---
_id: '47844'
author:
- first_name: Jan
  full_name: Jancar, Jan
  last_name: Jancar
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Daniel De Almeida
  full_name: Braga, Daniel De Almeida
  last_name: Braga
- first_name: Mohamed
  full_name: Sabt, Mohamed
  last_name: Sabt
- first_name: Peter
  full_name: Schwabe, Peter
  last_name: Schwabe
- first_name: Gilles
  full_name: Barthe, Gilles
  last_name: Barthe
- first_name: Pierre-Alain
  full_name: Fouque, Pierre-Alain
  last_name: Fouque
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”:
    What Cryptographic Library Developers Think About Timing Attacks. In: <i>2022
    IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>'
  apa: 'Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G.,
    Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What
    Cryptographic Library Developers Think About Timing Attacks. <i>2022 IEEE Symposium
    on Security and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp46214.2022.9833713">https://doi.org/10.1109/sp46214.2022.9833713</a>'
  bibtex: '@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022,
    title={“They’re not that hard to mitigate”: What Cryptographic Library Developers
    Think About Timing Attacks}, DOI={<a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>},
    booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt,
    Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar,
    Yasemin}, year={2022} }'
  chicago: 'Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter
    Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That
    Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.”
    In <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2022. <a href="https://doi.org/10.1109/sp46214.2022.9833713">https://doi.org/10.1109/sp46214.2022.9833713</a>.'
  ieee: 'J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic
    Library Developers Think About Timing Attacks,” 2022, doi: <a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>.'
  mla: 'Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic
    Library Developers Think About Timing Attacks.” <i>2022 IEEE Symposium on Security
    and Privacy (SP)</i>, IEEE, 2022, doi:<a href="https://doi.org/10.1109/sp46214.2022.9833713">10.1109/sp46214.2022.9833713</a>.'
  short: 'J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A.
    Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.'
date_created: 2023-10-06T16:12:30Z
date_updated: 2024-06-05T12:55:00Z
department:
- _id: '858'
doi: 10.1109/sp46214.2022.9833713
extern: '1'
language:
- iso: eng
publication: 2022 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: '“They’re not that hard to mitigate”: What Cryptographic Library Developers
  Think About Timing Attacks'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47286'
author:
- first_name: Marco
  full_name: Gutfleisch, Marco
  last_name: Gutfleisch
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Niklas
  full_name: Busch, Niklas
  last_name: Busch
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: M. Angela
  full_name: Sasse, M. Angela
  last_name: Sasse
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Gutfleisch M, Klemmer JH, Busch N, Acar Y, Sasse MA, Fahl S. How Does Usable
    Security (Not) End Up in Software Products? Results From a Qualitative Interview
    Study. In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022</i>. IEEE; 2022:893–910. doi:<a href="https://doi.org/10.1109/SP46214.2022.9833756">10.1109/SP46214.2022.9833756</a>'
  apa: Gutfleisch, M., Klemmer, J. H., Busch, N., Acar, Y., Sasse, M. A., &#38; Fahl,
    S. (2022). How Does Usable Security (Not) End Up in Software Products? Results
    From a Qualitative Interview Study. <i>43rd IEEE Symposium on Security and Privacy,
    SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 893–910. <a href="https://doi.org/10.1109/SP46214.2022.9833756">https://doi.org/10.1109/SP46214.2022.9833756</a>
  bibtex: '@inproceedings{Gutfleisch_Klemmer_Busch_Acar_Sasse_Fahl_2022, title={How
    Does Usable Security (Not) End Up in Software Products? Results From a Qualitative
    Interview Study}, DOI={<a href="https://doi.org/10.1109/SP46214.2022.9833756">10.1109/SP46214.2022.9833756</a>},
    booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Gutfleisch, Marco and Klemmer,
    Jan H. and Busch, Niklas and Acar, Yasemin and Sasse, M. Angela and Fahl, Sascha},
    year={2022}, pages={893–910} }'
  chicago: Gutfleisch, Marco, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela
    Sasse, and Sascha Fahl. “How Does Usable Security (Not) End Up in Software Products?
    Results From a Qualitative Interview Study.” In <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 893–910. IEEE,
    2022. <a href="https://doi.org/10.1109/SP46214.2022.9833756">https://doi.org/10.1109/SP46214.2022.9833756</a>.
  ieee: 'M. Gutfleisch, J. H. Klemmer, N. Busch, Y. Acar, M. A. Sasse, and S. Fahl,
    “How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative
    Interview Study,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022,
    San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 893–910, doi: <a href="https://doi.org/10.1109/SP46214.2022.9833756">10.1109/SP46214.2022.9833756</a>.'
  mla: Gutfleisch, Marco, et al. “How Does Usable Security (Not) End Up in Software
    Products? Results From a Qualitative Interview Study.” <i>43rd IEEE Symposium
    on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>,
    IEEE, 2022, pp. 893–910, doi:<a href="https://doi.org/10.1109/SP46214.2022.9833756">10.1109/SP46214.2022.9833756</a>.
  short: 'M. Gutfleisch, J.H. Klemmer, N. Busch, Y. Acar, M.A. Sasse, S. Fahl, in:
    43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA,
    May 22-26, 2022, IEEE, 2022, pp. 893–910.'
date_created: 2023-09-22T13:18:54Z
date_updated: 2024-06-05T12:53:00Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46214.2022.9833756
extern: '1'
language:
- iso: eng
page: 893–910
publication: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
  CA, USA, May 22-26, 2022
publisher: IEEE
status: public
title: How Does Usable Security (Not) End Up in Software Products? Results From a
  Qualitative Interview Study
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47287'
author:
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Oliver
  full_name: Wiese, Oliver
  last_name: Wiese
- first_name: Volker
  full_name: Roth, Volker
  last_name: Roth
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Stransky C, Wiese O, Roth V, Acar Y, Fahl S. 27 Years and 81 Million Opportunities
    Later: Investigating the Use of Email Encryption for an Entire University. In:
    <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA,
    May 22-26, 2022</i>. IEEE; 2022:860–875. doi:<a href="https://doi.org/10.1109/SP46214.2022.9833755">10.1109/SP46214.2022.9833755</a>'
  apa: 'Stransky, C., Wiese, O., Roth, V., Acar, Y., &#38; Fahl, S. (2022). 27 Years
    and 81 Million Opportunities Later: Investigating the Use of Email Encryption
    for an Entire University. <i>43rd IEEE Symposium on Security and Privacy, SP 2022,
    San Francisco, CA, USA, May 22-26, 2022</i>, 860–875. <a href="https://doi.org/10.1109/SP46214.2022.9833755">https://doi.org/10.1109/SP46214.2022.9833755</a>'
  bibtex: '@inproceedings{Stransky_Wiese_Roth_Acar_Fahl_2022, title={27 Years and
    81 Million Opportunities Later: Investigating the Use of Email Encryption for
    an Entire University}, DOI={<a href="https://doi.org/10.1109/SP46214.2022.9833755">10.1109/SP46214.2022.9833755</a>},
    booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Stransky, Christian and Wiese,
    Oliver and Roth, Volker and Acar, Yasemin and Fahl, Sascha}, year={2022}, pages={860–875}
    }'
  chicago: 'Stransky, Christian, Oliver Wiese, Volker Roth, Yasemin Acar, and Sascha
    Fahl. “27 Years and 81 Million Opportunities Later: Investigating the Use of Email
    Encryption for an Entire University.” In <i>43rd IEEE Symposium on Security and
    Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 860–875. IEEE,
    2022. <a href="https://doi.org/10.1109/SP46214.2022.9833755">https://doi.org/10.1109/SP46214.2022.9833755</a>.'
  ieee: 'C. Stransky, O. Wiese, V. Roth, Y. Acar, and S. Fahl, “27 Years and 81 Million
    Opportunities Later: Investigating the Use of Email Encryption for an Entire University,”
    in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA,
    USA, May 22-26, 2022</i>, 2022, pp. 860–875, doi: <a href="https://doi.org/10.1109/SP46214.2022.9833755">10.1109/SP46214.2022.9833755</a>.'
  mla: 'Stransky, Christian, et al. “27 Years and 81 Million Opportunities Later:
    Investigating the Use of Email Encryption for an Entire University.” <i>43rd IEEE
    Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26,
    2022</i>, IEEE, 2022, pp. 860–875, doi:<a href="https://doi.org/10.1109/SP46214.2022.9833755">10.1109/SP46214.2022.9833755</a>.'
  short: 'C. Stransky, O. Wiese, V. Roth, Y. Acar, S. Fahl, in: 43rd IEEE Symposium
    on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE,
    2022, pp. 860–875.'
date_created: 2023-09-22T13:19:56Z
date_updated: 2024-06-05T12:53:20Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46214.2022.9833755
extern: '1'
language:
- iso: eng
page: 860–875
publication: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
  CA, USA, May 22-26, 2022
publisher: IEEE
status: public
title: '27 Years and 81 Million Opportunities Later: Investigating the Use of Email
  Encryption for an Entire University'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47283'
author:
- first_name: Harjot
  full_name: Kaur, Harjot
  last_name: Kaur
- first_name: Sabrina
  full_name: Amft, Sabrina
  last_name: Amft
- first_name: Daniel
  full_name: Votipka, Daniel
  last_name: Votipka
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Kaur H, Amft S, Votipka D, Acar Y, Fahl S. Where to Recruit for Security Development
    Studies: Comparing Six Software Developer Samples. In: Butler KRB, Thomas K, eds.
    <i>31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August
    10-12, 2022</i>. USENIX Association; 2022:4041–4058.'
  apa: 'Kaur, H., Amft, S., Votipka, D., Acar, Y., &#38; Fahl, S. (2022). Where to
    Recruit for Security Development Studies: Comparing Six Software Developer Samples.
    In K. R. B. Butler &#38; K. Thomas (Eds.), <i>31st USENIX Security Symposium,
    USENIX Security 2022, Boston, MA, USA, August 10-12, 2022</i> (pp. 4041–4058).
    USENIX Association.'
  bibtex: '@inproceedings{Kaur_Amft_Votipka_Acar_Fahl_2022, title={Where to Recruit
    for Security Development Studies: Comparing Six Software Developer Samples}, booktitle={31st
    USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12,
    2022}, publisher={USENIX Association}, author={Kaur, Harjot and Amft, Sabrina
    and Votipka, Daniel and Acar, Yasemin and Fahl, Sascha}, editor={Butler, Kevin
    R. B. and Thomas, Kurt}, year={2022}, pages={4041–4058} }'
  chicago: 'Kaur, Harjot, Sabrina Amft, Daniel Votipka, Yasemin Acar, and Sascha Fahl.
    “Where to Recruit for Security Development Studies: Comparing Six Software Developer
    Samples.” In <i>31st USENIX Security Symposium, USENIX Security 2022, Boston,
    MA, USA, August 10-12, 2022</i>, edited by Kevin R. B. Butler and Kurt Thomas,
    4041–4058. USENIX Association, 2022.'
  ieee: 'H. Kaur, S. Amft, D. Votipka, Y. Acar, and S. Fahl, “Where to Recruit for
    Security Development Studies: Comparing Six Software Developer Samples,” in <i>31st
    USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12,
    2022</i>, 2022, pp. 4041–4058.'
  mla: 'Kaur, Harjot, et al. “Where to Recruit for Security Development Studies: Comparing
    Six Software Developer Samples.” <i>31st USENIX Security Symposium, USENIX Security
    2022, Boston, MA, USA, August 10-12, 2022</i>, edited by Kevin R. B. Butler and
    Kurt Thomas, USENIX Association, 2022, pp. 4041–4058.'
  short: 'H. Kaur, S. Amft, D. Votipka, Y. Acar, S. Fahl, in: K.R.B. Butler, K. Thomas
    (Eds.), 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA,
    August 10-12, 2022, USENIX Association, 2022, pp. 4041–4058.'
date_created: 2023-09-22T13:17:23Z
date_updated: 2024-06-05T12:53:43Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Kevin R. B.
  full_name: Butler, Kevin R. B.
  last_name: Butler
- first_name: Kurt
  full_name: Thomas, Kurt
  last_name: Thomas
extern: '1'
language:
- iso: eng
page: 4041–4058
publication: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA,
  August 10-12, 2022
publisher: USENIX Association
status: public
title: 'Where to Recruit for Security Development Studies: Comparing Six Software
  Developer Samples'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47290'
author:
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Sabrina
  full_name: Amft, Sabrina
  last_name: Amft
- first_name: Marten
  full_name: Oltrogge, Marten
  last_name: Oltrogge
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Huaman N, Amft S, Oltrogge M, Acar Y, Fahl S. They Would Do Better If They
    Worked Together: Interaction Problems Between Password Managers and the Web. <i>IEEE
    Secur Priv</i>. 2022;20(2):49–60. doi:<a href="https://doi.org/10.1109/MSEC.2021.3123795">10.1109/MSEC.2021.3123795</a>'
  apa: 'Huaman, N., Amft, S., Oltrogge, M., Acar, Y., &#38; Fahl, S. (2022). They
    Would Do Better If They Worked Together: Interaction Problems Between Password
    Managers and the Web. <i>IEEE Secur. Priv.</i>, <i>20</i>(2), 49–60. <a href="https://doi.org/10.1109/MSEC.2021.3123795">https://doi.org/10.1109/MSEC.2021.3123795</a>'
  bibtex: '@article{Huaman_Amft_Oltrogge_Acar_Fahl_2022, title={They Would Do Better
    If They Worked Together: Interaction Problems Between Password Managers and the
    Web}, volume={20}, DOI={<a href="https://doi.org/10.1109/MSEC.2021.3123795">10.1109/MSEC.2021.3123795</a>},
    number={2}, journal={IEEE Secur. Priv.}, author={Huaman, Nicolas and Amft, Sabrina
    and Oltrogge, Marten and Acar, Yasemin and Fahl, Sascha}, year={2022}, pages={49–60}
    }'
  chicago: 'Huaman, Nicolas, Sabrina Amft, Marten Oltrogge, Yasemin Acar, and Sascha
    Fahl. “They Would Do Better If They Worked Together: Interaction Problems Between
    Password Managers and the Web.” <i>IEEE Secur. Priv.</i> 20, no. 2 (2022): 49–60.
    <a href="https://doi.org/10.1109/MSEC.2021.3123795">https://doi.org/10.1109/MSEC.2021.3123795</a>.'
  ieee: 'N. Huaman, S. Amft, M. Oltrogge, Y. Acar, and S. Fahl, “They Would Do Better
    If They Worked Together: Interaction Problems Between Password Managers and the
    Web,” <i>IEEE Secur. Priv.</i>, vol. 20, no. 2, pp. 49–60, 2022, doi: <a href="https://doi.org/10.1109/MSEC.2021.3123795">10.1109/MSEC.2021.3123795</a>.'
  mla: 'Huaman, Nicolas, et al. “They Would Do Better If They Worked Together: Interaction
    Problems Between Password Managers and the Web.” <i>IEEE Secur. Priv.</i>, vol.
    20, no. 2, 2022, pp. 49–60, doi:<a href="https://doi.org/10.1109/MSEC.2021.3123795">10.1109/MSEC.2021.3123795</a>.'
  short: N. Huaman, S. Amft, M. Oltrogge, Y. Acar, S. Fahl, IEEE Secur. Priv. 20 (2022)
    49–60.
date_created: 2023-09-22T13:22:05Z
date_updated: 2024-06-05T12:54:05Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/MSEC.2021.3123795
extern: '1'
intvolume: '        20'
issue: '2'
language:
- iso: eng
page: 49–60
publication: IEEE Secur. Priv.
status: public
title: 'They Would Do Better If They Worked Together: Interaction Problems Between
  Password Managers and the Web'
type: journal_article
user_id: '14931'
volume: 20
year: '2022'
...
---
_id: '47843'
author:
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Noah
  full_name: Wohler, Noah
  last_name: Wohler
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Marcel
  full_name: Fourné, Marcel
  id: '99291'
  last_name: Fourné
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Wermke D, Wohler N, Klemmer JH, Fourné M, Acar Y, Fahl S. Committed to Trust:
    A Qualitative Study on Security &#38;amp; Trust in Open Source Software Projects.
    In: <i>2022 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2022. doi:<a
    href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>'
  apa: 'Wermke, D., Wohler, N., Klemmer, J. H., Fourné, M., Acar, Y., &#38; Fahl,
    S. (2022). Committed to Trust: A Qualitative Study on Security &#38;amp; Trust
    in Open Source Software Projects. <i>2022 IEEE Symposium on Security and Privacy
    (SP)</i>. <a href="https://doi.org/10.1109/sp46214.2022.9833686">https://doi.org/10.1109/sp46214.2022.9833686</a>'
  bibtex: '@inproceedings{Wermke_Wohler_Klemmer_Fourné_Acar_Fahl_2022, title={Committed
    to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software
    Projects}, DOI={<a href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>},
    booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Wermke, Dominik and Wohler, Noah and Klemmer, Jan H. and Fourné, Marcel
    and Acar, Yasemin and Fahl, Sascha}, year={2022} }'
  chicago: 'Wermke, Dominik, Noah Wohler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar,
    and Sascha Fahl. “Committed to Trust: A Qualitative Study on Security &#38;amp;
    Trust in Open Source Software Projects.” In <i>2022 IEEE Symposium on Security
    and Privacy (SP)</i>. IEEE, 2022. <a href="https://doi.org/10.1109/sp46214.2022.9833686">https://doi.org/10.1109/sp46214.2022.9833686</a>.'
  ieee: 'D. Wermke, N. Wohler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed
    to Trust: A Qualitative Study on Security &#38;amp; Trust in Open Source Software
    Projects,” 2022, doi: <a href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>.'
  mla: 'Wermke, Dominik, et al. “Committed to Trust: A Qualitative Study on Security
    &#38;amp; Trust in Open Source Software Projects.” <i>2022 IEEE Symposium on Security
    and Privacy (SP)</i>, IEEE, 2022, doi:<a href="https://doi.org/10.1109/sp46214.2022.9833686">10.1109/sp46214.2022.9833686</a>.'
  short: 'D. Wermke, N. Wohler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 2022
    IEEE Symposium on Security and Privacy (SP), IEEE, 2022.'
date_created: 2023-10-06T16:12:18Z
date_updated: 2024-06-05T12:55:32Z
department:
- _id: '858'
doi: 10.1109/sp46214.2022.9833686
extern: '1'
language:
- iso: eng
publication: 2022 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'Committed to Trust: A Qualitative Study on Security &amp; Trust in Open Source
  Software Projects'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47288'
author:
- first_name: Jan
  full_name: Jancar, Jan
  last_name: Jancar
- first_name: Marcel
  full_name: Fourné, Marcel
  last_name: Fourné
- first_name: Daniel De Almeida
  full_name: Braga, Daniel De Almeida
  last_name: Braga
- first_name: Mohamed
  full_name: Sabt, Mohamed
  last_name: Sabt
- first_name: Peter
  full_name: Schwabe, Peter
  last_name: Schwabe
- first_name: Gilles
  full_name: Barthe, Gilles
  last_name: Barthe
- first_name: Pierre-Alain
  full_name: Fouque, Pierre-Alain
  last_name: Fouque
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”:
    What Cryptographic Library Developers Think About Timing Attacks. In: <i>43rd
    IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26,
    2022</i>. IEEE; 2022:632–649. doi:<a href="https://doi.org/10.1109/SP46214.2022.9833713">10.1109/SP46214.2022.9833713</a>'
  apa: 'Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G.,
    Fouque, P.-A., &#38; Acar, Y. (2022). “They’re not that hard to mitigate”: What
    Cryptographic Library Developers Think About Timing Attacks. <i>43rd IEEE Symposium
    on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>,
    632–649. <a href="https://doi.org/10.1109/SP46214.2022.9833713">https://doi.org/10.1109/SP46214.2022.9833713</a>'
  bibtex: '@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022,
    title={“They’re not that hard to mitigate”: What Cryptographic Library Developers
    Think About Timing Attacks}, DOI={<a href="https://doi.org/10.1109/SP46214.2022.9833713">10.1109/SP46214.2022.9833713</a>},
    booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Jancar, Jan and Fourné, Marcel
    and Braga, Daniel De Almeida and Sabt, Mohamed and Schwabe, Peter and Barthe,
    Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, year={2022}, pages={632–649}
    }'
  chicago: 'Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter
    Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That
    Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.”
    In <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA,
    USA, May 22-26, 2022</i>, 632–649. IEEE, 2022. <a href="https://doi.org/10.1109/SP46214.2022.9833713">https://doi.org/10.1109/SP46214.2022.9833713</a>.'
  ieee: 'J. Jancar <i>et al.</i>, “‘They’re not that hard to mitigate’: What Cryptographic
    Library Developers Think About Timing Attacks,” in <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 2022, pp. 632–649,
    doi: <a href="https://doi.org/10.1109/SP46214.2022.9833713">10.1109/SP46214.2022.9833713</a>.'
  mla: 'Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic
    Library Developers Think About Timing Attacks.” <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022,
    pp. 632–649, doi:<a href="https://doi.org/10.1109/SP46214.2022.9833713">10.1109/SP46214.2022.9833713</a>.'
  short: 'J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A.
    Fouque, Y. Acar, in: 43rd IEEE Symposium on Security and Privacy, SP 2022, San
    Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 632–649.'
date_created: 2023-09-22T13:20:28Z
date_updated: 2024-06-05T13:20:54Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46214.2022.9833713
extern: '1'
language:
- iso: eng
page: 632–649
publication: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
  CA, USA, May 22-26, 2022
publisher: IEEE
status: public
title: '"They’re not that hard to mitigate": What Cryptographic Library Developers
  Think About Timing Attacks'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47285'
author:
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Noah
  full_name: Wöhler, Noah
  last_name: Wöhler
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Marcel
  full_name: Fourné, Marcel
  last_name: Fourné
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Wermke D, Wöhler N, Klemmer JH, Fourné M, Acar Y, Fahl S. Committed to Trust:
    A Qualitative Study on Security &#38; Trust in Open Source Software Projects.
    In: <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA,
    USA, May 22-26, 2022</i>. IEEE; 2022:1880–1896. doi:<a href="https://doi.org/10.1109/SP46214.2022.9833686">10.1109/SP46214.2022.9833686</a>'
  apa: 'Wermke, D., Wöhler, N., Klemmer, J. H., Fourné, M., Acar, Y., &#38; Fahl,
    S. (2022). Committed to Trust: A Qualitative Study on Security &#38; Trust in
    Open Source Software Projects. <i>43rd IEEE Symposium on Security and Privacy,
    SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 1880–1896. <a href="https://doi.org/10.1109/SP46214.2022.9833686">https://doi.org/10.1109/SP46214.2022.9833686</a>'
  bibtex: '@inproceedings{Wermke_Wöhler_Klemmer_Fourné_Acar_Fahl_2022, title={Committed
    to Trust: A Qualitative Study on Security &#38; Trust in Open Source Software
    Projects}, DOI={<a href="https://doi.org/10.1109/SP46214.2022.9833686">10.1109/SP46214.2022.9833686</a>},
    booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Wermke, Dominik and Wöhler,
    Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha},
    year={2022}, pages={1880–1896} }'
  chicago: 'Wermke, Dominik, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar,
    and Sascha Fahl. “Committed to Trust: A Qualitative Study on Security &#38; Trust
    in Open Source Software Projects.” In <i>43rd IEEE Symposium on Security and Privacy,
    SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, 1880–1896. IEEE, 2022. <a
    href="https://doi.org/10.1109/SP46214.2022.9833686">https://doi.org/10.1109/SP46214.2022.9833686</a>.'
  ieee: 'D. Wermke, N. Wöhler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed
    to Trust: A Qualitative Study on Security &#38; Trust in Open Source Software
    Projects,” in <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022</i>, 2022, pp. 1880–1896, doi: <a href="https://doi.org/10.1109/SP46214.2022.9833686">10.1109/SP46214.2022.9833686</a>.'
  mla: 'Wermke, Dominik, et al. “Committed to Trust: A Qualitative Study on Security
    &#38; Trust in Open Source Software Projects.” <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022,
    pp. 1880–1896, doi:<a href="https://doi.org/10.1109/SP46214.2022.9833686">10.1109/SP46214.2022.9833686</a>.'
  short: 'D. Wermke, N. Wöhler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 43rd
    IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26,
    2022, IEEE, 2022, pp. 1880–1896.'
date_created: 2023-09-22T13:18:27Z
date_updated: 2024-06-05T13:34:37Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46214.2022.9833686
extern: '1'
language:
- iso: eng
page: 1880–1896
publication: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
  CA, USA, May 22-26, 2022
publisher: IEEE
status: public
title: 'Committed to Trust: A Qualitative Study on Security & Trust in Open Source
  Software Projects'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47284'
author:
- first_name: Collins W.
  full_name: Munyendo, Collins W.
  last_name: Munyendo
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Adam J.
  full_name: Aviv, Adam J.
  last_name: Aviv
citation:
  ama: 'Munyendo CW, Acar Y, Aviv AJ. “Desperate Times Call for Desperate Measures”:
    User Concerns with Mobile Loan Apps in Kenya. In: <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>. IEEE; 2022:2304–2319.
    doi:<a href="https://doi.org/10.1109/SP46214.2022.9833779">10.1109/SP46214.2022.9833779</a>'
  apa: 'Munyendo, C. W., Acar, Y., &#38; Aviv, A. J. (2022). “Desperate Times Call
    for Desperate Measures”: User Concerns with Mobile Loan Apps in Kenya. <i>43rd
    IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26,
    2022</i>, 2304–2319. <a href="https://doi.org/10.1109/SP46214.2022.9833779">https://doi.org/10.1109/SP46214.2022.9833779</a>'
  bibtex: '@inproceedings{Munyendo_Acar_Aviv_2022, title={“Desperate Times Call for
    Desperate Measures”: User Concerns with Mobile Loan Apps in Kenya}, DOI={<a href="https://doi.org/10.1109/SP46214.2022.9833779">10.1109/SP46214.2022.9833779</a>},
    booktitle={43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
    CA, USA, May 22-26, 2022}, publisher={IEEE}, author={Munyendo, Collins W. and
    Acar, Yasemin and Aviv, Adam J.}, year={2022}, pages={2304–2319} }'
  chicago: 'Munyendo, Collins W., Yasemin Acar, and Adam J. Aviv. “‘Desperate Times
    Call for Desperate Measures’: User Concerns with Mobile Loan Apps in Kenya.” In
    <i>43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA,
    May 22-26, 2022</i>, 2304–2319. IEEE, 2022. <a href="https://doi.org/10.1109/SP46214.2022.9833779">https://doi.org/10.1109/SP46214.2022.9833779</a>.'
  ieee: 'C. W. Munyendo, Y. Acar, and A. J. Aviv, “‘Desperate Times Call for Desperate
    Measures’: User Concerns with Mobile Loan Apps in Kenya,” in <i>43rd IEEE Symposium
    on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>,
    2022, pp. 2304–2319, doi: <a href="https://doi.org/10.1109/SP46214.2022.9833779">10.1109/SP46214.2022.9833779</a>.'
  mla: 'Munyendo, Collins W., et al. “‘Desperate Times Call for Desperate Measures’:
    User Concerns with Mobile Loan Apps in Kenya.” <i>43rd IEEE Symposium on Security
    and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022</i>, IEEE, 2022,
    pp. 2304–2319, doi:<a href="https://doi.org/10.1109/SP46214.2022.9833779">10.1109/SP46214.2022.9833779</a>.'
  short: 'C.W. Munyendo, Y. Acar, A.J. Aviv, in: 43rd IEEE Symposium on Security and
    Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, IEEE, 2022, pp. 2304–2319.'
date_created: 2023-09-22T13:18:01Z
date_updated: 2024-06-05T13:34:58Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP46214.2022.9833779
extern: '1'
language:
- iso: eng
page: 2304–2319
publication: 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco,
  CA, USA, May 22-26, 2022
publisher: IEEE
status: public
title: '"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan
  Apps in Kenya'
type: conference
user_id: '14931'
year: '2022'
...
---
_id: '47281'
author:
- first_name: Alexander
  full_name: Krause, Alexander
  last_name: Krause
- first_name: Jan H.
  full_name: Klemmer, Jan H.
  last_name: Klemmer
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Krause A, Klemmer JH, Huaman N, Wermke D, Acar Y, Fahl S. Committed by Accident:
    Studying Prevention and Remediation Strategies Against Secret Leakage in Source
    Code Repositories. <i>CoRR</i>. 2022;abs/2211.06213. doi:<a href="https://doi.org/10.48550/arXiv.2211.06213">10.48550/arXiv.2211.06213</a>'
  apa: 'Krause, A., Klemmer, J. H., Huaman, N., Wermke, D., Acar, Y., &#38; Fahl,
    S. (2022). Committed by Accident: Studying Prevention and Remediation Strategies
    Against Secret Leakage in Source Code Repositories. <i>CoRR</i>, <i>abs/2211.06213</i>.
    <a href="https://doi.org/10.48550/arXiv.2211.06213">https://doi.org/10.48550/arXiv.2211.06213</a>'
  bibtex: '@article{Krause_Klemmer_Huaman_Wermke_Acar_Fahl_2022, title={Committed
    by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage
    in Source Code Repositories}, volume={abs/2211.06213}, DOI={<a href="https://doi.org/10.48550/arXiv.2211.06213">10.48550/arXiv.2211.06213</a>},
    journal={CoRR}, author={Krause, Alexander and Klemmer, Jan H. and Huaman, Nicolas
    and Wermke, Dominik and Acar, Yasemin and Fahl, Sascha}, year={2022} }'
  chicago: 'Krause, Alexander, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin
    Acar, and Sascha Fahl. “Committed by Accident: Studying Prevention and Remediation
    Strategies Against Secret Leakage in Source Code Repositories.” <i>CoRR</i> abs/2211.06213
    (2022). <a href="https://doi.org/10.48550/arXiv.2211.06213">https://doi.org/10.48550/arXiv.2211.06213</a>.'
  ieee: 'A. Krause, J. H. Klemmer, N. Huaman, D. Wermke, Y. Acar, and S. Fahl, “Committed
    by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage
    in Source Code Repositories,” <i>CoRR</i>, vol. abs/2211.06213, 2022, doi: <a
    href="https://doi.org/10.48550/arXiv.2211.06213">10.48550/arXiv.2211.06213</a>.'
  mla: 'Krause, Alexander, et al. “Committed by Accident: Studying Prevention and
    Remediation Strategies Against Secret Leakage in Source Code Repositories.” <i>CoRR</i>,
    vol. abs/2211.06213, 2022, doi:<a href="https://doi.org/10.48550/arXiv.2211.06213">10.48550/arXiv.2211.06213</a>.'
  short: A. Krause, J.H. Klemmer, N. Huaman, D. Wermke, Y. Acar, S. Fahl, CoRR abs/2211.06213
    (2022).
date_created: 2023-09-22T13:16:33Z
date_updated: 2024-06-05T13:36:09Z
department:
- _id: '34'
- _id: '858'
doi: 10.48550/arXiv.2211.06213
extern: '1'
language:
- iso: eng
publication: CoRR
status: public
title: 'Committed by Accident: Studying Prevention and Remediation Strategies Against
  Secret Leakage in Source Code Repositories'
type: journal_article
user_id: '14931'
volume: abs/2211.06213
year: '2022'
...
---
_id: '47265'
author:
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Bennet
  full_name: von Skarczinski, Bennet
  last_name: von Skarczinski
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Arne
  full_name: Dreißigacker, Arne
  last_name: Dreißigacker
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Huaman N, von Skarczinski B, Stransky C, et al. A Large-Scale Interview Study
    on Information Security in and Attacks against Small and Medium-sized Enterprises.
    In: Bailey M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security
    2021, August 11-13, 2021</i>. USENIX Association; 2021:1235–1252.'
  apa: Huaman, N., von Skarczinski, B., Stransky, C., Wermke, D., Acar, Y., Dreißigacker,
    A., &#38; Fahl, S. (2021). A Large-Scale Interview Study on Information Security
    in and Attacks against Small and Medium-sized Enterprises. In M. Bailey &#38;
    R. Greenstadt (Eds.), <i>30th USENIX Security Symposium, USENIX Security 2021,
    August 11-13, 2021</i> (pp. 1235–1252). USENIX Association.
  bibtex: '@inproceedings{Huaman_von Skarczinski_Stransky_Wermke_Acar_Dreißigacker_Fahl_2021,
    title={A Large-Scale Interview Study on Information Security in and Attacks against
    Small and Medium-sized Enterprises}, booktitle={30th USENIX Security Symposium,
    USENIX Security 2021, August 11-13, 2021}, publisher={USENIX Association}, author={Huaman,
    Nicolas and von Skarczinski, Bennet and Stransky, Christian and Wermke, Dominik
    and Acar, Yasemin and Dreißigacker, Arne and Fahl, Sascha}, editor={Bailey, Michael
    and Greenstadt, Rachel}, year={2021}, pages={1235–1252} }'
  chicago: Huaman, Nicolas, Bennet von Skarczinski, Christian Stransky, Dominik Wermke,
    Yasemin Acar, Arne Dreißigacker, and Sascha Fahl. “A Large-Scale Interview Study
    on Information Security in and Attacks against Small and Medium-Sized Enterprises.”
    In <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>,
    edited by Michael Bailey and Rachel Greenstadt, 1235–1252. USENIX Association,
    2021.
  ieee: N. Huaman <i>et al.</i>, “A Large-Scale Interview Study on Information Security
    in and Attacks against Small and Medium-sized Enterprises,” in <i>30th USENIX
    Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, 2021, pp. 1235–1252.
  mla: Huaman, Nicolas, et al. “A Large-Scale Interview Study on Information Security
    in and Attacks against Small and Medium-Sized Enterprises.” <i>30th USENIX Security
    Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey
    and Rachel Greenstadt, USENIX Association, 2021, pp. 1235–1252.
  short: 'N. Huaman, B. von Skarczinski, C. Stransky, D. Wermke, Y. Acar, A. Dreißigacker,
    S. Fahl, in: M. Bailey, R. Greenstadt (Eds.), 30th USENIX Security Symposium,
    USENIX Security 2021, August 11-13, 2021, USENIX Association, 2021, pp. 1235–1252.'
date_created: 2023-09-22T13:02:54Z
date_updated: 2024-06-05T12:57:43Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Michael
  full_name: Bailey, Michael
  last_name: Bailey
- first_name: Rachel
  full_name: Greenstadt, Rachel
  last_name: Greenstadt
extern: '1'
language:
- iso: eng
page: 1235–1252
publication: 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021
publisher: USENIX Association
status: public
title: A Large-Scale Interview Study on Information Security in and Attacks against
  Small and Medium-sized Enterprises
type: conference
user_id: '14931'
year: '2021'
...
---
_id: '47268'
author:
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Johanna
  full_name: Schrader, Johanna
  last_name: Schrader
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Anna Lena
  full_name: Fehlhaber, Anna Lena
  last_name: Fehlhaber
- first_name: Miranda
  full_name: Wei, Miranda
  last_name: Wei
- first_name: Blase
  full_name: Ur, Blase
  last_name: Ur
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Stransky C, Wermke D, Schrader J, et al. On the Limited Impact of Visualizing
    Encryption: Perceptions of E2E Messaging Security. In: Chiasson S, ed. <i>Seventeenth
    Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>. USENIX
    Association; 2021:437–454.'
  apa: 'Stransky, C., Wermke, D., Schrader, J., Huaman, N., Acar, Y., Fehlhaber, A.
    L., Wei, M., Ur, B., &#38; Fahl, S. (2021). On the Limited Impact of Visualizing
    Encryption: Perceptions of E2E Messaging Security. In S. Chiasson (Ed.), <i>Seventeenth
    Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i> (pp.
    437–454). USENIX Association.'
  bibtex: '@inproceedings{Stransky_Wermke_Schrader_Huaman_Acar_Fehlhaber_Wei_Ur_Fahl_2021,
    title={On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging
    Security}, booktitle={Seventeenth Symposium on Usable Privacy and Security, SOUPS
    2021, August 8-10, 2021}, publisher={USENIX Association}, author={Stransky, Christian
    and Wermke, Dominik and Schrader, Johanna and Huaman, Nicolas and Acar, Yasemin
    and Fehlhaber, Anna Lena and Wei, Miranda and Ur, Blase and Fahl, Sascha}, editor={Chiasson,
    Sonia}, year={2021}, pages={437–454} }'
  chicago: 'Stransky, Christian, Dominik Wermke, Johanna Schrader, Nicolas Huaman,
    Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, and Sascha Fahl. “On
    the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.”
    In <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August
    8-10, 2021</i>, edited by Sonia Chiasson, 437–454. USENIX Association, 2021.'
  ieee: 'C. Stransky <i>et al.</i>, “On the Limited Impact of Visualizing Encryption:
    Perceptions of E2E Messaging Security,” in <i>Seventeenth Symposium on Usable
    Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, 2021, pp. 437–454.'
  mla: 'Stransky, Christian, et al. “On the Limited Impact of Visualizing Encryption:
    Perceptions of E2E Messaging Security.” <i>Seventeenth Symposium on Usable Privacy
    and Security, SOUPS 2021, August 8-10, 2021</i>, edited by Sonia Chiasson, USENIX
    Association, 2021, pp. 437–454.'
  short: 'C. Stransky, D. Wermke, J. Schrader, N. Huaman, Y. Acar, A.L. Fehlhaber,
    M. Wei, B. Ur, S. Fahl, in: S. Chiasson (Ed.), Seventeenth Symposium on Usable
    Privacy and Security, SOUPS 2021, August 8-10, 2021, USENIX Association, 2021,
    pp. 437–454.'
date_created: 2023-09-22T13:04:56Z
date_updated: 2024-06-05T13:02:20Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Sonia
  full_name: Chiasson, Sonia
  last_name: Chiasson
extern: '1'
language:
- iso: eng
page: 437–454
publication: Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August
  8-10, 2021
publisher: USENIX Association
status: public
title: 'On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging
  Security'
type: conference
user_id: '14931'
year: '2021'
...
---
_id: '47267'
author:
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Sabrina
  full_name: Amft, Sabrina
  last_name: Amft
- first_name: Marten
  full_name: Oltrogge, Marten
  last_name: Oltrogge
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Huaman N, Amft S, Oltrogge M, Acar Y, Fahl S. They Would do Better if They
    Worked Together: The Case of Interaction Problems Between Password Managers and
    Websites. In: <i>2021 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2021.
    doi:<a href="https://doi.org/10.1109/sp40001.2021.00094">10.1109/sp40001.2021.00094</a>'
  apa: 'Huaman, N., Amft, S., Oltrogge, M., Acar, Y., &#38; Fahl, S. (2021). They
    Would do Better if They Worked Together: The Case of Interaction Problems Between
    Password Managers and Websites. <i>2021 IEEE Symposium on Security and Privacy
    (SP)</i>. <a href="https://doi.org/10.1109/sp40001.2021.00094">https://doi.org/10.1109/sp40001.2021.00094</a>'
  bibtex: '@inproceedings{Huaman_Amft_Oltrogge_Acar_Fahl_2021, title={They Would do
    Better if They Worked Together: The Case of Interaction Problems Between Password
    Managers and Websites}, DOI={<a href="https://doi.org/10.1109/sp40001.2021.00094">10.1109/sp40001.2021.00094</a>},
    booktitle={2021 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Huaman, Nicolas and Amft, Sabrina and Oltrogge, Marten and Acar, Yasemin
    and Fahl, Sascha}, year={2021} }'
  chicago: 'Huaman, Nicolas, Sabrina Amft, Marten Oltrogge, Yasemin Acar, and Sascha
    Fahl. “They Would Do Better If They Worked Together: The Case of Interaction Problems
    Between Password Managers and Websites.” In <i>2021 IEEE Symposium on Security
    and Privacy (SP)</i>. IEEE, 2021. <a href="https://doi.org/10.1109/sp40001.2021.00094">https://doi.org/10.1109/sp40001.2021.00094</a>.'
  ieee: 'N. Huaman, S. Amft, M. Oltrogge, Y. Acar, and S. Fahl, “They Would do Better
    if They Worked Together: The Case of Interaction Problems Between Password Managers
    and Websites,” 2021, doi: <a href="https://doi.org/10.1109/sp40001.2021.00094">10.1109/sp40001.2021.00094</a>.'
  mla: 'Huaman, Nicolas, et al. “They Would Do Better If They Worked Together: The
    Case of Interaction Problems Between Password Managers and Websites.” <i>2021
    IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2021, doi:<a href="https://doi.org/10.1109/sp40001.2021.00094">10.1109/sp40001.2021.00094</a>.'
  short: 'N. Huaman, S. Amft, M. Oltrogge, Y. Acar, S. Fahl, in: 2021 IEEE Symposium
    on Security and Privacy (SP), IEEE, 2021.'
date_created: 2023-09-22T13:04:10Z
date_updated: 2024-06-05T13:02:40Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/sp40001.2021.00094
extern: '1'
language:
- iso: eng
publication: 2021 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'They Would do Better if They Worked Together: The Case of Interaction Problems
  Between Password Managers and Websites'
type: conference
user_id: '14931'
year: '2021'
...
---
_id: '47266'
author:
- first_name: Julie M.
  full_name: Haney, Julie M.
  last_name: Haney
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Susanne
  full_name: Furman, Susanne
  last_name: Furman
citation:
  ama: 'Haney JM, Acar Y, Furman S. “It’s the Company, the Government, You and I”:
    User Perceptions of Responsibility for Smart Home Privacy and Security. In: Bailey
    M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security 2021,
    August 11-13, 2021</i>. USENIX Association; 2021:411–428.'
  apa: 'Haney, J. M., Acar, Y., &#38; Furman, S. (2021). “It’s the Company, the Government,
    You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security.
    In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th USENIX Security Symposium, USENIX
    Security 2021, August 11-13, 2021</i> (pp. 411–428). USENIX Association.'
  bibtex: '@inproceedings{Haney_Acar_Furman_2021, title={“It’s the Company, the Government,
    You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security},
    booktitle={30th USENIX Security Symposium, USENIX Security 2021, August 11-13,
    2021}, publisher={USENIX Association}, author={Haney, Julie M. and Acar, Yasemin
    and Furman, Susanne}, editor={Bailey, Michael and Greenstadt, Rachel}, year={2021},
    pages={411–428} }'
  chicago: 'Haney, Julie M., Yasemin Acar, and Susanne Furman. “‘It’s the Company,
    the Government, You and I’: User Perceptions of Responsibility for Smart Home
    Privacy and Security.” In <i>30th USENIX Security Symposium, USENIX Security 2021,
    August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, 411–428.
    USENIX Association, 2021.'
  ieee: 'J. M. Haney, Y. Acar, and S. Furman, “‘It’s the Company, the Government,
    You and I’: User Perceptions of Responsibility for Smart Home Privacy and Security,”
    in <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>,
    2021, pp. 411–428.'
  mla: 'Haney, Julie M., et al. “‘It’s the Company, the Government, You and I’: User
    Perceptions of Responsibility for Smart Home Privacy and Security.” <i>30th USENIX
    Security Symposium, USENIX Security 2021, August 11-13, 2021</i>, edited by Michael
    Bailey and Rachel Greenstadt, USENIX Association, 2021, pp. 411–428.'
  short: 'J.M. Haney, Y. Acar, S. Furman, in: M. Bailey, R. Greenstadt (Eds.), 30th
    USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, USENIX Association,
    2021, pp. 411–428.'
date_created: 2023-09-22T13:03:50Z
date_updated: 2024-06-05T13:03:16Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Michael
  full_name: Bailey, Michael
  last_name: Bailey
- first_name: Rachel
  full_name: Greenstadt, Rachel
  last_name: Greenstadt
extern: '1'
language:
- iso: eng
page: 411–428
publication: 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021
publisher: USENIX Association
status: public
title: '"It’s the Company, the Government, You and I": User Perceptions of Responsibility
  for Smart Home Privacy and Security'
type: conference
user_id: '14931'
year: '2021'
...
---
_id: '47264'
author:
- first_name: Marten
  full_name: Oltrogge, Marten
  last_name: Oltrogge
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Sabrina
  full_name: Amft, Sabrina
  last_name: Amft
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Oltrogge M, Huaman N, Amft S, Acar Y, Backes M, Fahl S. Why Eve and Mallory
    Still Love Android: Revisiting TLS (In)Security in Android Applications. In: Bailey
    M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security 2021,
    August 11-13, 2021</i>. USENIX Association; 2021:4347–4364.'
  apa: 'Oltrogge, M., Huaman, N., Amft, S., Acar, Y., Backes, M., &#38; Fahl, S. (2021).
    Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android
    Applications. In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th USENIX Security
    Symposium, USENIX Security 2021, August 11-13, 2021</i> (pp. 4347–4364). USENIX
    Association.'
  bibtex: '@inproceedings{Oltrogge_Huaman_Amft_Acar_Backes_Fahl_2021, title={Why Eve
    and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications},
    booktitle={30th USENIX Security Symposium, USENIX Security 2021, August 11-13,
    2021}, publisher={USENIX Association}, author={Oltrogge, Marten and Huaman, Nicolas
    and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha}, editor={Bailey,
    Michael and Greenstadt, Rachel}, year={2021}, pages={4347–4364} }'
  chicago: 'Oltrogge, Marten, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael
    Backes, and Sascha Fahl. “Why Eve and Mallory Still Love Android: Revisiting TLS
    (In)Security in Android Applications.” In <i>30th USENIX Security Symposium, USENIX
    Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt,
    4347–4364. USENIX Association, 2021.'
  ieee: 'M. Oltrogge, N. Huaman, S. Amft, Y. Acar, M. Backes, and S. Fahl, “Why Eve
    and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications,”
    in <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>,
    2021, pp. 4347–4364.'
  mla: 'Oltrogge, Marten, et al. “Why Eve and Mallory Still Love Android: Revisiting
    TLS (In)Security in Android Applications.” <i>30th USENIX Security Symposium,
    USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel
    Greenstadt, USENIX Association, 2021, pp. 4347–4364.'
  short: 'M. Oltrogge, N. Huaman, S. Amft, Y. Acar, M. Backes, S. Fahl, in: M. Bailey,
    R. Greenstadt (Eds.), 30th USENIX Security Symposium, USENIX Security 2021, August
    11-13, 2021, USENIX Association, 2021, pp. 4347–4364.'
date_created: 2023-09-22T13:02:22Z
date_updated: 2024-06-05T13:01:22Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Michael
  full_name: Bailey, Michael
  last_name: Bailey
- first_name: Rachel
  full_name: Greenstadt, Rachel
  last_name: Greenstadt
extern: '1'
language:
- iso: eng
page: 4347–4364
publication: 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021
publisher: USENIX Association
status: public
title: 'Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android
  Applications'
type: conference
user_id: '14931'
year: '2021'
...
---
_id: '47269'
author:
- first_name: Lorenzo
  full_name: Neil, Lorenzo
  last_name: Neil
- first_name: Elijah
  full_name: Bouma-Sims, Elijah
  last_name: Bouma-Sims
- first_name: Evan
  full_name: Lafontaine, Evan
  last_name: Lafontaine
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Bradley
  full_name: Reaves, Bradley
  last_name: Reaves
citation:
  ama: 'Neil L, Bouma-Sims E, Lafontaine E, Acar Y, Reaves B. Investigating Web Service
    Account Remediation Advice. In: Chiasson S, ed. <i>Seventeenth Symposium on Usable
    Privacy and Security, SOUPS 2021, August 8-10, 2021</i>. USENIX Association; 2021:359–376.'
  apa: Neil, L., Bouma-Sims, E., Lafontaine, E., Acar, Y., &#38; Reaves, B. (2021).
    Investigating Web Service Account Remediation Advice. In S. Chiasson (Ed.), <i>Seventeenth
    Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i> (pp.
    359–376). USENIX Association.
  bibtex: '@inproceedings{Neil_Bouma-Sims_Lafontaine_Acar_Reaves_2021, title={Investigating
    Web Service Account Remediation Advice}, booktitle={Seventeenth Symposium on Usable
    Privacy and Security, SOUPS 2021, August 8-10, 2021}, publisher={USENIX Association},
    author={Neil, Lorenzo and Bouma-Sims, Elijah and Lafontaine, Evan and Acar, Yasemin
    and Reaves, Bradley}, editor={Chiasson, Sonia}, year={2021}, pages={359–376} }'
  chicago: Neil, Lorenzo, Elijah Bouma-Sims, Evan Lafontaine, Yasemin Acar, and Bradley
    Reaves. “Investigating Web Service Account Remediation Advice.” In <i>Seventeenth
    Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited
    by Sonia Chiasson, 359–376. USENIX Association, 2021.
  ieee: L. Neil, E. Bouma-Sims, E. Lafontaine, Y. Acar, and B. Reaves, “Investigating
    Web Service Account Remediation Advice,” in <i>Seventeenth Symposium on Usable
    Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, 2021, pp. 359–376.
  mla: Neil, Lorenzo, et al. “Investigating Web Service Account Remediation Advice.”
    <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10,
    2021</i>, edited by Sonia Chiasson, USENIX Association, 2021, pp. 359–376.
  short: 'L. Neil, E. Bouma-Sims, E. Lafontaine, Y. Acar, B. Reaves, in: S. Chiasson
    (Ed.), Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August
    8-10, 2021, USENIX Association, 2021, pp. 359–376.'
date_created: 2023-09-22T13:05:16Z
date_updated: 2024-06-05T13:03:38Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Sonia
  full_name: Chiasson, Sonia
  last_name: Chiasson
extern: '1'
language:
- iso: eng
page: 359–376
publication: Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August
  8-10, 2021
publisher: USENIX Association
status: public
title: Investigating Web Service Account Remediation Advice
type: conference
user_id: '14931'
year: '2021'
...
---
_id: '47271'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: Acar Y. <i>Human Factors in Secure Software Development</i>. University of
    Marburg, Germany; 2021.
  apa: Acar, Y. (2021). <i>Human Factors in Secure Software Development</i>. University
    of Marburg, Germany.
  bibtex: '@book{Acar_2021, title={Human Factors in Secure Software Development},
    publisher={University of Marburg, Germany}, author={Acar, Yasemin}, year={2021}
    }'
  chicago: Acar, Yasemin. <i>Human Factors in Secure Software Development</i>. University
    of Marburg, Germany, 2021.
  ieee: Y. Acar, <i>Human Factors in Secure Software Development</i>. University of
    Marburg, Germany, 2021.
  mla: Acar, Yasemin. <i>Human Factors in Secure Software Development</i>. University
    of Marburg, Germany, 2021.
  short: Y. Acar, Human Factors in Secure Software Development, University of Marburg,
    Germany, 2021.
date_created: 2023-09-22T13:06:40Z
date_updated: 2024-06-05T12:56:39Z
department:
- _id: '34'
- _id: '858'
extern: '1'
language:
- iso: eng
publisher: University of Marburg, Germany
status: public
title: Human Factors in Secure Software Development
type: dissertation
user_id: '14931'
year: '2021'
...
---
_id: '47261'
author:
- first_name: Julie M.
  full_name: Haney, Julie M.
  last_name: Haney
- first_name: Susanne M.
  full_name: Furman, Susanne M.
  last_name: Furman
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Haney JM, Furman SM, Acar Y. Smart Home Security and Privacy Mitigations:
    Consumer Perceptions, Practices, and Challenges. In: <i>HCI for Cybersecurity,
    Privacy and Trust</i>. Springer International Publishing; 2020. doi:<a href="https://doi.org/10.1007/978-3-030-50309-3_26">10.1007/978-3-030-50309-3_26</a>'
  apa: 'Haney, J. M., Furman, S. M., &#38; Acar, Y. (2020). Smart Home Security and
    Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In <i>HCI
    for Cybersecurity, Privacy and Trust</i>. Springer International Publishing. <a
    href="https://doi.org/10.1007/978-3-030-50309-3_26">https://doi.org/10.1007/978-3-030-50309-3_26</a>'
  bibtex: '@inbook{Haney_Furman_Acar_2020, place={Cham}, title={Smart Home Security
    and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}, DOI={<a
    href="https://doi.org/10.1007/978-3-030-50309-3_26">10.1007/978-3-030-50309-3_26</a>},
    booktitle={HCI for Cybersecurity, Privacy and Trust}, publisher={Springer International
    Publishing}, author={Haney, Julie M. and Furman, Susanne M. and Acar, Yasemin},
    year={2020} }'
  chicago: 'Haney, Julie M., Susanne M. Furman, and Yasemin Acar. “Smart Home Security
    and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” In
    <i>HCI for Cybersecurity, Privacy and Trust</i>. Cham: Springer International
    Publishing, 2020. <a href="https://doi.org/10.1007/978-3-030-50309-3_26">https://doi.org/10.1007/978-3-030-50309-3_26</a>.'
  ieee: 'J. M. Haney, S. M. Furman, and Y. Acar, “Smart Home Security and Privacy
    Mitigations: Consumer Perceptions, Practices, and Challenges,” in <i>HCI for Cybersecurity,
    Privacy and Trust</i>, Cham: Springer International Publishing, 2020.'
  mla: 'Haney, Julie M., et al. “Smart Home Security and Privacy Mitigations: Consumer
    Perceptions, Practices, and Challenges.” <i>HCI for Cybersecurity, Privacy and
    Trust</i>, Springer International Publishing, 2020, doi:<a href="https://doi.org/10.1007/978-3-030-50309-3_26">10.1007/978-3-030-50309-3_26</a>.'
  short: 'J.M. Haney, S.M. Furman, Y. Acar, in: HCI for Cybersecurity, Privacy and
    Trust, Springer International Publishing, Cham, 2020.'
date_created: 2023-09-22T12:59:53Z
date_updated: 2024-06-05T13:04:23Z
department:
- _id: '34'
- _id: '858'
doi: 10.1007/978-3-030-50309-3_26
extern: '1'
language:
- iso: eng
place: Cham
publication: HCI for Cybersecurity, Privacy and Trust
publication_identifier:
  isbn:
  - '9783030503086'
  - '9783030503093'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: 'Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices,
  and Challenges'
type: book_chapter
user_id: '14931'
year: '2020'
...
---
_id: '47260'
author:
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Niklas
  full_name: Busch, Niklas
  last_name: Busch
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Wermke D, Huaman N, Stransky C, Busch N, Acar Y, Fahl S. Cloudy with a Chance
    of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and
    Privacy in Cloud Office Suites. In: Lipford HR, Chiasson S, eds. <i>Sixteenth
    Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>. USENIX
    Association; 2020:359–377.'
  apa: 'Wermke, D., Huaman, N., Stransky, C., Busch, N., Acar, Y., &#38; Fahl, S.
    (2020). Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and
    Expectations of Security and Privacy in Cloud Office Suites. In H. R. Lipford
    &#38; S. Chiasson (Eds.), <i>Sixteenth Symposium on Usable Privacy and Security,
    SOUPS 2020, August 7-11, 2020</i> (pp. 359–377). USENIX Association.'
  bibtex: '@inproceedings{Wermke_Huaman_Stransky_Busch_Acar_Fahl_2020, title={Cloudy
    with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations
    of Security and Privacy in Cloud Office Suites}, booktitle={Sixteenth Symposium
    on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020}, publisher={USENIX
    Association}, author={Wermke, Dominik and Huaman, Nicolas and Stransky, Christian
    and Busch, Niklas and Acar, Yasemin and Fahl, Sascha}, editor={Lipford, Heather
    Richter and Chiasson, Sonia}, year={2020}, pages={359–377} }'
  chicago: 'Wermke, Dominik, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin
    Acar, and Sascha Fahl. “Cloudy with a Chance of Misconceptions: Exploring Users’
    Perceptions and Expectations of Security and Privacy in Cloud Office Suites.”
    In <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11,
    2020</i>, edited by Heather Richter Lipford and Sonia Chiasson, 359–377. USENIX
    Association, 2020.'
  ieee: 'D. Wermke, N. Huaman, C. Stransky, N. Busch, Y. Acar, and S. Fahl, “Cloudy
    with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations
    of Security and Privacy in Cloud Office Suites,” in <i>Sixteenth Symposium on
    Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>, 2020, pp. 359–377.'
  mla: 'Wermke, Dominik, et al. “Cloudy with a Chance of Misconceptions: Exploring
    Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites.”
    <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11,
    2020</i>, edited by Heather Richter Lipford and Sonia Chiasson, USENIX Association,
    2020, pp. 359–377.'
  short: 'D. Wermke, N. Huaman, C. Stransky, N. Busch, Y. Acar, S. Fahl, in: H.R.
    Lipford, S. Chiasson (Eds.), Sixteenth Symposium on Usable Privacy and Security,
    SOUPS 2020, August 7-11, 2020, USENIX Association, 2020, pp. 359–377.'
date_created: 2023-09-22T12:59:31Z
date_updated: 2024-06-05T13:04:48Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Heather Richter
  full_name: Lipford, Heather Richter
  last_name: Lipford
- first_name: Sonia
  full_name: Chiasson, Sonia
  last_name: Chiasson
extern: '1'
language:
- iso: eng
page: 359–377
publication: Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August
  7-11, 2020
publisher: USENIX Association
status: public
title: 'Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations
  of Security and Privacy in Cloud Office Suites'
type: conference
user_id: '14931'
year: '2020'
...
---
_id: '47262'
author:
- first_name: Peter Leo
  full_name: Gorski, Peter Leo
  last_name: Gorski
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Luigi
  full_name: Lo Iacono, Luigi
  last_name: Lo Iacono
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Gorski PL, Acar Y, Lo Iacono L, Fahl S. Listen to Developers! A Participatory
    Design Study on Security Warnings for Cryptographic APIs. In: <i>Proceedings of
    the 2020 CHI Conference on Human Factors in Computing Systems</i>. ACM; 2020.
    doi:<a href="https://doi.org/10.1145/3313831.3376142">10.1145/3313831.3376142</a>'
  apa: Gorski, P. L., Acar, Y., Lo Iacono, L., &#38; Fahl, S. (2020). Listen to Developers!
    A Participatory Design Study on Security Warnings for Cryptographic APIs. <i>Proceedings
    of the 2020 CHI Conference on Human Factors in Computing Systems</i>. <a href="https://doi.org/10.1145/3313831.3376142">https://doi.org/10.1145/3313831.3376142</a>
  bibtex: '@inproceedings{Gorski_Acar_Lo Iacono_Fahl_2020, title={Listen to Developers!
    A Participatory Design Study on Security Warnings for Cryptographic APIs}, DOI={<a
    href="https://doi.org/10.1145/3313831.3376142">10.1145/3313831.3376142</a>}, booktitle={Proceedings
    of the 2020 CHI Conference on Human Factors in Computing Systems}, publisher={ACM},
    author={Gorski, Peter Leo and Acar, Yasemin and Lo Iacono, Luigi and Fahl, Sascha},
    year={2020} }'
  chicago: Gorski, Peter Leo, Yasemin Acar, Luigi Lo Iacono, and Sascha Fahl. “Listen
    to Developers! A Participatory Design Study on Security Warnings for Cryptographic
    APIs.” In <i>Proceedings of the 2020 CHI Conference on Human Factors in Computing
    Systems</i>. ACM, 2020. <a href="https://doi.org/10.1145/3313831.3376142">https://doi.org/10.1145/3313831.3376142</a>.
  ieee: 'P. L. Gorski, Y. Acar, L. Lo Iacono, and S. Fahl, “Listen to Developers!
    A Participatory Design Study on Security Warnings for Cryptographic APIs,” 2020,
    doi: <a href="https://doi.org/10.1145/3313831.3376142">10.1145/3313831.3376142</a>.'
  mla: Gorski, Peter Leo, et al. “Listen to Developers! A Participatory Design Study
    on Security Warnings for Cryptographic APIs.” <i>Proceedings of the 2020 CHI Conference
    on Human Factors in Computing Systems</i>, ACM, 2020, doi:<a href="https://doi.org/10.1145/3313831.3376142">10.1145/3313831.3376142</a>.
  short: 'P.L. Gorski, Y. Acar, L. Lo Iacono, S. Fahl, in: Proceedings of the 2020
    CHI Conference on Human Factors in Computing Systems, ACM, 2020.'
date_created: 2023-09-22T13:00:15Z
date_updated: 2024-06-05T13:05:10Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3313831.3376142
extern: '1'
language:
- iso: eng
publication: Proceedings of the 2020 CHI Conference on Human Factors in Computing
  Systems
publication_status: published
publisher: ACM
status: public
title: Listen to Developers! A Participatory Design Study on Security Warnings for
  Cryptographic APIs
type: conference
user_id: '14931'
year: '2020'
...
