---
_id: '62738'
abstract:
- lang: eng
  text: 'Vulnerability disclosures are necessary to improve the security of our digital
    ecosystem. However, they can also be challenging for researchers: it may be hard
    to find out who the affected parties even are, or how to contact them. Researchers
    may be ignored or face adversity when disclosing vulnerabilities. We investigate
    researchers'' experiences with vulnerability disclosures, extract best practices,
    and make recommendations for researchers, institutions that employ them, industry,
    and regulators to enable effective vulnerability disclosures.'
author:
- first_name: Harshini
  full_name: Sri Ramulu, Harshini
  id: '99000'
  last_name: Sri Ramulu
  orcid: 0000-0002-0000-5843
- first_name: Anna Lena
  full_name: Rotthaler, Anna Lena
  id: '97843'
  last_name: Rotthaler
- first_name: Jost
  full_name: Rossel, Jost
  id: '58331'
  last_name: Rossel
  orcid: 0000-0002-3182-4059
- first_name: Rachel
  full_name: Gonzalez Rodriguez, Rachel
  last_name: Gonzalez Rodriguez
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Tadayoshi
  full_name: Kohno, Tadayoshi
  last_name: Kohno
- first_name: Juraj
  full_name: Somorovsky, Juraj
  id: '83504'
  last_name: Somorovsky
  orcid: 0000-0002-3593-7720
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Sri Ramulu H, Rotthaler AL, Rossel J, et al. Poster: Computer Security Researchers’
    Experiences with Vulnerability Disclosures. In: <i>Proceedings of the 2025 ACM
    SIGSAC Conference on Computer and Communications Security</i>. ACM; 2025. doi:<a
    href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>'
  apa: 'Sri Ramulu, H., Rotthaler, A. L., Rossel, J., Gonzalez Rodriguez, R., Wermke,
    D., Fahl, S., Kohno, T., Somorovsky, J., &#38; Acar, Y. (2025). Poster: Computer
    Security Researchers’ Experiences with Vulnerability Disclosures. <i>Proceedings
    of the 2025 ACM SIGSAC Conference on Computer and Communications Security</i>.
    <a href="https://doi.org/10.1145/3719027.3760723">https://doi.org/10.1145/3719027.3760723</a>'
  bibtex: '@inproceedings{Sri Ramulu_Rotthaler_Rossel_Gonzalez Rodriguez_Wermke_Fahl_Kohno_Somorovsky_Acar_2025,
    title={Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures},
    DOI={<a href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>},
    booktitle={Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Sri Ramulu, Harshini and Rotthaler, Anna Lena
    and Rossel, Jost and Gonzalez Rodriguez, Rachel and Wermke, Dominik and Fahl,
    Sascha and Kohno, Tadayoshi and Somorovsky, Juraj and Acar, Yasemin}, year={2025}
    }'
  chicago: 'Sri Ramulu, Harshini, Anna Lena Rotthaler, Jost Rossel, Rachel Gonzalez
    Rodriguez, Dominik Wermke, Sascha Fahl, Tadayoshi Kohno, Juraj Somorovsky, and
    Yasemin Acar. “Poster: Computer Security Researchers’ Experiences with Vulnerability
    Disclosures.” In <i>Proceedings of the 2025 ACM SIGSAC Conference on Computer
    and Communications Security</i>. ACM, 2025. <a href="https://doi.org/10.1145/3719027.3760723">https://doi.org/10.1145/3719027.3760723</a>.'
  ieee: 'H. Sri Ramulu <i>et al.</i>, “Poster: Computer Security Researchers’ Experiences
    with Vulnerability Disclosures,” 2025, doi: <a href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>.'
  mla: 'Sri Ramulu, Harshini, et al. “Poster: Computer Security Researchers’ Experiences
    with Vulnerability Disclosures.” <i>Proceedings of the 2025 ACM SIGSAC Conference
    on Computer and Communications Security</i>, ACM, 2025, doi:<a href="https://doi.org/10.1145/3719027.3760723">10.1145/3719027.3760723</a>.'
  short: 'H. Sri Ramulu, A.L. Rotthaler, J. Rossel, R. Gonzalez Rodriguez, D. Wermke,
    S. Fahl, T. Kohno, J. Somorovsky, Y. Acar, in: Proceedings of the 2025 ACM SIGSAC
    Conference on Computer and Communications Security, ACM, 2025.'
conference:
  end_date: 2025-10-17
  start_date: 2025-10-13
date_created: 2025-12-02T08:48:00Z
date_updated: 2025-12-02T08:54:18Z
doi: 10.1145/3719027.3760723
keyword:
- software vulnerabilities
- vulnerability disclosure
- security research
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://dl.acm.org/doi/10.1145/3719027.3760723
oa: '1'
publication: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'Poster: Computer Security Researchers'' Experiences with Vulnerability Disclosures'
type: conference
user_id: '58331'
year: '2025'
...
---
_id: '54863'
author:
- first_name: Juliane
  full_name: Schmüser, Juliane
  last_name: Schmüser
- first_name: Harshini Sri
  full_name: Ramulu, Harshini Sri
  last_name: Ramulu
- first_name: Noah
  full_name: Wöhler, Noah
  last_name: Wöhler
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Felix
  full_name: Bensmann, Felix
  last_name: Bensmann
- first_name: Dimitar
  full_name: Dimitrov, Dimitar
  last_name: Dimitrov
- first_name: Sebastian
  full_name: Schellhammer, Sebastian
  last_name: Schellhammer
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Stefan
  full_name: Dietze, Stefan
  last_name: Dietze
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Schmüser J, Ramulu HS, Wöhler N, et al. Analyzing Security and Privacy Advice
    During the 2022 Russian Invasion of Ukraine on Twitter. In: Mueller F ’Floyd’,
    Kyburz P, Williamson JR, et al., eds. <i>Proceedings of the CHI Conference on
    Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024</i>.
    ACM; 2024:574:1–574:16. doi:<a href="https://doi.org/10.1145/3613904.3642826">10.1145/3613904.3642826</a>'
  apa: Schmüser, J., Ramulu, H. S., Wöhler, N., Stransky, C., Bensmann, F., Dimitrov,
    D., Schellhammer, S., Wermke, D., Dietze, S., Acar, Y., &#38; Fahl, S. (2024).
    Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine
    on Twitter. In F. ’Floyd’ Mueller, P. Kyburz, J. R. Williamson, C. Sas, M. L.
    Wilson, P. O. T. Dugas, &#38; I. Shklovski (Eds.), <i>Proceedings of the CHI Conference
    on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16,
    2024</i> (p. 574:1–574:16). ACM. <a href="https://doi.org/10.1145/3613904.3642826">https://doi.org/10.1145/3613904.3642826</a>
  bibtex: '@inproceedings{Schmüser_Ramulu_Wöhler_Stransky_Bensmann_Dimitrov_Schellhammer_Wermke_Dietze_Acar_et
    al._2024, title={Analyzing Security and Privacy Advice During the 2022 Russian
    Invasion of Ukraine on Twitter}, DOI={<a href="https://doi.org/10.1145/3613904.3642826">10.1145/3613904.3642826</a>},
    booktitle={Proceedings of the CHI Conference on Human Factors in Computing Systems,
    CHI 2024, Honolulu, HI, USA, May 11-16, 2024}, publisher={ACM}, author={Schmüser,
    Juliane and Ramulu, Harshini Sri and Wöhler, Noah and Stransky, Christian and
    Bensmann, Felix and Dimitrov, Dimitar and Schellhammer, Sebastian and Wermke,
    Dominik and Dietze, Stefan and Acar, Yasemin and et al.}, editor={Mueller, Florian
    ’Floyd’ and Kyburz, Penny and Williamson, Julie R. and Sas, Corina and Wilson,
    Max L. and Dugas, Phoebe O. Toups and Shklovski, Irina}, year={2024}, pages={574:1–574:16}
    }'
  chicago: Schmüser, Juliane, Harshini Sri Ramulu, Noah Wöhler, Christian Stransky,
    Felix Bensmann, Dimitar Dimitrov, Sebastian Schellhammer, et al. “Analyzing Security
    and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter.” In
    <i>Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI
    2024, Honolulu, HI, USA, May 11-16, 2024</i>, edited by Florian ’Floyd’ Mueller,
    Penny Kyburz, Julie R. Williamson, Corina Sas, Max L. Wilson, Phoebe O. Toups
    Dugas, and Irina Shklovski, 574:1–574:16. ACM, 2024. <a href="https://doi.org/10.1145/3613904.3642826">https://doi.org/10.1145/3613904.3642826</a>.
  ieee: 'J. Schmüser <i>et al.</i>, “Analyzing Security and Privacy Advice During
    the 2022 Russian Invasion of Ukraine on Twitter,” in <i>Proceedings of the CHI
    Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA,
    May 11-16, 2024</i>, 2024, p. 574:1–574:16, doi: <a href="https://doi.org/10.1145/3613904.3642826">10.1145/3613904.3642826</a>.'
  mla: Schmüser, Juliane, et al. “Analyzing Security and Privacy Advice During the
    2022 Russian Invasion of Ukraine on Twitter.” <i>Proceedings of the CHI Conference
    on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16,
    2024</i>, edited by Florian ’Floyd’ Mueller et al., ACM, 2024, p. 574:1–574:16,
    doi:<a href="https://doi.org/10.1145/3613904.3642826">10.1145/3613904.3642826</a>.
  short: 'J. Schmüser, H.S. Ramulu, N. Wöhler, C. Stransky, F. Bensmann, D. Dimitrov,
    S. Schellhammer, D. Wermke, S. Dietze, Y. Acar, S. Fahl, in: F. ’Floyd’ Mueller,
    P. Kyburz, J.R. Williamson, C. Sas, M.L. Wilson, P.O.T. Dugas, I. Shklovski (Eds.),
    Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024,
    Honolulu, HI, USA, May 11-16, 2024, ACM, 2024, p. 574:1–574:16.'
date_created: 2024-06-24T08:23:26Z
date_updated: 2024-06-24T08:27:55Z
department:
- _id: '740'
doi: 10.1145/3613904.3642826
editor:
- first_name: Florian ’Floyd’
  full_name: Mueller, Florian ’Floyd’
  last_name: Mueller
- first_name: Penny
  full_name: Kyburz, Penny
  last_name: Kyburz
- first_name: Julie R.
  full_name: Williamson, Julie R.
  last_name: Williamson
- first_name: Corina
  full_name: Sas, Corina
  last_name: Sas
- first_name: Max L.
  full_name: Wilson, Max L.
  last_name: Wilson
- first_name: Phoebe O. Toups
  full_name: Dugas, Phoebe O. Toups
  last_name: Dugas
- first_name: Irina
  full_name: Shklovski, Irina
  last_name: Shklovski
language:
- iso: eng
page: 574:1–574:16
publication: Proceedings of the CHI Conference on Human Factors in Computing Systems,
  CHI 2024, Honolulu, HI, USA, May 11-16, 2024
publisher: ACM
status: public
title: Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine
  on Twitter
type: conference
user_id: '15458'
year: '2024'
...
---
_id: '54862'
author:
- first_name: Lina
  full_name: Boughton, Lina
  last_name: Boughton
- first_name: Courtney
  full_name: Miller, Courtney
  last_name: Miller
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Christian
  full_name: Kästner, Christian
  last_name: Kästner
citation:
  ama: 'Boughton L, Miller C, Acar Y, Wermke D, Kästner C. Decomposing and Measuring
    Trust in Open-Source Software Supply Chains. In: <i>Proceedings of the 2024 {ACM/IEEE}
    44th International Conference on Software Engineering: New Ideas and Emerging
    Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20, 2024</i>. ACM; 2024:57–61.
    doi:<a href="https://doi.org/10.1145/3639476.3639775">10.1145/3639476.3639775</a>'
  apa: 'Boughton, L., Miller, C., Acar, Y., Wermke, D., &#38; Kästner, C. (2024).
    Decomposing and Measuring Trust in Open-Source Software Supply Chains. <i>Proceedings
    of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering:
    New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20,
    2024</i>, 57–61. <a href="https://doi.org/10.1145/3639476.3639775">https://doi.org/10.1145/3639476.3639775</a>'
  bibtex: '@inproceedings{Boughton_Miller_Acar_Wermke_Kästner_2024, title={Decomposing
    and Measuring Trust in Open-Source Software Supply Chains}, DOI={<a href="https://doi.org/10.1145/3639476.3639775">10.1145/3639476.3639775</a>},
    booktitle={Proceedings of the 2024 {ACM/IEEE} 44th International Conference on
    Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon,
    Portugal, April 14-20, 2024}, publisher={ACM}, author={Boughton, Lina and Miller,
    Courtney and Acar, Yasemin and Wermke, Dominik and Kästner, Christian}, year={2024},
    pages={57–61} }'
  chicago: 'Boughton, Lina, Courtney Miller, Yasemin Acar, Dominik Wermke, and Christian
    Kästner. “Decomposing and Measuring Trust in Open-Source Software Supply Chains.”
    In <i>Proceedings of the 2024 {ACM/IEEE} 44th International Conference on Software
    Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal,
    April 14-20, 2024</i>, 57–61. ACM, 2024. <a href="https://doi.org/10.1145/3639476.3639775">https://doi.org/10.1145/3639476.3639775</a>.'
  ieee: 'L. Boughton, C. Miller, Y. Acar, D. Wermke, and C. Kästner, “Decomposing
    and Measuring Trust in Open-Source Software Supply Chains,” in <i>Proceedings
    of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering:
    New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20,
    2024</i>, 2024, pp. 57–61, doi: <a href="https://doi.org/10.1145/3639476.3639775">10.1145/3639476.3639775</a>.'
  mla: 'Boughton, Lina, et al. “Decomposing and Measuring Trust in Open-Source Software
    Supply Chains.” <i>Proceedings of the 2024 {ACM/IEEE} 44th International Conference
    on Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon,
    Portugal, April 14-20, 2024</i>, ACM, 2024, pp. 57–61, doi:<a href="https://doi.org/10.1145/3639476.3639775">10.1145/3639476.3639775</a>.'
  short: 'L. Boughton, C. Miller, Y. Acar, D. Wermke, C. Kästner, in: Proceedings
    of the 2024 {ACM/IEEE} 44th International Conference on Software Engineering:
    New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal, April 14-20,
    2024, ACM, 2024, pp. 57–61.'
date_created: 2024-06-24T08:21:50Z
date_updated: 2024-06-24T08:28:17Z
department:
- _id: '740'
doi: 10.1145/3639476.3639775
language:
- iso: eng
page: 57–61
publication: 'Proceedings of the 2024 {ACM/IEEE} 44th International Conference on
  Software Engineering: New Ideas and Emerging Results, NIER@ICSE 2024, Lisbon, Portugal,
  April 14-20, 2024'
publisher: ACM
status: public
title: Decomposing and Measuring Trust in Open-Source Software Supply Chains
type: conference
user_id: '15458'
year: '2024'
...
---
_id: '54864'
author:
- first_name: Stefan Albert
  full_name: Horstmann, Stefan Albert
  last_name: Horstmann
- first_name: Samuel
  full_name: Domiks, Samuel
  last_name: Domiks
- first_name: Marco
  full_name: Gutfleisch, Marco
  last_name: Gutfleisch
- first_name: Mindy
  full_name: Tran, Mindy
  last_name: Tran
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Veelasha
  full_name: Moonsamy, Veelasha
  last_name: Moonsamy
- first_name: Alena
  full_name: Naiakshina, Alena
  last_name: Naiakshina
citation:
  ama: Horstmann SA, Domiks S, Gutfleisch M, et al. “Those things are written by lawyers,
    and programmers are reading that.” Mapping the Communication Gap Between Software
    Developers and Privacy Experts. <i>Proc Priv Enhancing Technol</i>. 2024;2024(1):151–170.
    doi:<a href="https://doi.org/10.56553/POPETS-2024-0010">10.56553/POPETS-2024-0010</a>
  apa: Horstmann, S. A., Domiks, S., Gutfleisch, M., Tran, M., Acar, Y., Moonsamy,
    V., &#38; Naiakshina, A. (2024). “Those things are written by lawyers, and programmers
    are reading that.” Mapping the Communication Gap Between Software Developers and
    Privacy Experts. <i>Proc. Priv. Enhancing Technol.</i>, <i>2024</i>(1), 151–170.
    <a href="https://doi.org/10.56553/POPETS-2024-0010">https://doi.org/10.56553/POPETS-2024-0010</a>
  bibtex: '@article{Horstmann_Domiks_Gutfleisch_Tran_Acar_Moonsamy_Naiakshina_2024,
    title={“Those things are written by lawyers, and programmers are reading that.”
    Mapping the Communication Gap Between Software Developers and Privacy Experts},
    volume={2024}, DOI={<a href="https://doi.org/10.56553/POPETS-2024-0010">10.56553/POPETS-2024-0010</a>},
    number={1}, journal={Proc. Priv. Enhancing Technol.}, author={Horstmann, Stefan
    Albert and Domiks, Samuel and Gutfleisch, Marco and Tran, Mindy and Acar, Yasemin
    and Moonsamy, Veelasha and Naiakshina, Alena}, year={2024}, pages={151–170} }'
  chicago: 'Horstmann, Stefan Albert, Samuel Domiks, Marco Gutfleisch, Mindy Tran,
    Yasemin Acar, Veelasha Moonsamy, and Alena Naiakshina. “‘Those Things Are Written
    by Lawyers, and Programmers Are Reading That.’ Mapping the Communication Gap Between
    Software Developers and Privacy Experts.” <i>Proc. Priv. Enhancing Technol.</i>
    2024, no. 1 (2024): 151–170. <a href="https://doi.org/10.56553/POPETS-2024-0010">https://doi.org/10.56553/POPETS-2024-0010</a>.'
  ieee: 'S. A. Horstmann <i>et al.</i>, “‘Those things are written by lawyers, and
    programmers are reading that.’ Mapping the Communication Gap Between Software
    Developers and Privacy Experts,” <i>Proc. Priv. Enhancing Technol.</i>, vol. 2024,
    no. 1, pp. 151–170, 2024, doi: <a href="https://doi.org/10.56553/POPETS-2024-0010">10.56553/POPETS-2024-0010</a>.'
  mla: Horstmann, Stefan Albert, et al. “‘Those Things Are Written by Lawyers, and
    Programmers Are Reading That.’ Mapping the Communication Gap Between Software
    Developers and Privacy Experts.” <i>Proc. Priv. Enhancing Technol.</i>, vol. 2024,
    no. 1, 2024, pp. 151–170, doi:<a href="https://doi.org/10.56553/POPETS-2024-0010">10.56553/POPETS-2024-0010</a>.
  short: S.A. Horstmann, S. Domiks, M. Gutfleisch, M. Tran, Y. Acar, V. Moonsamy,
    A. Naiakshina, Proc. Priv. Enhancing Technol. 2024 (2024) 151–170.
date_created: 2024-06-24T08:25:24Z
date_updated: 2024-06-24T08:27:41Z
department:
- _id: '740'
doi: 10.56553/POPETS-2024-0010
intvolume: '      2024'
issue: '1'
language:
- iso: eng
page: 151–170
publication: Proc. Priv. Enhancing Technol.
status: public
title: '"Those things are written by lawyers, and programmers are reading that." Mapping
  the Communication Gap Between Software Developers and Privacy Experts'
type: journal_article
user_id: '15458'
volume: 2024
year: '2024'
...
---
_id: '55633'
author:
- first_name: Sandra
  full_name: Höltervennhoff, Sandra
  last_name: Höltervennhoff
- first_name: Noah
  full_name: Wöhler, Noah
  last_name: Wöhler
- first_name: Arne
  full_name: Möhle, Arne
  last_name: Möhle
- first_name: Marten
  full_name: Oltrogge, Marten
  last_name: Oltrogge
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Oliver
  full_name: Wiese, Oliver
  last_name: Wiese
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Höltervennhoff S, Wöhler N, Möhle A, et al. A Mixed-Methods Study on User
    Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service.
    In: Balzarotti D, Xu W, eds. <i>33rd USENIX Security Symposium, USENIX Security
    2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association; 2024.'
  apa: Höltervennhoff, S., Wöhler, N., Möhle, A., Oltrogge, M., Acar, Y., Wiese, O.,
    &#38; Fahl, S. (2024). A Mixed-Methods Study on User Experiences and Challenges
    of Recovery Codes for an End-to-End Encrypted Service. In D. Balzarotti &#38;
    W. Xu (Eds.), <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia,
    PA, USA, August 14-16, 2024</i>. USENIX Association.
  bibtex: '@inproceedings{Höltervennhoff_Wöhler_Möhle_Oltrogge_Acar_Wiese_Fahl_2024,
    title={A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes
    for an End-to-End Encrypted Service}, booktitle={33rd USENIX Security Symposium,
    USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher={USENIX
    Association}, author={Höltervennhoff, Sandra and Wöhler, Noah and Möhle, Arne
    and Oltrogge, Marten and Acar, Yasemin and Wiese, Oliver and Fahl, Sascha}, editor={Balzarotti,
    Davide and Xu, Wenyuan}, year={2024} }'
  chicago: Höltervennhoff, Sandra, Noah Wöhler, Arne Möhle, Marten Oltrogge, Yasemin
    Acar, Oliver Wiese, and Sascha Fahl. “A Mixed-Methods Study on User Experiences
    and Challenges of Recovery Codes for an End-to-End Encrypted Service.” In <i>33rd
    USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX Association,
    2024.
  ieee: S. Höltervennhoff <i>et al.</i>, “A Mixed-Methods Study on User Experiences
    and Challenges of Recovery Codes for an End-to-End Encrypted Service,” in <i>33rd
    USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024</i>, 2024.
  mla: Höltervennhoff, Sandra, et al. “A Mixed-Methods Study on User Experiences and
    Challenges of Recovery Codes for an End-to-End Encrypted Service.” <i>33rd USENIX
    Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16,
    2024</i>, edited by Davide Balzarotti and Wenyuan Xu, USENIX Association, 2024.
  short: 'S. Höltervennhoff, N. Wöhler, A. Möhle, M. Oltrogge, Y. Acar, O. Wiese,
    S. Fahl, in: D. Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX
    Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association,
    2024.'
date_created: 2024-08-19T08:02:52Z
date_updated: 2024-08-19T08:04:17Z
department:
- _id: '740'
editor:
- first_name: Davide
  full_name: Balzarotti, Davide
  last_name: Balzarotti
- first_name: Wenyuan
  full_name: Xu, Wenyuan
  last_name: Xu
language:
- iso: eng
publication: 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA,
  USA, August 14-16, 2024
publisher: USENIX Association
status: public
title: A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes
  for an End-to-End Encrypted Service
type: conference
user_id: '15458'
year: '2024'
...
---
_id: '55632'
author:
- first_name: Konstantin
  full_name: Fischer, Konstantin
  last_name: Fischer
- first_name: Ivana
  full_name: Trummová, Ivana
  last_name: Trummová
- first_name: Phillip
  full_name: Gajland, Phillip
  last_name: Gajland
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: M. Angela
  full_name: Sasse, M. Angela
  last_name: Sasse
citation:
  ama: 'Fischer K, Trummová I, Gajland P, Acar Y, Fahl S, Sasse MA. The Challenges
    of Bringing Cryptography from Research Papers to Products: Results from an Interview
    Study with Experts. In: Balzarotti D, Xu W, eds. <i>33rd USENIX Security Symposium,
    USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association;
    2024.'
  apa: 'Fischer, K., Trummová, I., Gajland, P., Acar, Y., Fahl, S., &#38; Sasse, M.
    A. (2024). The Challenges of Bringing Cryptography from Research Papers to Products:
    Results from an Interview Study with Experts. In D. Balzarotti &#38; W. Xu (Eds.),
    <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA,
    August 14-16, 2024</i>. USENIX Association.'
  bibtex: '@inproceedings{Fischer_Trummová_Gajland_Acar_Fahl_Sasse_2024, title={The
    Challenges of Bringing Cryptography from Research Papers to Products: Results
    from an Interview Study with Experts}, booktitle={33rd USENIX Security Symposium,
    USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher={USENIX
    Association}, author={Fischer, Konstantin and Trummová, Ivana and Gajland, Phillip
    and Acar, Yasemin and Fahl, Sascha and Sasse, M. Angela}, editor={Balzarotti,
    Davide and Xu, Wenyuan}, year={2024} }'
  chicago: 'Fischer, Konstantin, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha
    Fahl, and M. Angela Sasse. “The Challenges of Bringing Cryptography from Research
    Papers to Products: Results from an Interview Study with Experts.” In <i>33rd
    USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX Association,
    2024.'
  ieee: 'K. Fischer, I. Trummová, P. Gajland, Y. Acar, S. Fahl, and M. A. Sasse, “The
    Challenges of Bringing Cryptography from Research Papers to Products: Results
    from an Interview Study with Experts,” in <i>33rd USENIX Security Symposium, USENIX
    Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, 2024.'
  mla: 'Fischer, Konstantin, et al. “The Challenges of Bringing Cryptography from
    Research Papers to Products: Results from an Interview Study with Experts.” <i>33rd
    USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu, USENIX Association,
    2024.'
  short: 'K. Fischer, I. Trummová, P. Gajland, Y. Acar, S. Fahl, M.A. Sasse, in: D.
    Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX Security 2024,
    Philadelphia, PA, USA, August 14-16, 2024, USENIX Association, 2024.'
date_created: 2024-08-19T07:56:08Z
date_updated: 2024-08-19T08:04:21Z
department:
- _id: '740'
editor:
- first_name: Davide
  full_name: Balzarotti, Davide
  last_name: Balzarotti
- first_name: Wenyuan
  full_name: Xu, Wenyuan
  last_name: Xu
language:
- iso: eng
publication: 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA,
  USA, August 14-16, 2024
publisher: USENIX Association
status: public
title: 'The Challenges of Bringing Cryptography from Research Papers to Products:
  Results from an Interview Study with Experts'
type: conference
user_id: '15458'
year: '2024'
...
---
_id: '55634'
author:
- first_name: Marcel
  full_name: Fourné, Marcel
  last_name: Fourné
- first_name: Daniel De Almeida
  full_name: Braga, Daniel De Almeida
  last_name: Braga
- first_name: Jan
  full_name: Jancar, Jan
  last_name: Jancar
- first_name: Mohamed
  full_name: Sabt, Mohamed
  last_name: Sabt
- first_name: Peter
  full_name: Schwabe, Peter
  last_name: Schwabe
- first_name: Gilles
  full_name: Barthe, Gilles
  last_name: Barthe
- first_name: Pierre-Alain
  full_name: Fouque, Pierre-Alain
  last_name: Fouque
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Fourné M, Braga DDA, Jancar J, et al. “These results must be false”: A usability
    evaluation of constant-time analysis tools. In: Balzarotti D, Xu W, eds. <i>33rd
    USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024</i>. USENIX Association; 2024.'
  apa: 'Fourné, M., Braga, D. D. A., Jancar, J., Sabt, M., Schwabe, P., Barthe, G.,
    Fouque, P.-A., &#38; Acar, Y. (2024). “These results must be false”: A usability
    evaluation of constant-time analysis tools. In D. Balzarotti &#38; W. Xu (Eds.),
    <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA,
    August 14-16, 2024</i>. USENIX Association.'
  bibtex: '@inproceedings{Fourné_Braga_Jancar_Sabt_Schwabe_Barthe_Fouque_Acar_2024,
    title={“These results must be false”: A usability evaluation of constant-time
    analysis tools}, booktitle={33rd USENIX Security Symposium, USENIX Security 2024,
    Philadelphia, PA, USA, August 14-16, 2024}, publisher={USENIX Association}, author={Fourné,
    Marcel and Braga, Daniel De Almeida and Jancar, Jan and Sabt, Mohamed and Schwabe,
    Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, editor={Balzarotti,
    Davide and Xu, Wenyuan}, year={2024} }'
  chicago: 'Fourné, Marcel, Daniel De Almeida Braga, Jan Jancar, Mohamed Sabt, Peter
    Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘These Results
    Must Be False’: A Usability Evaluation of Constant-Time Analysis Tools.” In <i>33rd
    USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX Association,
    2024.'
  ieee: 'M. Fourné <i>et al.</i>, “‘These results must be false’: A usability evaluation
    of constant-time analysis tools,” in <i>33rd USENIX Security Symposium, USENIX
    Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, 2024.'
  mla: 'Fourné, Marcel, et al. “‘These Results Must Be False’: A Usability Evaluation
    of Constant-Time Analysis Tools.” <i>33rd USENIX Security Symposium, USENIX Security
    2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti
    and Wenyuan Xu, USENIX Association, 2024.'
  short: 'M. Fourné, D.D.A. Braga, J. Jancar, M. Sabt, P. Schwabe, G. Barthe, P.-A.
    Fouque, Y. Acar, in: D. Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium,
    USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association,
    2024.'
date_created: 2024-08-19T08:14:13Z
date_updated: 2024-08-19T08:25:10Z
department:
- _id: '740'
editor:
- first_name: Davide
  full_name: Balzarotti, Davide
  last_name: Balzarotti
- first_name: Wenyuan
  full_name: Xu, Wenyuan
  last_name: Xu
language:
- iso: eng
publication: 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA,
  USA, August 14-16, 2024
publisher: USENIX Association
status: public
title: '"These results must be false": A usability evaluation of constant-time analysis
  tools'
type: conference
user_id: '15458'
year: '2024'
...
---
_id: '55636'
author:
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Jacques
  full_name: Suray, Jacques
  last_name: Suray
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Marcel
  full_name: Fourné, Marcel
  last_name: Fourné
- first_name: Sabrina
  full_name: Amft, Sabrina
  last_name: Amft
- first_name: Ivana
  full_name: Trummová, Ivana
  last_name: Trummová
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Huaman N, Suray J, Klemmer JH, et al. “You have to read 50 different RFCs
    that contradict each other”: An Interview Study on the Experiences of Implementing
    Cryptographic Standards. In: Balzarotti D, Xu W, eds. <i>33rd USENIX Security
    Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>.
    USENIX Association; 2024.'
  apa: 'Huaman, N., Suray, J., Klemmer, J. H., Fourné, M., Amft, S., Trummová, I.,
    Acar, Y., &#38; Fahl, S. (2024). “You have to read 50 different RFCs that contradict
    each other”: An Interview Study on the Experiences of Implementing Cryptographic
    Standards. In D. Balzarotti &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium,
    USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association.'
  bibtex: '@inproceedings{Huaman_Suray_Klemmer_Fourné_Amft_Trummová_Acar_Fahl_2024,
    title={“You have to read 50 different RFCs that contradict each other”: An Interview
    Study on the Experiences of Implementing Cryptographic Standards}, booktitle={33rd
    USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024}, publisher={USENIX Association}, author={Huaman, Nicolas and Suray,
    Jacques and Klemmer, Jan H. and Fourné, Marcel and Amft, Sabrina and Trummová,
    Ivana and Acar, Yasemin and Fahl, Sascha}, editor={Balzarotti, Davide and Xu,
    Wenyuan}, year={2024} }'
  chicago: 'Huaman, Nicolas, Jacques Suray, Jan H. Klemmer, Marcel Fourné, Sabrina
    Amft, Ivana Trummová, Yasemin Acar, and Sascha Fahl. “‘You Have to Read 50 Different
    RFCs That Contradict Each Other’: An Interview Study on the Experiences of Implementing
    Cryptographic Standards.” In <i>33rd USENIX Security Symposium, USENIX Security
    2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti
    and Wenyuan Xu. USENIX Association, 2024.'
  ieee: 'N. Huaman <i>et al.</i>, “‘You have to read 50 different RFCs that contradict
    each other’: An Interview Study on the Experiences of Implementing Cryptographic
    Standards,” in <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia,
    PA, USA, August 14-16, 2024</i>, 2024.'
  mla: 'Huaman, Nicolas, et al. “‘You Have to Read 50 Different RFCs That Contradict
    Each Other’: An Interview Study on the Experiences of Implementing Cryptographic
    Standards.” <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia,
    PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu, USENIX
    Association, 2024.'
  short: 'N. Huaman, J. Suray, J.H. Klemmer, M. Fourné, S. Amft, I. Trummová, Y. Acar,
    S. Fahl, in: D. Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX
    Security 2024, Philadelphia, PA, USA, August 14-16, 2024, USENIX Association,
    2024.'
date_created: 2024-08-19T08:26:29Z
date_updated: 2024-08-19T08:54:05Z
department:
- _id: '740'
editor:
- first_name: Davide
  full_name: Balzarotti, Davide
  last_name: Balzarotti
- first_name: Wenyuan
  full_name: Xu, Wenyuan
  last_name: Xu
language:
- iso: eng
publication: 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA,
  USA, August 14-16, 2024
publisher: USENIX Association
status: public
title: '"You have to read 50 different RFCs that contradict each other": An Interview
  Study on the Experiences of Implementing Cryptographic Standards'
type: conference
user_id: '15458'
year: '2024'
...
---
_id: '55641'
author:
- first_name: Kabir
  full_name: Panahi, Kabir
  last_name: Panahi
- first_name: Shawn
  full_name: Robertson, Shawn
  last_name: Robertson
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Alexandru G.
  full_name: Bardas, Alexandru G.
  last_name: Bardas
- first_name: Tadayoshi
  full_name: Kohno, Tadayoshi
  last_name: Kohno
- first_name: Lucy
  full_name: Simko, Lucy
  last_name: Simko
citation:
  ama: 'Panahi K, Robertson S, Acar Y, Bardas AG, Kohno T, Simko L. "But they have
    overlooked a few things in Afghanistan: " An Analysis of the Integration of Biometric
    Voter Verification in the 2019 Afghan Presidential Elections. In: Balzarotti D,
    Xu W, eds. <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia,
    PA, USA, August 14-16, 2024</i>. USENIX Association; 2024.'
  apa: 'Panahi, K., Robertson, S., Acar, Y., Bardas, A. G., Kohno, T., &#38; Simko,
    L. (2024). "But they have overlooked a few things in Afghanistan: " An Analysis
    of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential
    Elections. In D. Balzarotti &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium,
    USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association.'
  bibtex: '@inproceedings{Panahi_Robertson_Acar_Bardas_Kohno_Simko_2024, title={"But
    they have overlooked a few things in Afghanistan: " An Analysis of the Integration
    of Biometric Voter Verification in the 2019 Afghan Presidential Elections}, booktitle={33rd
    USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024}, publisher={USENIX Association}, author={Panahi, Kabir and Robertson,
    Shawn and Acar, Yasemin and Bardas, Alexandru G. and Kohno, Tadayoshi and Simko,
    Lucy}, editor={Balzarotti, Davide and Xu, Wenyuan}, year={2024} }'
  chicago: 'Panahi, Kabir, Shawn Robertson, Yasemin Acar, Alexandru G. Bardas, Tadayoshi
    Kohno, and Lucy Simko. “"But They Have Overlooked a Few Things in Afghanistan:
    " An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan
    Presidential Elections.” In <i>33rd USENIX Security Symposium, USENIX Security
    2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti
    and Wenyuan Xu. USENIX Association, 2024.'
  ieee: 'K. Panahi, S. Robertson, Y. Acar, A. G. Bardas, T. Kohno, and L. Simko, “"But
    they have overlooked a few things in Afghanistan: " An Analysis of the Integration
    of Biometric Voter Verification in the 2019 Afghan Presidential Elections,” in
    <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA,
    August 14-16, 2024</i>, 2024.'
  mla: 'Panahi, Kabir, et al. “"But They Have Overlooked a Few Things in Afghanistan:
    " An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan
    Presidential Elections.” <i>33rd USENIX Security Symposium, USENIX Security 2024,
    Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and
    Wenyuan Xu, USENIX Association, 2024.'
  short: 'K. Panahi, S. Robertson, Y. Acar, A.G. Bardas, T. Kohno, L. Simko, in: D.
    Balzarotti, W. Xu (Eds.), 33rd USENIX Security Symposium, USENIX Security 2024,
    Philadelphia, PA, USA, August 14-16, 2024, USENIX Association, 2024.'
date_created: 2024-08-19T08:34:15Z
date_updated: 2024-08-19T08:53:38Z
department:
- _id: '740'
editor:
- first_name: Davide
  full_name: Balzarotti, Davide
  last_name: Balzarotti
- first_name: Wenyuan
  full_name: Xu, Wenyuan
  last_name: Xu
language:
- iso: eng
publication: 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA,
  USA, August 14-16, 2024
publisher: USENIX Association
status: public
title: '"But they have overlooked a few things in Afghanistan: " An Analysis of the
  Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections'
type: conference
user_id: '15458'
year: '2024'
...
---
_id: '55642'
author:
- first_name: Harshini Sri
  full_name: Ramulu, Harshini Sri
  last_name: Ramulu
- first_name: Helen
  full_name: Schmitt, Helen
  last_name: Schmitt
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Ramulu HS, Schmitt H, Wermke D, Acar Y. Security and Privacy Software Creators’
    Perspectives on Unintended Consequences. In: Balzarotti D, Xu W, eds. <i>33rd
    USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024</i>. USENIX Association; 2024.'
  apa: Ramulu, H. S., Schmitt, H., Wermke, D., &#38; Acar, Y. (2024). Security and
    Privacy Software Creators’ Perspectives on Unintended Consequences. In D. Balzarotti
    &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia,
    PA, USA, August 14-16, 2024</i>. USENIX Association.
  bibtex: '@inproceedings{Ramulu_Schmitt_Wermke_Acar_2024, title={Security and Privacy
    Software Creators’ Perspectives on Unintended Consequences}, booktitle={33rd USENIX
    Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16,
    2024}, publisher={USENIX Association}, author={Ramulu, Harshini Sri and Schmitt,
    Helen and Wermke, Dominik and Acar, Yasemin}, editor={Balzarotti, Davide and Xu,
    Wenyuan}, year={2024} }'
  chicago: Ramulu, Harshini Sri, Helen Schmitt, Dominik Wermke, and Yasemin Acar.
    “Security and Privacy Software Creators’ Perspectives on Unintended Consequences.”
    In <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA,
    USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX
    Association, 2024.
  ieee: H. S. Ramulu, H. Schmitt, D. Wermke, and Y. Acar, “Security and Privacy Software
    Creators’ Perspectives on Unintended Consequences,” in <i>33rd USENIX Security
    Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>,
    2024.
  mla: Ramulu, Harshini Sri, et al. “Security and Privacy Software Creators’ Perspectives
    on Unintended Consequences.” <i>33rd USENIX Security Symposium, USENIX Security
    2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti
    and Wenyuan Xu, USENIX Association, 2024.
  short: 'H.S. Ramulu, H. Schmitt, D. Wermke, Y. Acar, in: D. Balzarotti, W. Xu (Eds.),
    33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024, USENIX Association, 2024.'
date_created: 2024-08-19T08:42:02Z
date_updated: 2024-08-19T08:53:32Z
department:
- _id: '740'
editor:
- first_name: Davide
  full_name: Balzarotti, Davide
  last_name: Balzarotti
- first_name: Wenyuan
  full_name: Xu, Wenyuan
  last_name: Xu
language:
- iso: eng
publication: 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA,
  USA, August 14-16, 2024
publisher: USENIX Association
status: public
title: Security and Privacy Software Creators’ Perspectives on Unintended Consequences
type: conference
user_id: '15458'
year: '2024'
...
---
_id: '58368'
author:
- first_name: Nusrat
  full_name: Zahan, Nusrat
  last_name: Zahan
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michel
  full_name: Cukier, Michel
  last_name: Cukier
- first_name: William
  full_name: Enck, William
  last_name: Enck
- first_name: Christian
  full_name: Kästner, Christian
  last_name: Kästner
- first_name: Alexandros
  full_name: Kapravelos, Alexandros
  last_name: Kapravelos
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Laurie A.
  full_name: Williams, Laurie A.
  last_name: Williams
citation:
  ama: 'Zahan N, Acar Y, Cukier M, et al. S3C2 Summit 2023-11: Industry Secure Supply
    Chain Summit. <i>CoRR</i>. 2024;abs/2408.16529. doi:<a href="https://doi.org/10.48550/ARXIV.2408.16529">10.48550/ARXIV.2408.16529</a>'
  apa: 'Zahan, N., Acar, Y., Cukier, M., Enck, W., Kästner, C., Kapravelos, A., Wermke,
    D., &#38; Williams, L. A. (2024). S3C2 Summit 2023-11: Industry Secure Supply
    Chain Summit. <i>CoRR</i>, <i>abs/2408.16529</i>. <a href="https://doi.org/10.48550/ARXIV.2408.16529">https://doi.org/10.48550/ARXIV.2408.16529</a>'
  bibtex: '@article{Zahan_Acar_Cukier_Enck_Kästner_Kapravelos_Wermke_Williams_2024,
    title={S3C2 Summit 2023-11: Industry Secure Supply Chain Summit}, volume={abs/2408.16529},
    DOI={<a href="https://doi.org/10.48550/ARXIV.2408.16529">10.48550/ARXIV.2408.16529</a>},
    journal={CoRR}, author={Zahan, Nusrat and Acar, Yasemin and Cukier, Michel and
    Enck, William and Kästner, Christian and Kapravelos, Alexandros and Wermke, Dominik
    and Williams, Laurie A.}, year={2024} }'
  chicago: 'Zahan, Nusrat, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner,
    Alexandros Kapravelos, Dominik Wermke, and Laurie A. Williams. “S3C2 Summit 2023-11:
    Industry Secure Supply Chain Summit.” <i>CoRR</i> abs/2408.16529 (2024). <a href="https://doi.org/10.48550/ARXIV.2408.16529">https://doi.org/10.48550/ARXIV.2408.16529</a>.'
  ieee: 'N. Zahan <i>et al.</i>, “S3C2 Summit 2023-11: Industry Secure Supply Chain
    Summit,” <i>CoRR</i>, vol. abs/2408.16529, 2024, doi: <a href="https://doi.org/10.48550/ARXIV.2408.16529">10.48550/ARXIV.2408.16529</a>.'
  mla: 'Zahan, Nusrat, et al. “S3C2 Summit 2023-11: Industry Secure Supply Chain Summit.”
    <i>CoRR</i>, vol. abs/2408.16529, 2024, doi:<a href="https://doi.org/10.48550/ARXIV.2408.16529">10.48550/ARXIV.2408.16529</a>.'
  short: N. Zahan, Y. Acar, M. Cukier, W. Enck, C. Kästner, A. Kapravelos, D. Wermke,
    L.A. Williams, CoRR abs/2408.16529 (2024).
date_created: 2025-01-27T10:22:03Z
date_updated: 2025-01-27T10:24:06Z
department:
- _id: '740'
doi: 10.48550/ARXIV.2408.16529
language:
- iso: eng
publication: CoRR
status: public
title: 'S3C2 Summit 2023-11: Industry Secure Supply Chain Summit'
type: journal_article
user_id: '15458'
volume: abs/2408.16529
year: '2024'
...
---
_id: '58369'
author:
- first_name: Greg
  full_name: Tystahl, Greg
  last_name: Tystahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michel
  full_name: Cukier, Michel
  last_name: Cukier
- first_name: William
  full_name: Enck, William
  last_name: Enck
- first_name: Christian
  full_name: Kästner, Christian
  last_name: Kästner
- first_name: Alexandros
  full_name: Kapravelos, Alexandros
  last_name: Kapravelos
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Laurie A.
  full_name: Williams, Laurie A.
  last_name: Williams
citation:
  ama: 'Tystahl G, Acar Y, Cukier M, et al. S3C2 Summit 2024-03: Industry Secure Supply
    Chain Summit. <i>CoRR</i>. 2024;abs/2405.08762. doi:<a href="https://doi.org/10.48550/ARXIV.2405.08762">10.48550/ARXIV.2405.08762</a>'
  apa: 'Tystahl, G., Acar, Y., Cukier, M., Enck, W., Kästner, C., Kapravelos, A.,
    Wermke, D., &#38; Williams, L. A. (2024). S3C2 Summit 2024-03: Industry Secure
    Supply Chain Summit. <i>CoRR</i>, <i>abs/2405.08762</i>. <a href="https://doi.org/10.48550/ARXIV.2405.08762">https://doi.org/10.48550/ARXIV.2405.08762</a>'
  bibtex: '@article{Tystahl_Acar_Cukier_Enck_Kästner_Kapravelos_Wermke_Williams_2024,
    title={S3C2 Summit 2024-03: Industry Secure Supply Chain Summit}, volume={abs/2405.08762},
    DOI={<a href="https://doi.org/10.48550/ARXIV.2405.08762">10.48550/ARXIV.2405.08762</a>},
    journal={CoRR}, author={Tystahl, Greg and Acar, Yasemin and Cukier, Michel and
    Enck, William and Kästner, Christian and Kapravelos, Alexandros and Wermke, Dominik
    and Williams, Laurie A.}, year={2024} }'
  chicago: 'Tystahl, Greg, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner,
    Alexandros Kapravelos, Dominik Wermke, and Laurie A. Williams. “S3C2 Summit 2024-03:
    Industry Secure Supply Chain Summit.” <i>CoRR</i> abs/2405.08762 (2024). <a href="https://doi.org/10.48550/ARXIV.2405.08762">https://doi.org/10.48550/ARXIV.2405.08762</a>.'
  ieee: 'G. Tystahl <i>et al.</i>, “S3C2 Summit 2024-03: Industry Secure Supply Chain
    Summit,” <i>CoRR</i>, vol. abs/2405.08762, 2024, doi: <a href="https://doi.org/10.48550/ARXIV.2405.08762">10.48550/ARXIV.2405.08762</a>.'
  mla: 'Tystahl, Greg, et al. “S3C2 Summit 2024-03: Industry Secure Supply Chain Summit.”
    <i>CoRR</i>, vol. abs/2405.08762, 2024, doi:<a href="https://doi.org/10.48550/ARXIV.2405.08762">10.48550/ARXIV.2405.08762</a>.'
  short: G. Tystahl, Y. Acar, M. Cukier, W. Enck, C. Kästner, A. Kapravelos, D. Wermke,
    L.A. Williams, CoRR abs/2405.08762 (2024).
date_created: 2025-01-27T10:32:20Z
date_updated: 2025-01-27T10:33:06Z
department:
- _id: '740'
doi: 10.48550/ARXIV.2405.08762
language:
- iso: eng
publication: CoRR
status: public
title: 'S3C2 Summit 2024-03: Industry Secure Supply Chain Summit'
type: journal_article
user_id: '15458'
volume: abs/2405.08762
year: '2024'
...
---
_id: '56624'
author:
- first_name: Anastassija
  full_name: Kostan, Anastassija
  id: '99059'
  last_name: Kostan
- first_name: Sara
  full_name: Olschar, Sara
  id: '100387'
  last_name: Olschar
- first_name: Lucy
  full_name: Simko, Lucy
  last_name: Simko
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Kostan A, Olschar S, Simko L, Acar Y. Exploring digital security and privacy
    in relative poverty in Germany through qualitative interviews. In: <i>33rd USENIX
    Security Symposium (USENIX Security 24)</i>. ; 2024:2029–2046.'
  apa: Kostan, A., Olschar, S., Simko, L., &#38; Acar, Y. (2024). Exploring digital
    security and privacy in relative poverty in Germany through qualitative interviews.
    <i>33rd USENIX Security Symposium (USENIX Security 24)</i>, 2029–2046.
  bibtex: '@inproceedings{Kostan_Olschar_Simko_Acar_2024, title={Exploring digital
    security and privacy in relative poverty in Germany through qualitative interviews},
    booktitle={33rd USENIX Security Symposium (USENIX Security 24)}, author={Kostan,
    Anastassija and Olschar, Sara and Simko, Lucy and Acar, Yasemin}, year={2024},
    pages={2029–2046} }'
  chicago: Kostan, Anastassija, Sara Olschar, Lucy Simko, and Yasemin Acar. “Exploring
    Digital Security and Privacy in Relative Poverty in Germany through Qualitative
    Interviews.” In <i>33rd USENIX Security Symposium (USENIX Security 24)</i>, 2029–2046,
    2024.
  ieee: A. Kostan, S. Olschar, L. Simko, and Y. Acar, “Exploring digital security
    and privacy in relative poverty in Germany through qualitative interviews,” in
    <i>33rd USENIX Security Symposium (USENIX Security 24)</i>, 2024, pp. 2029–2046.
  mla: Kostan, Anastassija, et al. “Exploring Digital Security and Privacy in Relative
    Poverty in Germany through Qualitative Interviews.” <i>33rd USENIX Security Symposium
    (USENIX Security 24)</i>, 2024, pp. 2029–2046.
  short: 'A. Kostan, S. Olschar, L. Simko, Y. Acar, in: 33rd USENIX Security Symposium
    (USENIX Security 24), 2024, pp. 2029–2046.'
date_created: 2024-10-15T08:43:15Z
date_updated: 2024-12-11T14:50:21Z
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.usenix.org/system/files/usenixsecurity24-kostan.pdf
oa: '1'
page: 2029–2046
publication: 33rd USENIX Security Symposium (USENIX Security 24)
status: public
title: Exploring digital security and privacy in relative poverty in Germany through
  qualitative interviews
type: conference
user_id: '51999'
year: '2024'
...
---
_id: '55637'
author:
- first_name: Anastassija
  full_name: Kostan, Anastassija
  last_name: Kostan
- first_name: Sara
  full_name: Olschar, Sara
  last_name: Olschar
- first_name: Lucy
  full_name: Simko, Lucy
  last_name: Simko
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Kostan A, Olschar S, Simko L, Acar Y. Exploring digital security and privacy
    in relative poverty in Germany through qualitative interviews. In: Balzarotti
    D, Xu W, eds. <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia,
    PA, USA, August 14-16, 2024</i>. USENIX Association; 2024.'
  apa: Kostan, A., Olschar, S., Simko, L., &#38; Acar, Y. (2024). Exploring digital
    security and privacy in relative poverty in Germany through qualitative interviews.
    In D. Balzarotti &#38; W. Xu (Eds.), <i>33rd USENIX Security Symposium, USENIX
    Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>. USENIX Association.
  bibtex: '@inproceedings{Kostan_Olschar_Simko_Acar_2024, title={Exploring digital
    security and privacy in relative poverty in Germany through qualitative interviews},
    booktitle={33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia,
    PA, USA, August 14-16, 2024}, publisher={USENIX Association}, author={Kostan,
    Anastassija and Olschar, Sara and Simko, Lucy and Acar, Yasemin}, editor={Balzarotti,
    Davide and Xu, Wenyuan}, year={2024} }'
  chicago: Kostan, Anastassija, Sara Olschar, Lucy Simko, and Yasemin Acar. “Exploring
    Digital Security and Privacy in Relative Poverty in Germany through Qualitative
    Interviews.” In <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia,
    PA, USA, August 14-16, 2024</i>, edited by Davide Balzarotti and Wenyuan Xu. USENIX
    Association, 2024.
  ieee: A. Kostan, S. Olschar, L. Simko, and Y. Acar, “Exploring digital security
    and privacy in relative poverty in Germany through qualitative interviews,” in
    <i>33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA,
    August 14-16, 2024</i>, 2024.
  mla: Kostan, Anastassija, et al. “Exploring Digital Security and Privacy in Relative
    Poverty in Germany through Qualitative Interviews.” <i>33rd USENIX Security Symposium,
    USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024</i>, edited by
    Davide Balzarotti and Wenyuan Xu, USENIX Association, 2024.
  short: 'A. Kostan, S. Olschar, L. Simko, Y. Acar, in: D. Balzarotti, W. Xu (Eds.),
    33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August
    14-16, 2024, USENIX Association, 2024.'
date_created: 2024-08-19T08:27:57Z
date_updated: 2025-09-04T11:19:24Z
department:
- _id: '740'
editor:
- first_name: Davide
  full_name: Balzarotti, Davide
  last_name: Balzarotti
- first_name: Wenyuan
  full_name: Xu, Wenyuan
  last_name: Xu
language:
- iso: eng
publication: 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA,
  USA, August 14-16, 2024
publisher: USENIX Association
status: public
title: Exploring digital security and privacy in relative poverty in Germany through
  qualitative interviews
type: conference
user_id: '15458'
year: '2024'
...
---
_id: '47306'
author:
- first_name: Franziska
  full_name: Herbert, Franziska
  last_name: Herbert
- first_name: Steffen
  full_name: Becker, Steffen
  last_name: Becker
- first_name: Leonie
  full_name: Schaewitz, Leonie
  last_name: Schaewitz
- first_name: Jonas
  full_name: Hielscher, Jonas
  last_name: Hielscher
- first_name: Marvin
  full_name: Kowalewski, Marvin
  last_name: Kowalewski
- first_name: M. Angela
  full_name: Sasse, M. Angela
  last_name: Sasse
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Markus
  full_name: Dürmuth, Markus
  last_name: Dürmuth
citation:
  ama: 'Herbert F, Becker S, Schaewitz L, et al. A World Full of Privacy and Security
    (Mis)conceptions? Findings of a Representative Survey in 12 Countries. In: Schmidt
    A, Väänänen K, Goyal T, et al., eds. <i>Proceedings of the 2023 CHI Conference
    on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28,
    2023</i>. ACM; 2023:582:1–582:23. doi:<a href="https://doi.org/10.1145/3544548.3581410">10.1145/3544548.3581410</a>'
  apa: Herbert, F., Becker, S., Schaewitz, L., Hielscher, J., Kowalewski, M., Sasse,
    M. A., Acar, Y., &#38; Dürmuth, M. (2023). A World Full of Privacy and Security
    (Mis)conceptions? Findings of a Representative Survey in 12 Countries. In A. Schmidt,
    K. Väänänen, T. Goyal, P. O. Kristensson, A. Peters, S. Mueller, J. R. Williamson,
    &#38; M. L. Wilson (Eds.), <i>Proceedings of the 2023 CHI Conference on Human
    Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i>
    (p. 582:1–582:23). ACM. <a href="https://doi.org/10.1145/3544548.3581410">https://doi.org/10.1145/3544548.3581410</a>
  bibtex: '@inproceedings{Herbert_Becker_Schaewitz_Hielscher_Kowalewski_Sasse_Acar_Dürmuth_2023,
    title={A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative
    Survey in 12 Countries}, DOI={<a href="https://doi.org/10.1145/3544548.3581410">10.1145/3544548.3581410</a>},
    booktitle={Proceedings of the 2023 CHI Conference on Human Factors in Computing
    Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023}, publisher={ACM}, author={Herbert,
    Franziska and Becker, Steffen and Schaewitz, Leonie and Hielscher, Jonas and Kowalewski,
    Marvin and Sasse, M. Angela and Acar, Yasemin and Dürmuth, Markus}, editor={Schmidt,
    Albrecht and Väänänen, Kaisa and Goyal, Tesh and Kristensson, Per Ola and Peters,
    Anicia and Mueller, Stefanie and Williamson, Julie R. and Wilson, Max L.}, year={2023},
    pages={582:1–582:23} }'
  chicago: Herbert, Franziska, Steffen Becker, Leonie Schaewitz, Jonas Hielscher,
    Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, and Markus Dürmuth. “A World
    Full of Privacy and Security (Mis)Conceptions? Findings of a Representative Survey
    in 12 Countries.” In <i>Proceedings of the 2023 CHI Conference on Human Factors
    in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023</i>, edited
    by Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters,
    Stefanie Mueller, Julie R. Williamson, and Max L. Wilson, 582:1–582:23. ACM, 2023.
    <a href="https://doi.org/10.1145/3544548.3581410">https://doi.org/10.1145/3544548.3581410</a>.
  ieee: 'F. Herbert <i>et al.</i>, “A World Full of Privacy and Security (Mis)conceptions?
    Findings of a Representative Survey in 12 Countries,” in <i>Proceedings of the
    2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg,
    Germany, April 23-28, 2023</i>, 2023, p. 582:1–582:23, doi: <a href="https://doi.org/10.1145/3544548.3581410">10.1145/3544548.3581410</a>.'
  mla: Herbert, Franziska, et al. “A World Full of Privacy and Security (Mis)Conceptions?
    Findings of a Representative Survey in 12 Countries.” <i>Proceedings of the 2023
    CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany,
    April 23-28, 2023</i>, edited by Albrecht Schmidt et al., ACM, 2023, p. 582:1–582:23,
    doi:<a href="https://doi.org/10.1145/3544548.3581410">10.1145/3544548.3581410</a>.
  short: 'F. Herbert, S. Becker, L. Schaewitz, J. Hielscher, M. Kowalewski, M.A. Sasse,
    Y. Acar, M. Dürmuth, in: A. Schmidt, K. Väänänen, T. Goyal, P.O. Kristensson,
    A. Peters, S. Mueller, J.R. Williamson, M.L. Wilson (Eds.), Proceedings of the
    2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg,
    Germany, April 23-28, 2023, ACM, 2023, p. 582:1–582:23.'
date_created: 2023-09-22T13:30:58Z
date_updated: 2024-06-05T12:40:15Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3544548.3581410
editor:
- first_name: Albrecht
  full_name: Schmidt, Albrecht
  last_name: Schmidt
- first_name: Kaisa
  full_name: Väänänen, Kaisa
  last_name: Väänänen
- first_name: Tesh
  full_name: Goyal, Tesh
  last_name: Goyal
- first_name: Per Ola
  full_name: Kristensson, Per Ola
  last_name: Kristensson
- first_name: Anicia
  full_name: Peters, Anicia
  last_name: Peters
- first_name: Stefanie
  full_name: Mueller, Stefanie
  last_name: Mueller
- first_name: Julie R.
  full_name: Williamson, Julie R.
  last_name: Williamson
- first_name: Max L.
  full_name: Wilson, Max L.
  last_name: Wilson
language:
- iso: eng
page: 582:1–582:23
publication: Proceedings of the 2023 CHI Conference on Human Factors in Computing
  Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023
publisher: ACM
status: public
title: A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative
  Survey in 12 Countries
type: conference
user_id: '14931'
year: '2023'
...
---
_id: '47304'
author:
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Noah
  full_name: Wöhler, Noah
  last_name: Wöhler
- first_name: Juliane
  full_name: Schmüser, Juliane
  last_name: Schmüser
- first_name: Harshini
  full_name: Sri Ramulu, Harshini
  id: '99000'
  last_name: Sri Ramulu
  orcid: 0000-0002-0000-5843
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Wermke D, Klemmer JH, Wöhler N, et al. “Always Contribute Back”: A Qualitative
    Study on Security Challenges of the Open Source Supply Chain. In: <i>44th IEEE
    Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25,
    2023</i>. IEEE; 2023:1545–1560. doi:<a href="https://doi.org/10.1109/SP46215.2023.10179378">10.1109/SP46215.2023.10179378</a>'
  apa: 'Wermke, D., Klemmer, J. H., Wöhler, N., Schmüser, J., Sri Ramulu, H., Acar,
    Y., &#38; Fahl, S. (2023). “Always Contribute Back”: A Qualitative Study on Security
    Challenges of the Open Source Supply Chain. <i>44th IEEE Symposium on Security
    and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1545–1560.
    <a href="https://doi.org/10.1109/SP46215.2023.10179378">https://doi.org/10.1109/SP46215.2023.10179378</a>'
  bibtex: '@inproceedings{Wermke_Klemmer_Wöhler_Schmüser_Sri Ramulu_Acar_Fahl_2023,
    title={“Always Contribute Back”: A Qualitative Study on Security Challenges of
    the Open Source Supply Chain}, DOI={<a href="https://doi.org/10.1109/SP46215.2023.10179378">10.1109/SP46215.2023.10179378</a>},
    booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
    CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Wermke, Dominik and Klemmer,
    Jan H. and Wöhler, Noah and Schmüser, Juliane and Sri Ramulu, Harshini and Acar,
    Yasemin and Fahl, Sascha}, year={2023}, pages={1545–1560} }'
  chicago: 'Wermke, Dominik, Jan H. Klemmer, Noah Wöhler, Juliane Schmüser, Harshini
    Sri Ramulu, Yasemin Acar, and Sascha Fahl. “‘Always Contribute Back’: A Qualitative
    Study on Security Challenges of the Open Source Supply Chain.” In <i>44th IEEE
    Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25,
    2023</i>, 1545–1560. IEEE, 2023. <a href="https://doi.org/10.1109/SP46215.2023.10179378">https://doi.org/10.1109/SP46215.2023.10179378</a>.'
  ieee: 'D. Wermke <i>et al.</i>, “‘Always Contribute Back’: A Qualitative Study on
    Security Challenges of the Open Source Supply Chain,” in <i>44th IEEE Symposium
    on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>,
    2023, pp. 1545–1560, doi: <a href="https://doi.org/10.1109/SP46215.2023.10179378">10.1109/SP46215.2023.10179378</a>.'
  mla: 'Wermke, Dominik, et al. “‘Always Contribute Back’: A Qualitative Study on
    Security Challenges of the Open Source Supply Chain.” <i>44th IEEE Symposium on
    Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, IEEE,
    2023, pp. 1545–1560, doi:<a href="https://doi.org/10.1109/SP46215.2023.10179378">10.1109/SP46215.2023.10179378</a>.'
  short: 'D. Wermke, J.H. Klemmer, N. Wöhler, J. Schmüser, H. Sri Ramulu, Y. Acar,
    S. Fahl, in: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
    CA, USA, May 21-25, 2023, IEEE, 2023, pp. 1545–1560.'
date_created: 2023-09-22T13:28:42Z
date_updated: 2024-06-05T12:37:40Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46215.2023.10179378
language:
- iso: eng
page: 1545–1560
publication: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
  CA, USA, May 21-25, 2023
publisher: IEEE
status: public
title: '"Always Contribute Back": A Qualitative Study on Security Challenges of the
  Open Source Supply Chain'
type: conference
user_id: '14931'
year: '2023'
...
---
_id: '47299'
author:
- first_name: Alexander
  full_name: Krause, Alexander
  last_name: Krause
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Krause A, Klemmer JH, Huaman N, Wermke D, Acar Y, Fahl S. Pushed by Accident:
    A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code
    Repositories. In: Calandrino JA, Troncoso C, eds. <i>32nd USENIX Security Symposium,
    USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>. USENIX Association;
    2023.'
  apa: 'Krause, A., Klemmer, J. H., Huaman, N., Wermke, D., Acar, Y., &#38; Fahl,
    S. (2023). Pushed by Accident: A Mixed-Methods Study on Strategies of Handling
    Secret Information in Source Code Repositories. In J. A. Calandrino &#38; C. Troncoso
    (Eds.), <i>32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA,
    USA, August 9-11, 2023</i>. USENIX Association.'
  bibtex: '@inproceedings{Krause_Klemmer_Huaman_Wermke_Acar_Fahl_2023, title={Pushed
    by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information
    in Source Code Repositories}, booktitle={32nd USENIX Security Symposium, USENIX
    Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher={USENIX Association},
    author={Krause, Alexander and Klemmer, Jan H. and Huaman, Nicolas and Wermke,
    Dominik and Acar, Yasemin and Fahl, Sascha}, editor={Calandrino, Joseph A. and
    Troncoso, Carmela}, year={2023} }'
  chicago: 'Krause, Alexander, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin
    Acar, and Sascha Fahl. “Pushed by Accident: A Mixed-Methods Study on Strategies
    of Handling Secret Information in Source Code Repositories.” In <i>32nd USENIX
    Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>,
    edited by Joseph A. Calandrino and Carmela Troncoso. USENIX Association, 2023.'
  ieee: 'A. Krause, J. H. Klemmer, N. Huaman, D. Wermke, Y. Acar, and S. Fahl, “Pushed
    by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information
    in Source Code Repositories,” in <i>32nd USENIX Security Symposium, USENIX Security
    2023, Anaheim, CA, USA, August 9-11, 2023</i>, 2023.'
  mla: 'Krause, Alexander, et al. “Pushed by Accident: A Mixed-Methods Study on Strategies
    of Handling Secret Information in Source Code Repositories.” <i>32nd USENIX Security
    Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023</i>, edited
    by Joseph A. Calandrino and Carmela Troncoso, USENIX Association, 2023.'
  short: 'A. Krause, J.H. Klemmer, N. Huaman, D. Wermke, Y. Acar, S. Fahl, in: J.A.
    Calandrino, C. Troncoso (Eds.), 32nd USENIX Security Symposium, USENIX Security
    2023, Anaheim, CA, USA, August 9-11, 2023, USENIX Association, 2023.'
date_created: 2023-09-22T13:26:59Z
date_updated: 2024-06-05T12:38:22Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Joseph A.
  full_name: Calandrino, Joseph A.
  last_name: Calandrino
- first_name: Carmela
  full_name: Troncoso, Carmela
  last_name: Troncoso
language:
- iso: eng
publication: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA,
  August 9-11, 2023
publisher: USENIX Association
status: public
title: 'Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret
  Information in Source Code Repositories'
type: conference
user_id: '14931'
year: '2023'
...
---
_id: '47310'
author:
- first_name: Marcel
  full_name: Fourné, Marcel
  last_name: Fourné
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: William
  full_name: Enck, William
  last_name: Enck
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Fourné M, Wermke D, Enck W, Fahl S, Acar Y. It’s like flossing your teeth:
    On the Importance and Challenges of Reproducible Builds for Software Supply Chain
    Security. In: <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
    CA, USA, May 21-25, 2023</i>. IEEE; 2023:1527–1544. doi:<a href="https://doi.org/10.1109/SP46215.2023.10179320">10.1109/SP46215.2023.10179320</a>'
  apa: 'Fourné, M., Wermke, D., Enck, W., Fahl, S., &#38; Acar, Y. (2023). It’s like
    flossing your teeth: On the Importance and Challenges of Reproducible Builds for
    Software Supply Chain Security. <i>44th IEEE Symposium on Security and Privacy,
    SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1527–1544. <a href="https://doi.org/10.1109/SP46215.2023.10179320">https://doi.org/10.1109/SP46215.2023.10179320</a>'
  bibtex: '@inproceedings{Fourné_Wermke_Enck_Fahl_Acar_2023, title={It’s like flossing
    your teeth: On the Importance and Challenges of Reproducible Builds for Software
    Supply Chain Security}, DOI={<a href="https://doi.org/10.1109/SP46215.2023.10179320">10.1109/SP46215.2023.10179320</a>},
    booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
    CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Fourné, Marcel and Wermke,
    Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={1527–1544}
    }'
  chicago: 'Fourné, Marcel, Dominik Wermke, William Enck, Sascha Fahl, and Yasemin
    Acar. “It’s like Flossing Your Teeth: On the Importance and Challenges of Reproducible
    Builds for Software Supply Chain Security.” In <i>44th IEEE Symposium on Security
    and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 1527–1544.
    IEEE, 2023. <a href="https://doi.org/10.1109/SP46215.2023.10179320">https://doi.org/10.1109/SP46215.2023.10179320</a>.'
  ieee: 'M. Fourné, D. Wermke, W. Enck, S. Fahl, and Y. Acar, “It’s like flossing
    your teeth: On the Importance and Challenges of Reproducible Builds for Software
    Supply Chain Security,” in <i>44th IEEE Symposium on Security and Privacy, SP
    2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2023, pp. 1527–1544, doi: <a
    href="https://doi.org/10.1109/SP46215.2023.10179320">10.1109/SP46215.2023.10179320</a>.'
  mla: 'Fourné, Marcel, et al. “It’s like Flossing Your Teeth: On the Importance and
    Challenges of Reproducible Builds for Software Supply Chain Security.” <i>44th
    IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25,
    2023</i>, IEEE, 2023, pp. 1527–1544, doi:<a href="https://doi.org/10.1109/SP46215.2023.10179320">10.1109/SP46215.2023.10179320</a>.'
  short: 'M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 44th IEEE Symposium
    on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE,
    2023, pp. 1527–1544.'
date_created: 2023-09-22T13:44:47Z
date_updated: 2024-06-05T12:38:52Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46215.2023.10179320
language:
- iso: eng
page: 1527–1544
publication: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
  CA, USA, May 21-25, 2023
publisher: IEEE
status: public
title: 'It’s like flossing your teeth: On the Importance and Challenges of Reproducible
  Builds for Software Supply Chain Security'
type: conference
user_id: '14931'
year: '2023'
...
---
_id: '47311'
author:
- first_name: Collins W.
  full_name: Munyendo, Collins W.
  last_name: Munyendo
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Adam J.
  full_name: Aviv, Adam J.
  last_name: Aviv
citation:
  ama: 'Munyendo CW, Acar Y, Aviv AJ. “In Eighty Percent of the Cases, I Select the
    Password for Them”: Security and Privacy Challenges, Advice, and Opportunities
    at Cybercafes in Kenya. In: <i>44th IEEE Symposium on Security and Privacy, SP
    2023, San Francisco, CA, USA, May 21-25, 2023</i>. IEEE; 2023:570–587. doi:<a
    href="https://doi.org/10.1109/SP46215.2023.10179410">10.1109/SP46215.2023.10179410</a>'
  apa: 'Munyendo, C. W., Acar, Y., &#38; Aviv, A. J. (2023). “In Eighty Percent of
    the Cases, I Select the Password for Them”: Security and Privacy Challenges, Advice,
    and Opportunities at Cybercafes in Kenya. <i>44th IEEE Symposium on Security and
    Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 570–587. <a href="https://doi.org/10.1109/SP46215.2023.10179410">https://doi.org/10.1109/SP46215.2023.10179410</a>'
  bibtex: '@inproceedings{Munyendo_Acar_Aviv_2023, title={“In Eighty Percent of the
    Cases, I Select the Password for Them”: Security and Privacy Challenges, Advice,
    and Opportunities at Cybercafes in Kenya}, DOI={<a href="https://doi.org/10.1109/SP46215.2023.10179410">10.1109/SP46215.2023.10179410</a>},
    booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
    CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Munyendo, Collins W. and
    Acar, Yasemin and Aviv, Adam J.}, year={2023}, pages={570–587} }'
  chicago: 'Munyendo, Collins W., Yasemin Acar, and Adam J. Aviv. “‘In Eighty Percent
    of the Cases, I Select the Password for Them’: Security and Privacy Challenges,
    Advice, and Opportunities at Cybercafes in Kenya.” In <i>44th IEEE Symposium on
    Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 570–587.
    IEEE, 2023. <a href="https://doi.org/10.1109/SP46215.2023.10179410">https://doi.org/10.1109/SP46215.2023.10179410</a>.'
  ieee: 'C. W. Munyendo, Y. Acar, and A. J. Aviv, “‘In Eighty Percent of the Cases,
    I Select the Password for Them’: Security and Privacy Challenges, Advice, and
    Opportunities at Cybercafes in Kenya,” in <i>44th IEEE Symposium on Security and
    Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2023, pp. 570–587,
    doi: <a href="https://doi.org/10.1109/SP46215.2023.10179410">10.1109/SP46215.2023.10179410</a>.'
  mla: 'Munyendo, Collins W., et al. “‘In Eighty Percent of the Cases, I Select the
    Password for Them’: Security and Privacy Challenges, Advice, and Opportunities
    at Cybercafes in Kenya.” <i>44th IEEE Symposium on Security and Privacy, SP 2023,
    San Francisco, CA, USA, May 21-25, 2023</i>, IEEE, 2023, pp. 570–587, doi:<a href="https://doi.org/10.1109/SP46215.2023.10179410">10.1109/SP46215.2023.10179410</a>.'
  short: 'C.W. Munyendo, Y. Acar, A.J. Aviv, in: 44th IEEE Symposium on Security and
    Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE, 2023, pp. 570–587.'
date_created: 2023-09-22T13:45:16Z
date_updated: 2024-06-05T12:39:19Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46215.2023.10179410
language:
- iso: eng
page: 570–587
publication: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
  CA, USA, May 21-25, 2023
publisher: IEEE
status: public
title: '"In Eighty Percent of the Cases, I Select the Password for Them": Security
  and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya'
type: conference
user_id: '14931'
year: '2023'
...
---
_id: '47303'
author:
- first_name: Dilara
  full_name: Keküllüoglu, Dilara
  last_name: Keküllüoglu
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Keküllüoglu D, Acar Y. “We are a startup to the core”: A qualitative interview
    study on the security and privacy development practices in Turkish software startups.
    In: <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA,
    USA, May 21-25, 2023</i>. IEEE; 2023:2015–2031. doi:<a href="https://doi.org/10.1109/SP46215.2023.10179339">10.1109/SP46215.2023.10179339</a>'
  apa: 'Keküllüoglu, D., &#38; Acar, Y. (2023). “We are a startup to the core”: A
    qualitative interview study on the security and privacy development practices
    in Turkish software startups. <i>44th IEEE Symposium on Security and Privacy,
    SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2015–2031. <a href="https://doi.org/10.1109/SP46215.2023.10179339">https://doi.org/10.1109/SP46215.2023.10179339</a>'
  bibtex: '@inproceedings{Keküllüoglu_Acar_2023, title={“We are a startup to the core”:
    A qualitative interview study on the security and privacy development practices
    in Turkish software startups}, DOI={<a href="https://doi.org/10.1109/SP46215.2023.10179339">10.1109/SP46215.2023.10179339</a>},
    booktitle={44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
    CA, USA, May 21-25, 2023}, publisher={IEEE}, author={Keküllüoglu, Dilara and Acar,
    Yasemin}, year={2023}, pages={2015–2031} }'
  chicago: 'Keküllüoglu, Dilara, and Yasemin Acar. “‘We Are a Startup to the Core’:
    A Qualitative Interview Study on the Security and Privacy Development Practices
    in Turkish Software Startups.” In <i>44th IEEE Symposium on Security and Privacy,
    SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, 2015–2031. IEEE, 2023. <a
    href="https://doi.org/10.1109/SP46215.2023.10179339">https://doi.org/10.1109/SP46215.2023.10179339</a>.'
  ieee: 'D. Keküllüoglu and Y. Acar, “‘We are a startup to the core’: A qualitative
    interview study on the security and privacy development practices in Turkish software
    startups,” in <i>44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
    CA, USA, May 21-25, 2023</i>, 2023, pp. 2015–2031, doi: <a href="https://doi.org/10.1109/SP46215.2023.10179339">10.1109/SP46215.2023.10179339</a>.'
  mla: 'Keküllüoglu, Dilara, and Yasemin Acar. “‘We Are a Startup to the Core’: A
    Qualitative Interview Study on the Security and Privacy Development Practices
    in Turkish Software Startups.” <i>44th IEEE Symposium on Security and Privacy,
    SP 2023, San Francisco, CA, USA, May 21-25, 2023</i>, IEEE, 2023, pp. 2015–2031,
    doi:<a href="https://doi.org/10.1109/SP46215.2023.10179339">10.1109/SP46215.2023.10179339</a>.'
  short: 'D. Keküllüoglu, Y. Acar, in: 44th IEEE Symposium on Security and Privacy,
    SP 2023, San Francisco, CA, USA, May 21-25, 2023, IEEE, 2023, pp. 2015–2031.'
date_created: 2023-09-22T13:28:23Z
date_updated: 2024-06-05T12:40:37Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46215.2023.10179339
language:
- iso: eng
page: 2015–2031
publication: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco,
  CA, USA, May 21-25, 2023
publisher: IEEE
status: public
title: '"We are a startup to the core": A qualitative interview study on the security
  and privacy development practices in Turkish software startups'
type: conference
user_id: '14931'
year: '2023'
...
