chicago":"Oltrogge, Marten, Yasemin Acar, Sergej Dechand, Matthew Smith, and Sascha Fahl. “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections.” In <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>, edited by Jaeyeon Jung and Thorsten Holz, 239–254. USENIX Association, 2015."},"page":"239–254","year":"2015","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47232","language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015","status":"public","editor":[{"full_name":"Jung, Jaeyeon","last_name":"Jung","first_name":"Jaeyeon"},{"last_name":"Holz","full_name":"Holz, Thorsten","first_name":"Thorsten"}]},{"user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47162","alternative_title":["a study on the root causes of SSL misconfigurations"],"language":[{"iso":"eng"}],"extern":"1","type":"conference","publication":"Proceedings of the 9th ACM symposium on Information, computer and communications security","status":"public","date_created":"2023-09-22T11:56:00Z","author":[{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"id":"94636","full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Henning","full_name":"Perl, Henning","last_name":"Perl"},{"first_name":"Matthew","full_name":"Smith, Matthew","last_name":"Smith"}],"date_updated":"2024-06-05T13:17:31Z","publisher":"ACM","doi":"10.1145/2590296.2590341","title":"Why eve and mallory (also) love webmasters","publication_status":"published","citation":{"apa":"Fahl, S., Acar, Y., Perl, H., &#38; Smith, M. (2014). Why eve and mallory (also) love webmasters. <i>Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/2590296.2590341\">https://doi.org/10.1145/2590296.2590341</a>","short":"S. Fahl, Y. Acar, H. Perl, M. Smith, in: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ACM, 2014.","bibtex":"@inproceedings{Fahl_Acar_Perl_Smith_2014, title={Why eve and mallory (also) love webmasters}, DOI={<a href=\"https://doi.org/10.1145/2590296.2590341\">10.1145/2590296.2590341</a>}, booktitle={Proceedings of the 9th ACM symposium on Information, computer and communications security}, publisher={ACM}, author={Fahl, Sascha and Acar, Yasemin and Perl, Henning and Smith, Matthew}, year={2014} }","mla":"Fahl, Sascha, et al. “Why Eve and Mallory (Also) Love Webmasters.” <i>Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security</i>, ACM, 2014, doi:<a href=\"https://doi.org/10.1145/2590296.2590341\">10.1145/2590296.2590341</a>.","chicago":"Fahl, Sascha, Yasemin Acar, Henning Perl, and Matthew Smith. “Why Eve and Mallory (Also) Love Webmasters.” In <i>Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security</i>. ACM, 2014. <a href=\"https://doi.org/10.1145/2590296.2590341\">https://doi.org/10.1145/2590296.2590341</a>.","ieee":"S. Fahl, Y. Acar, H. Perl, and M. Smith, “Why eve and mallory (also) love webmasters,” 2014, doi: <a href=\"https://doi.org/10.1145/2590296.2590341\">10.1145/2590296.2590341</a>.","ama":"Fahl S, Acar Y, Perl H, Smith M. Why eve and mallory (also) love webmasters. In: <i>Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security</i>. ACM; 2014. doi:<a href=\"https://doi.org/10.1145/2590296.2590341\">10.1145/2590296.2590341</a>"},"year":"2014"},{"author":[{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"full_name":"Harbach, Marian","last_name":"Harbach","first_name":"Marian"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"full_name":"Smith, Matthew","last_name":"Smith","first_name":"Matthew"}],"date_created":"2023-09-22T11:49:19Z","publisher":"ACM","date_updated":"2024-06-05T13:17:57Z","doi":"10.1145/2501604.2501617","title":"On the ecological validity of a password study","publication_status":"published","citation":{"ama":"Fahl S, Harbach M, Acar Y, Smith M. On the ecological validity of a password study. In: <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>. ACM; 2013. doi:<a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>","chicago":"Fahl, Sascha, Marian Harbach, Yasemin Acar, and Matthew Smith. “On the Ecological Validity of a Password Study.” In <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>. ACM, 2013. <a href=\"https://doi.org/10.1145/2501604.2501617\">https://doi.org/10.1145/2501604.2501617</a>.","ieee":"S. Fahl, M. Harbach, Y. Acar, and M. Smith, “On the ecological validity of a password study,” 2013, doi: <a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>.","apa":"Fahl, S., Harbach, M., Acar, Y., &#38; Smith, M. (2013). On the ecological validity of a password study. <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>. <a href=\"https://doi.org/10.1145/2501604.2501617\">https://doi.org/10.1145/2501604.2501617</a>","short":"S. Fahl, M. Harbach, Y. Acar, M. Smith, in: Proceedings of the Ninth Symposium on Usable Privacy and Security, ACM, 2013.","mla":"Fahl, Sascha, et al. “On the Ecological Validity of a Password Study.” <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>, ACM, 2013, doi:<a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>.","bibtex":"@inproceedings{Fahl_Harbach_Acar_Smith_2013, title={On the ecological validity of a password study}, DOI={<a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>}, booktitle={Proceedings of the Ninth Symposium on Usable Privacy and Security}, publisher={ACM}, author={Fahl, Sascha and Harbach, Marian and Acar, Yasemin and Smith, Matthew}, year={2013} }"},"year":"2013","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47161","extern":"1","language":[{"iso":"eng"}],"publication":"Proceedings of the Ninth Symposium on Usable Privacy and Security","type":"conference","status":"public"}]
