---
_id: '47879'
author:
- first_name: Julie
  full_name: Haney, Julie
  last_name: Haney
- first_name: Susanne
  full_name: Furman, Susanne
  last_name: Furman
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Haney J, Furman S, Acar Y. Smart Home Security and Privacy Mitigations: Consumer
    Perceptions, Practices, and Challenges. In: International Conference on Human-Computer
    Interaction, Copenhagen, -1; 2020.'
  apa: 'Haney, J., Furman, S., &#38; Acar, Y. (2020). <i>Smart Home Security and Privacy
    Mitigations: Consumer Perceptions, Practices, and Challenges</i>.'
  bibtex: '@inproceedings{Haney_Furman_Acar_2020, title={Smart Home Security and Privacy
    Mitigations: Consumer Perceptions, Practices, and Challenges}, publisher={International
    Conference on Human-Computer Interaction, Copenhagen, -1}, author={Haney, Julie
    and Furman, Susanne and Acar, Yasemin}, year={2020} }'
  chicago: 'Haney, Julie, Susanne Furman, and Yasemin Acar. “Smart Home Security and
    Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” International
    Conference on Human-Computer Interaction, Copenhagen, -1, 2020.'
  ieee: 'J. Haney, S. Furman, and Y. Acar, “Smart Home Security and Privacy Mitigations:
    Consumer Perceptions, Practices, and Challenges,” 2020.'
  mla: 'Haney, Julie, et al. <i>Smart Home Security and Privacy Mitigations: Consumer
    Perceptions, Practices, and Challenges</i>. International Conference on Human-Computer
    Interaction, Copenhagen, -1, 2020.'
  short: 'J. Haney, S. Furman, Y. Acar, in: International Conference on Human-Computer
    Interaction, Copenhagen, -1, 2020.'
date_created: 2023-10-09T13:20:44Z
date_updated: 2024-06-05T13:04:04Z
department:
- _id: '34'
- _id: '858'
extern: '1'
language:
- iso: eng
publisher: International Conference on Human-Computer Interaction, Copenhagen, -1
status: public
title: 'Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices,
  and Challenges'
type: conference
user_id: '14931'
year: '2020'
...
---
_id: '47253'
alternative_title:
- How Browsers' Explanations Impact Misconceptions About Private Browsing Mode
author:
- first_name: Yuxi
  full_name: Wu, Yuxi
  last_name: Wu
- first_name: Panya
  full_name: Gupta, Panya
  last_name: Gupta
- first_name: Miranda
  full_name: Wei, Miranda
  last_name: Wei
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Blase
  full_name: Ur, Blase
  last_name: Ur
citation:
  ama: 'Wu Y, Gupta P, Wei M, Acar Y, Fahl S, Ur B. Your Secrets Are Safe. In: <i>Proceedings
    of the 2018 World Wide Web Conference on World Wide Web - WWW ’18</i>. ACM Press;
    2018. doi:<a href="https://doi.org/10.1145/3178876.3186088">10.1145/3178876.3186088</a>'
  apa: Wu, Y., Gupta, P., Wei, M., Acar, Y., Fahl, S., &#38; Ur, B. (2018). Your Secrets
    Are Safe. <i>Proceedings of the 2018 World Wide Web Conference on World Wide Web
    - WWW ’18</i>. <a href="https://doi.org/10.1145/3178876.3186088">https://doi.org/10.1145/3178876.3186088</a>
  bibtex: '@inproceedings{Wu_Gupta_Wei_Acar_Fahl_Ur_2018, title={Your Secrets Are
    Safe}, DOI={<a href="https://doi.org/10.1145/3178876.3186088">10.1145/3178876.3186088</a>},
    booktitle={Proceedings of the 2018 World Wide Web Conference on World Wide Web
    - WWW ’18}, publisher={ACM Press}, author={Wu, Yuxi and Gupta, Panya and Wei,
    Miranda and Acar, Yasemin and Fahl, Sascha and Ur, Blase}, year={2018} }'
  chicago: Wu, Yuxi, Panya Gupta, Miranda Wei, Yasemin Acar, Sascha Fahl, and Blase
    Ur. “Your Secrets Are Safe.” In <i>Proceedings of the 2018 World Wide Web Conference
    on World Wide Web - WWW ’18</i>. ACM Press, 2018. <a href="https://doi.org/10.1145/3178876.3186088">https://doi.org/10.1145/3178876.3186088</a>.
  ieee: 'Y. Wu, P. Gupta, M. Wei, Y. Acar, S. Fahl, and B. Ur, “Your Secrets Are Safe,”
    2018, doi: <a href="https://doi.org/10.1145/3178876.3186088">10.1145/3178876.3186088</a>.'
  mla: Wu, Yuxi, et al. “Your Secrets Are Safe.” <i>Proceedings of the 2018 World
    Wide Web Conference on World Wide Web - WWW ’18</i>, ACM Press, 2018, doi:<a href="https://doi.org/10.1145/3178876.3186088">10.1145/3178876.3186088</a>.
  short: 'Y. Wu, P. Gupta, M. Wei, Y. Acar, S. Fahl, B. Ur, in: Proceedings of the
    2018 World Wide Web Conference on World Wide Web - WWW ’18, ACM Press, 2018.'
date_created: 2023-09-22T12:52:15Z
date_updated: 2024-06-05T13:06:44Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3178876.3186088
extern: '1'
language:
- iso: eng
publication: Proceedings of the 2018 World Wide Web Conference on World Wide Web -
  WWW '18
publication_status: published
publisher: ACM Press
status: public
title: Your Secrets Are Safe
type: conference
user_id: '14931'
year: '2018'
...
---
_id: '47255'
author:
- first_name: Julie M.
  full_name: Haney, Julie M.
  last_name: Haney
- first_name: Mary
  full_name: Theofanos, Mary
  last_name: Theofanos
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sandra Spickard
  full_name: Prettyman, Sandra Spickard
  last_name: Prettyman
citation:
  ama: 'Haney JM, Theofanos M, Acar Y, Prettyman SS. “We make it a big deal in the
    company”: Security Mindsets in Organizations that Develop Cryptographic Products.
    In: Zurko ME, Lipford HR, eds. <i>Fourteenth Symposium on Usable Privacy and Security,
    SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>. USENIX Association; 2018:357–373.'
  apa: 'Haney, J. M., Theofanos, M., Acar, Y., &#38; Prettyman, S. S. (2018). “We
    make it a big deal in the company”: Security Mindsets in Organizations that Develop
    Cryptographic Products. In M. E. Zurko &#38; H. R. Lipford (Eds.), <i>Fourteenth
    Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August
    12-14, 2018</i> (pp. 357–373). USENIX Association.'
  bibtex: '@inproceedings{Haney_Theofanos_Acar_Prettyman_2018, title={“We make it
    a big deal in the company”: Security Mindsets in Organizations that Develop Cryptographic
    Products}, booktitle={Fourteenth Symposium on Usable Privacy and Security, SOUPS
    2018, Baltimore, MD, USA, August 12-14, 2018}, publisher={USENIX Association},
    author={Haney, Julie M. and Theofanos, Mary and Acar, Yasemin and Prettyman, Sandra
    Spickard}, editor={Zurko, Mary Ellen and Lipford, Heather Richter}, year={2018},
    pages={357–373} }'
  chicago: 'Haney, Julie M., Mary Theofanos, Yasemin Acar, and Sandra Spickard Prettyman.
    “‘We Make It a Big Deal in the Company’: Security Mindsets in Organizations That
    Develop Cryptographic Products.” In <i>Fourteenth Symposium on Usable Privacy
    and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, edited by
    Mary Ellen Zurko and Heather Richter Lipford, 357–373. USENIX Association, 2018.'
  ieee: 'J. M. Haney, M. Theofanos, Y. Acar, and S. S. Prettyman, “‘We make it a big
    deal in the company’: Security Mindsets in Organizations that Develop Cryptographic
    Products,” in <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018,
    Baltimore, MD, USA, August 12-14, 2018</i>, 2018, pp. 357–373.'
  mla: 'Haney, Julie M., et al. “‘We Make It a Big Deal in the Company’: Security
    Mindsets in Organizations That Develop Cryptographic Products.” <i>Fourteenth
    Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August
    12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, USENIX
    Association, 2018, pp. 357–373.'
  short: 'J.M. Haney, M. Theofanos, Y. Acar, S.S. Prettyman, in: M.E. Zurko, H.R.
    Lipford (Eds.), Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018,
    Baltimore, MD, USA, August 12-14, 2018, USENIX Association, 2018, pp. 357–373.'
date_created: 2023-09-22T12:53:12Z
date_updated: 2024-06-05T13:07:06Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Mary Ellen
  full_name: Zurko, Mary Ellen
  last_name: Zurko
- first_name: Heather Richter
  full_name: Lipford, Heather Richter
  last_name: Lipford
extern: '1'
language:
- iso: eng
page: 357–373
publication: Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore,
  MD, USA, August 12-14, 2018
publisher: USENIX Association
status: public
title: '"We make it a big deal in the company": Security Mindsets in Organizations
  that Develop Cryptographic Products'
type: conference
user_id: '14931'
year: '2018'
...
---
_id: '47876'
author:
- first_name: Julie
  full_name: Haney, Julie
  last_name: Haney
- first_name: Mary
  full_name: Theofanos, Mary
  last_name: Theofanos
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sandra Spickard
  full_name: Prettyman, Sandra Spickard
  last_name: Prettyman
citation:
  ama: Haney J, Theofanos M, Acar Y, Prettyman SS. <i>Organizational Views of NIST
    Cryptographic Standards and Testing and Validation Programs</i>. National Institute
    of Standards and Technology; 2018. doi:<a href="https://doi.org/10.6028/nist.ir.8241">10.6028/nist.ir.8241</a>
  apa: Haney, J., Theofanos, M., Acar, Y., &#38; Prettyman, S. S. (2018). <i>Organizational
    views of NIST cryptographic standards and testing and validation programs</i>.
    National Institute of Standards and Technology. <a href="https://doi.org/10.6028/nist.ir.8241">https://doi.org/10.6028/nist.ir.8241</a>
  bibtex: '@book{Haney_Theofanos_Acar_Prettyman_2018, title={Organizational views
    of NIST cryptographic standards and testing and validation programs}, DOI={<a
    href="https://doi.org/10.6028/nist.ir.8241">10.6028/nist.ir.8241</a>}, publisher={National
    Institute of Standards and Technology}, author={Haney, Julie and Theofanos, Mary
    and Acar, Yasemin and Prettyman, Sandra Spickard}, year={2018} }'
  chicago: Haney, Julie, Mary Theofanos, Yasemin Acar, and Sandra Spickard Prettyman.
    <i>Organizational Views of NIST Cryptographic Standards and Testing and Validation
    Programs</i>. National Institute of Standards and Technology, 2018. <a href="https://doi.org/10.6028/nist.ir.8241">https://doi.org/10.6028/nist.ir.8241</a>.
  ieee: J. Haney, M. Theofanos, Y. Acar, and S. S. Prettyman, <i>Organizational views
    of NIST cryptographic standards and testing and validation programs</i>. National
    Institute of Standards and Technology, 2018.
  mla: Haney, Julie, et al. <i>Organizational Views of NIST Cryptographic Standards
    and Testing and Validation Programs</i>. National Institute of Standards and Technology,
    2018, doi:<a href="https://doi.org/10.6028/nist.ir.8241">10.6028/nist.ir.8241</a>.
  short: J. Haney, M. Theofanos, Y. Acar, S.S. Prettyman, Organizational Views of
    NIST Cryptographic Standards and Testing and Validation Programs, National Institute
    of Standards and Technology, 2018.
date_created: 2023-10-09T13:18:41Z
date_updated: 2024-06-05T13:05:57Z
department:
- _id: '34'
- _id: '858'
doi: 10.6028/nist.ir.8241
extern: '1'
language:
- iso: eng
publication_status: published
publisher: National Institute of Standards and Technology
status: public
title: Organizational views of NIST cryptographic standards and testing and validation
  programs
type: report
user_id: '14931'
year: '2018'
...
---
_id: '47256'
author:
- first_name: Peter Leo
  full_name: Gorski, Peter Leo
  last_name: Gorski
- first_name: Luigi Lo
  full_name: Iacono, Luigi Lo
  last_name: Iacono
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Sebastian
  full_name: Möller, Sebastian
  last_name: Möller
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Gorski PL, Iacono LL, Wermke D, et al. Developers Deserve Security Warnings,
    Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.
    In: Zurko ME, Lipford HR, eds. <i>Fourteenth Symposium on Usable Privacy and Security,
    SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>. USENIX Association; 2018:265–281.'
  apa: 'Gorski, P. L., Iacono, L. L., Wermke, D., Stransky, C., Möller, S., Acar,
    Y., &#38; Fahl, S. (2018). Developers Deserve Security Warnings, Too: On the Effect
    of Integrated Security Advice on Cryptographic API Misuse. In M. E. Zurko &#38;
    H. R. Lipford (Eds.), <i>Fourteenth Symposium on Usable Privacy and Security,
    SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i> (pp. 265–281). USENIX Association.'
  bibtex: '@inproceedings{Gorski_Iacono_Wermke_Stransky_Möller_Acar_Fahl_2018, title={Developers
    Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on
    Cryptographic API Misuse}, booktitle={Fourteenth Symposium on Usable Privacy and
    Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018}, publisher={USENIX
    Association}, author={Gorski, Peter Leo and Iacono, Luigi Lo and Wermke, Dominik
    and Stransky, Christian and Möller, Sebastian and Acar, Yasemin and Fahl, Sascha},
    editor={Zurko, Mary Ellen and Lipford, Heather Richter}, year={2018}, pages={265–281}
    }'
  chicago: 'Gorski, Peter Leo, Luigi Lo Iacono, Dominik Wermke, Christian Stransky,
    Sebastian Möller, Yasemin Acar, and Sascha Fahl. “Developers Deserve Security
    Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API
    Misuse.” In <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018,
    Baltimore, MD, USA, August 12-14, 2018</i>, edited by Mary Ellen Zurko and Heather
    Richter Lipford, 265–281. USENIX Association, 2018.'
  ieee: 'P. L. Gorski <i>et al.</i>, “Developers Deserve Security Warnings, Too: On
    the Effect of Integrated Security Advice on Cryptographic API Misuse,” in <i>Fourteenth
    Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August
    12-14, 2018</i>, 2018, pp. 265–281.'
  mla: 'Gorski, Peter Leo, et al. “Developers Deserve Security Warnings, Too: On the
    Effect of Integrated Security Advice on Cryptographic API Misuse.” <i>Fourteenth
    Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August
    12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, USENIX
    Association, 2018, pp. 265–281.'
  short: 'P.L. Gorski, L.L. Iacono, D. Wermke, C. Stransky, S. Möller, Y. Acar, S.
    Fahl, in: M.E. Zurko, H.R. Lipford (Eds.), Fourteenth Symposium on Usable Privacy
    and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, USENIX Association,
    2018, pp. 265–281.'
date_created: 2023-09-22T12:53:46Z
date_updated: 2024-06-05T13:20:00Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Mary Ellen
  full_name: Zurko, Mary Ellen
  last_name: Zurko
- first_name: Heather Richter
  full_name: Lipford, Heather Richter
  last_name: Lipford
extern: '1'
language:
- iso: eng
page: 265–281
publication: Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore,
  MD, USA, August 12-14, 2018
publisher: USENIX Association
status: public
title: 'Developers Deserve Security Warnings, Too: On the Effect of Integrated Security
  Advice on Cryptographic API Misuse'
type: conference
user_id: '14931'
year: '2018'
...
---
_id: '47254'
author:
- first_name: Marten
  full_name: Oltrogge, Marten
  last_name: Oltrogge
- first_name: Erik
  full_name: Derr, Erik
  last_name: Derr
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Christian
  full_name: Rossow, Christian
  last_name: Rossow
- first_name: Giancarlo
  full_name: Pellegrino, Giancarlo
  last_name: Pellegrino
- first_name: Sven
  full_name: Bugiel, Sven
  last_name: Bugiel
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
citation:
  ama: 'Oltrogge M, Derr E, Stransky C, et al. The Rise of the Citizen Developer:
    Assessing the Security Impact of Online App Generators. In: <i>2018 IEEE Symposium
    on Security and Privacy (SP)</i>. IEEE; 2018. doi:<a href="https://doi.org/10.1109/sp.2018.00005">10.1109/sp.2018.00005</a>'
  apa: 'Oltrogge, M., Derr, E., Stransky, C., Acar, Y., Fahl, S., Rossow, C., Pellegrino,
    G., Bugiel, S., &#38; Backes, M. (2018). The Rise of the Citizen Developer: Assessing
    the Security Impact of Online App Generators. <i>2018 IEEE Symposium on Security
    and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp.2018.00005">https://doi.org/10.1109/sp.2018.00005</a>'
  bibtex: '@inproceedings{Oltrogge_Derr_Stransky_Acar_Fahl_Rossow_Pellegrino_Bugiel_Backes_2018,
    title={The Rise of the Citizen Developer: Assessing the Security Impact of Online
    App Generators}, DOI={<a href="https://doi.org/10.1109/sp.2018.00005">10.1109/sp.2018.00005</a>},
    booktitle={2018 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin
    and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven
    and Backes, Michael}, year={2018} }'
  chicago: 'Oltrogge, Marten, Erik Derr, Christian Stransky, Yasemin Acar, Sascha
    Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, and Michael Backes.
    “The Rise of the Citizen Developer: Assessing the Security Impact of Online App
    Generators.” In <i>2018 IEEE Symposium on Security and Privacy (SP)</i>. IEEE,
    2018. <a href="https://doi.org/10.1109/sp.2018.00005">https://doi.org/10.1109/sp.2018.00005</a>.'
  ieee: 'M. Oltrogge <i>et al.</i>, “The Rise of the Citizen Developer: Assessing
    the Security Impact of Online App Generators,” 2018, doi: <a href="https://doi.org/10.1109/sp.2018.00005">10.1109/sp.2018.00005</a>.'
  mla: 'Oltrogge, Marten, et al. “The Rise of the Citizen Developer: Assessing the
    Security Impact of Online App Generators.” <i>2018 IEEE Symposium on Security
    and Privacy (SP)</i>, IEEE, 2018, doi:<a href="https://doi.org/10.1109/sp.2018.00005">10.1109/sp.2018.00005</a>.'
  short: 'M. Oltrogge, E. Derr, C. Stransky, Y. Acar, S. Fahl, C. Rossow, G. Pellegrino,
    S. Bugiel, M. Backes, in: 2018 IEEE Symposium on Security and Privacy (SP), IEEE,
    2018.'
date_created: 2023-09-22T12:52:42Z
date_updated: 2024-06-05T13:19:28Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/sp.2018.00005
extern: '1'
language:
- iso: eng
publication: 2018 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'The Rise of the Citizen Developer: Assessing the Security Impact of Online
  App Generators'
type: conference
user_id: '14931'
year: '2018'
...
---
_id: '47252'
author:
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Bradley
  full_name: Reaves, Bradley
  last_name: Reaves
- first_name: Patrick
  full_name: Traynor, Patrick
  last_name: Traynor
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Wermke D, Huaman N, Acar Y, Reaves B, Traynor P, Fahl S. A Large Scale Investigation
    of Obfuscation Use in Google Play. In: <i>Proceedings of the 34th Annual Computer
    Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07,
    2018</i>. ACM; 2018:222–235. doi:<a href="https://doi.org/10.1145/3274694.3274726">10.1145/3274694.3274726</a>'
  apa: Wermke, D., Huaman, N., Acar, Y., Reaves, B., Traynor, P., &#38; Fahl, S. (2018).
    A Large Scale Investigation of Obfuscation Use in Google Play. <i>Proceedings
    of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San
    Juan, PR, USA, December 03-07, 2018</i>, 222–235. <a href="https://doi.org/10.1145/3274694.3274726">https://doi.org/10.1145/3274694.3274726</a>
  bibtex: '@inproceedings{Wermke_Huaman_Acar_Reaves_Traynor_Fahl_2018, title={A Large
    Scale Investigation of Obfuscation Use in Google Play}, DOI={<a href="https://doi.org/10.1145/3274694.3274726">10.1145/3274694.3274726</a>},
    booktitle={Proceedings of the 34th Annual Computer Security Applications Conference,
    ACSAC 2018, San Juan, PR, USA, December 03-07, 2018}, publisher={ACM}, author={Wermke,
    Dominik and Huaman, Nicolas and Acar, Yasemin and Reaves, Bradley and Traynor,
    Patrick and Fahl, Sascha}, year={2018}, pages={222–235} }'
  chicago: Wermke, Dominik, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick
    Traynor, and Sascha Fahl. “A Large Scale Investigation of Obfuscation Use in Google
    Play.” In <i>Proceedings of the 34th Annual Computer Security Applications Conference,
    ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, 222–235. ACM, 2018. <a
    href="https://doi.org/10.1145/3274694.3274726">https://doi.org/10.1145/3274694.3274726</a>.
  ieee: 'D. Wermke, N. Huaman, Y. Acar, B. Reaves, P. Traynor, and S. Fahl, “A Large
    Scale Investigation of Obfuscation Use in Google Play,” in <i>Proceedings of the
    34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR,
    USA, December 03-07, 2018</i>, 2018, pp. 222–235, doi: <a href="https://doi.org/10.1145/3274694.3274726">10.1145/3274694.3274726</a>.'
  mla: Wermke, Dominik, et al. “A Large Scale Investigation of Obfuscation Use in
    Google Play.” <i>Proceedings of the 34th Annual Computer Security Applications
    Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, ACM, 2018,
    pp. 222–235, doi:<a href="https://doi.org/10.1145/3274694.3274726">10.1145/3274694.3274726</a>.
  short: 'D. Wermke, N. Huaman, Y. Acar, B. Reaves, P. Traynor, S. Fahl, in: Proceedings
    of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San
    Juan, PR, USA, December 03-07, 2018, ACM, 2018, pp. 222–235.'
date_created: 2023-09-22T12:51:58Z
date_updated: 2024-06-05T13:20:17Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3274694.3274726
extern: '1'
language:
- iso: eng
page: 222–235
publication: Proceedings of the 34th Annual Computer Security Applications Conference,
  ACSAC 2018, San Juan, PR, USA, December 03-07, 2018
publisher: ACM
status: public
title: A Large Scale Investigation of Obfuscation Use in Google Play
type: conference
user_id: '14931'
year: '2018'
...
---
_id: '47249'
author:
- first_name: Erik
  full_name: Derr, Erik
  last_name: Derr
- first_name: Sven
  full_name: Bugiel, Sven
  last_name: Bugiel
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
citation:
  ama: 'Derr E, Bugiel S, Fahl S, Acar Y, Backes M. Keep me Updated: An Empirical
    Study of Third-Party Library Updatability on Android. In: <i>Proceedings of the
    2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017.
    doi:<a href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>'
  apa: 'Derr, E., Bugiel, S., Fahl, S., Acar, Y., &#38; Backes, M. (2017). Keep me
    Updated: An Empirical Study of Third-Party Library Updatability on Android. <i>Proceedings
    of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>.
    <a href="https://doi.org/10.1145/3133956.3134059">https://doi.org/10.1145/3133956.3134059</a>'
  bibtex: '@inproceedings{Derr_Bugiel_Fahl_Acar_Backes_2017, title={Keep me Updated:
    An Empirical Study of Third-Party Library Updatability on Android}, DOI={<a href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>},
    booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Derr, Erik and Bugiel, Sven and Fahl, Sascha
    and Acar, Yasemin and Backes, Michael}, year={2017} }'
  chicago: 'Derr, Erik, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes.
    “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.”
    In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security</i>. ACM, 2017. <a href="https://doi.org/10.1145/3133956.3134059">https://doi.org/10.1145/3133956.3134059</a>.'
  ieee: 'E. Derr, S. Bugiel, S. Fahl, Y. Acar, and M. Backes, “Keep me Updated: An
    Empirical Study of Third-Party Library Updatability on Android,” 2017, doi: <a
    href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>.'
  mla: 'Derr, Erik, et al. “Keep Me Updated: An Empirical Study of Third-Party Library
    Updatability on Android.” <i>Proceedings of the 2017 ACM SIGSAC Conference on
    Computer and Communications Security</i>, ACM, 2017, doi:<a href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>.'
  short: 'E. Derr, S. Bugiel, S. Fahl, Y. Acar, M. Backes, in: Proceedings of the
    2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.'
date_created: 2023-09-22T12:50:32Z
date_updated: 2024-06-05T13:09:19Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3133956.3134059
extern: '1'
language:
- iso: eng
publication: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'Keep me Updated: An Empirical Study of Third-Party Library Updatability on
  Android'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47309'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
citation:
  ama: Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. How Internet Resources
    Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur Priv</i>.
    2017;15(2):50–60. doi:<a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>
  apa: Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C.
    (2017). How Internet Resources Might Be Helping You Develop Faster but Less Securely.
    <i>IEEE Secur. Priv.</i>, <i>15</i>(2), 50–60. <a href="https://doi.org/10.1109/MSP.2017.24">https://doi.org/10.1109/MSP.2017.24</a>
  bibtex: '@article{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2017, title={How Internet
    Resources Might Be Helping You Develop Faster but Less Securely}, volume={15},
    DOI={<a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>}, number={2},
    journal={IEEE Secur. Priv.}, author={Acar, Yasemin and Backes, Michael and Fahl,
    Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017},
    pages={50–60} }'
  chicago: 'Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek,
    and Christian Stransky. “How Internet Resources Might Be Helping You Develop Faster
    but Less Securely.” <i>IEEE Secur. Priv.</i> 15, no. 2 (2017): 50–60. <a href="https://doi.org/10.1109/MSP.2017.24">https://doi.org/10.1109/MSP.2017.24</a>.'
  ieee: 'Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “How
    Internet Resources Might Be Helping You Develop Faster but Less Securely,” <i>IEEE
    Secur. Priv.</i>, vol. 15, no. 2, pp. 50–60, 2017, doi: <a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>.'
  mla: Acar, Yasemin, et al. “How Internet Resources Might Be Helping You Develop
    Faster but Less Securely.” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, 2017, pp.
    50–60, doi:<a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>.
  short: Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, IEEE Secur.
    Priv. 15 (2017) 50–60.
date_created: 2023-09-22T13:39:01Z
date_updated: 2024-06-05T13:09:42Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/MSP.2017.24
extern: '1'
intvolume: '        15'
issue: '2'
language:
- iso: eng
page: 50–60
publication: IEEE Secur. Priv.
status: public
title: How Internet Resources Might Be Helping You Develop Faster but Less Securely
type: journal_article
user_id: '14931'
volume: 15
year: '2017'
...
---
_id: '47245'
author:
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Duc Cuong
  full_name: Nguyen, Duc Cuong
  last_name: Nguyen
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Elissa M.
  full_name: Redmiles, Elissa M.
  last_name: Redmiles
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Simson L.
  full_name: Garfinkel, Simson L.
  last_name: Garfinkel
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Stransky C, Acar Y, Nguyen DC, et al. Lessons Learned from Using an Online
    Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software
    Developers. In: Fernandez JM, Payer M, eds. <i>10th USENIX Workshop on Cyber Security
    Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>.
    USENIX Association; 2017.'
  apa: Stransky, C., Acar, Y., Nguyen, D. C., Wermke, D., Kim, D., Redmiles, E. M.,
    Backes, M., Garfinkel, S. L., Mazurek, M. L., &#38; Fahl, S. (2017). Lessons Learned
    from Using an Online Platform to Conduct Large-Scale, Online Controlled Security
    Experiments with Software Developers. In J. M. Fernandez &#38; M. Payer (Eds.),
    <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017,
    Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association.
  bibtex: '@inproceedings{Stransky_Acar_Nguyen_Wermke_Kim_Redmiles_Backes_Garfinkel_Mazurek_Fahl_2017,
    title={Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online
    Controlled Security Experiments with Software Developers}, booktitle={10th USENIX
    Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC,
    Canada, August 14, 2017}, publisher={USENIX Association}, author={Stransky, Christian
    and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Kim, Doowon and
    Redmiles, Elissa M. and Backes, Michael and Garfinkel, Simson L. and Mazurek,
    Michelle L. and Fahl, Sascha}, editor={Fernandez, José M. and Payer, Mathias},
    year={2017} }'
  chicago: Stransky, Christian, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon
    Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek,
    and Sascha Fahl. “Lessons Learned from Using an Online Platform to Conduct Large-Scale,
    Online Controlled Security Experiments with Software Developers.” In <i>10th USENIX
    Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC,
    Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer. USENIX
    Association, 2017.
  ieee: C. Stransky <i>et al.</i>, “Lessons Learned from Using an Online Platform
    to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers,”
    in <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017,
    Vancouver, BC, Canada, August 14, 2017</i>, 2017.
  mla: Stransky, Christian, et al. “Lessons Learned from Using an Online Platform
    to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.”
    <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017,
    Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias
    Payer, USENIX Association, 2017.
  short: 'C. Stransky, Y. Acar, D.C. Nguyen, D. Wermke, D. Kim, E.M. Redmiles, M.
    Backes, S.L. Garfinkel, M.L. Mazurek, S. Fahl, in: J.M. Fernandez, M. Payer (Eds.),
    10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver,
    BC, Canada, August 14, 2017, USENIX Association, 2017.'
date_created: 2023-09-22T12:47:30Z
date_updated: 2024-06-05T13:12:04Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: José M.
  full_name: Fernandez, José M.
  last_name: Fernandez
- first_name: Mathias
  full_name: Payer, Mathias
  last_name: Payer
extern: '1'
language:
- iso: eng
publication: 10th USENIX Workshop on Cyber Security Experimentation and Test, CSET
  2017, Vancouver, BC, Canada, August 14, 2017
publisher: USENIX Association
status: public
title: Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online
  Controlled Security Experiments with Software Developers
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47243'
author:
- first_name: Felix
  full_name: Fischer, Felix
  last_name: Fischer
- first_name: Konstantin
  full_name: Böttinger, Konstantin
  last_name: Böttinger
- first_name: Huang
  full_name: Xiao, Huang
  last_name: Xiao
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Fischer F, Böttinger K, Xiao H, et al. Stack Overflow Considered Harmful?
    The Impact of Copy&#38;Paste on Android Application Security. In: <i>2017 IEEE
    Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>.
    IEEE Computer Society; 2017:121–136. doi:<a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>'
  apa: Fischer, F., Böttinger, K., Xiao, H., Stransky, C., Acar, Y., Backes, M., &#38;
    Fahl, S. (2017). Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste
    on Android Application Security. <i>2017 IEEE Symposium on Security and Privacy,
    SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. <a href="https://doi.org/10.1109/SP.2017.31">https://doi.org/10.1109/SP.2017.31</a>
  bibtex: '@inproceedings{Fischer_Böttinger_Xiao_Stransky_Acar_Backes_Fahl_2017, title={Stack
    Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application
    Security}, DOI={<a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>},
    booktitle={2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA,
    USA, May 22-26, 2017}, publisher={IEEE Computer Society}, author={Fischer, Felix
    and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin
    and Backes, Michael and Fahl, Sascha}, year={2017}, pages={121–136} }'
  chicago: Fischer, Felix, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin
    Acar, Michael Backes, and Sascha Fahl. “Stack Overflow Considered Harmful? The
    Impact of Copy&#38;Paste on Android Application Security.” In <i>2017 IEEE Symposium
    on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136.
    IEEE Computer Society, 2017. <a href="https://doi.org/10.1109/SP.2017.31">https://doi.org/10.1109/SP.2017.31</a>.
  ieee: 'F. Fischer <i>et al.</i>, “Stack Overflow Considered Harmful? The Impact
    of Copy&#38;Paste on Android Application Security,” in <i>2017 IEEE Symposium
    on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 2017,
    pp. 121–136, doi: <a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>.'
  mla: Fischer, Felix, et al. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste
    on Android Application Security.” <i>2017 IEEE Symposium on Security and Privacy,
    SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, IEEE Computer Society, 2017,
    pp. 121–136, doi:<a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>.
  short: 'F. Fischer, K. Böttinger, H. Xiao, C. Stransky, Y. Acar, M. Backes, S. Fahl,
    in: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May
    22-26, 2017, IEEE Computer Society, 2017, pp. 121–136.'
date_created: 2023-09-22T12:43:27Z
date_updated: 2024-06-05T13:12:27Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP.2017.31
extern: '1'
language:
- iso: eng
page: 121–136
publication: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA,
  May 22-26, 2017
publisher: IEEE Computer Society
status: public
title: Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application
  Security
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47250'
author:
- first_name: Duc Cuong
  full_name: Nguyen, Duc Cuong
  last_name: Nguyen
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Charles
  full_name: Weir, Charles
  last_name: Weir
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Nguyen DC, Wermke D, Acar Y, Backes M, Weir C, Fahl S. A Stitch in Time: Supporting
    Android Developers in Writing Secure Code. In: <i>Proceedings of the 2017 ACM
    SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a
    href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>'
  apa: 'Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., &#38; Fahl, S.
    (2017). A Stitch in Time: Supporting Android Developers in Writing Secure Code.
    <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security</i>. <a href="https://doi.org/10.1145/3133956.3133977">https://doi.org/10.1145/3133956.3133977</a>'
  bibtex: '@inproceedings{Nguyen_Wermke_Acar_Backes_Weir_Fahl_2017, title={A Stitch
    in Time: Supporting Android Developers in Writing Secure Code}, DOI={<a href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>},
    booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Nguyen, Duc Cuong and Wermke, Dominik and
    Acar, Yasemin and Backes, Michael and Weir, Charles and Fahl, Sascha}, year={2017}
    }'
  chicago: 'Nguyen, Duc Cuong, Dominik Wermke, Yasemin Acar, Michael Backes, Charles
    Weir, and Sascha Fahl. “A Stitch in Time: Supporting Android Developers in Writing
    Secure Code.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer
    and Communications Security</i>. ACM, 2017. <a href="https://doi.org/10.1145/3133956.3133977">https://doi.org/10.1145/3133956.3133977</a>.'
  ieee: 'D. C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, and S. Fahl, “A Stitch
    in Time: Supporting Android Developers in Writing Secure Code,” 2017, doi: <a
    href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>.'
  mla: 'Nguyen, Duc Cuong, et al. “A Stitch in Time: Supporting Android Developers
    in Writing Secure Code.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer
    and Communications Security</i>, ACM, 2017, doi:<a href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>.'
  short: 'D.C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, S. Fahl, in: Proceedings
    of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM,
    2017.'
date_created: 2023-09-22T12:50:51Z
date_updated: 2024-06-05T13:12:56Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3133956.3133977
extern: '1'
language:
- iso: eng
publication: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'A Stitch in Time: Supporting Android Developers in Writing Secure Code'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47248'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Charles
  full_name: Weir, Charles
  last_name: Weir
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Acar Y, Stransky C, Wermke D, Weir C, Mazurek ML, Fahl S. Developers Need
    Support, Too: A Survey of Security Advice for Software Developers. In: <i>2017
    IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>'
  apa: 'Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M. L., &#38; Fahl,
    S. (2017). Developers Need Support, Too: A Survey of Security Advice for Software
    Developers. <i>2017 IEEE Cybersecurity Development (SecDev)</i>. <a href="https://doi.org/10.1109/secdev.2017.17">https://doi.org/10.1109/secdev.2017.17</a>'
  bibtex: '@inproceedings{Acar_Stransky_Wermke_Weir_Mazurek_Fahl_2017, title={Developers
    Need Support, Too: A Survey of Security Advice for Software Developers}, DOI={<a
    href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>}, booktitle={2017
    IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin
    and Stransky, Christian and Wermke, Dominik and Weir, Charles and Mazurek, Michelle
    L. and Fahl, Sascha}, year={2017} }'
  chicago: 'Acar, Yasemin, Christian Stransky, Dominik Wermke, Charles Weir, Michelle
    L. Mazurek, and Sascha Fahl. “Developers Need Support, Too: A Survey of Security
    Advice for Software Developers.” In <i>2017 IEEE Cybersecurity Development (SecDev)</i>.
    IEEE, 2017. <a href="https://doi.org/10.1109/secdev.2017.17">https://doi.org/10.1109/secdev.2017.17</a>.'
  ieee: 'Y. Acar, C. Stransky, D. Wermke, C. Weir, M. L. Mazurek, and S. Fahl, “Developers
    Need Support, Too: A Survey of Security Advice for Software Developers,” 2017,
    doi: <a href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>.'
  mla: 'Acar, Yasemin, et al. “Developers Need Support, Too: A Survey of Security
    Advice for Software Developers.” <i>2017 IEEE Cybersecurity Development (SecDev)</i>,
    IEEE, 2017, doi:<a href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>.'
  short: 'Y. Acar, C. Stransky, D. Wermke, C. Weir, M.L. Mazurek, S. Fahl, in: 2017
    IEEE Cybersecurity Development (SecDev), IEEE, 2017.'
date_created: 2023-09-22T12:50:12Z
date_updated: 2024-06-05T13:11:41Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/secdev.2017.17
extern: '1'
language:
- iso: eng
publication: 2017 IEEE Cybersecurity Development (SecDev)
publication_status: published
publisher: IEEE
status: public
title: 'Developers Need Support, Too: A Survey of Security Advice for Software Developers'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47242'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
citation:
  ama: 'Acar Y, Fahl S, Mazurek ML. You are Not Your Developer, Either: A Research
    Agenda for Usable Security and Privacy Research Beyond End Users. In: <i>2016
    IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>'
  apa: 'Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). You are Not Your Developer,
    Either: A Research Agenda for Usable Security and Privacy Research Beyond End
    Users. <i>2016 IEEE Cybersecurity Development (SecDev)</i>. <a href="https://doi.org/10.1109/secdev.2016.013">https://doi.org/10.1109/secdev.2016.013</a>'
  bibtex: '@inproceedings{Acar_Fahl_Mazurek_2017, title={You are Not Your Developer,
    Either: A Research Agenda for Usable Security and Privacy Research Beyond End
    Users}, DOI={<a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>},
    booktitle={2016 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar,
    Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }'
  chicago: 'Acar, Yasemin, Sascha Fahl, and Michelle L. Mazurek. “You Are Not Your
    Developer, Either: A Research Agenda for Usable Security and Privacy Research
    Beyond End Users.” In <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE,
    2017. <a href="https://doi.org/10.1109/secdev.2016.013">https://doi.org/10.1109/secdev.2016.013</a>.'
  ieee: 'Y. Acar, S. Fahl, and M. L. Mazurek, “You are Not Your Developer, Either:
    A Research Agenda for Usable Security and Privacy Research Beyond End Users,”
    2017, doi: <a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>.'
  mla: 'Acar, Yasemin, et al. “You Are Not Your Developer, Either: A Research Agenda
    for Usable Security and Privacy Research Beyond End Users.” <i>2016 IEEE Cybersecurity
    Development (SecDev)</i>, IEEE, 2017, doi:<a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>.'
  short: 'Y. Acar, S. Fahl, M.L. Mazurek, in: 2016 IEEE Cybersecurity Development
    (SecDev), IEEE, 2017.'
date_created: 2023-09-22T12:42:23Z
date_updated: 2024-06-05T13:13:34Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/secdev.2016.013
extern: '1'
language:
- iso: eng
publication: 2016 IEEE Cybersecurity Development (SecDev)
publication_status: published
publisher: IEEE
status: public
title: 'You are Not Your Developer, Either: A Research Agenda for Usable Security
  and Privacy Research Beyond End Users'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47246'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Simson
  full_name: Garfinkel, Simson
  last_name: Garfinkel
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
citation:
  ama: 'Acar Y, Backes M, Fahl S, et al. Comparing the Usability of Cryptographic
    APIs. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017.
    doi:<a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>'
  apa: Acar, Y., Backes, M., Fahl, S., Garfinkel, S., Kim, D., Mazurek, M. L., &#38;
    Stransky, C. (2017). Comparing the Usability of Cryptographic APIs. <i>2017 IEEE
    Symposium on Security and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp.2017.52">https://doi.org/10.1109/sp.2017.52</a>
  bibtex: '@inproceedings{Acar_Backes_Fahl_Garfinkel_Kim_Mazurek_Stransky_2017, title={Comparing
    the Usability of Cryptographic APIs}, DOI={<a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>},
    booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson
    and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017}
    }'
  chicago: Acar, Yasemin, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim,
    Michelle L. Mazurek, and Christian Stransky. “Comparing the Usability of Cryptographic
    APIs.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017.
    <a href="https://doi.org/10.1109/sp.2017.52">https://doi.org/10.1109/sp.2017.52</a>.
  ieee: 'Y. Acar <i>et al.</i>, “Comparing the Usability of Cryptographic APIs,” 2017,
    doi: <a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>.'
  mla: Acar, Yasemin, et al. “Comparing the Usability of Cryptographic APIs.” <i>2017
    IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>.
  short: 'Y. Acar, M. Backes, S. Fahl, S. Garfinkel, D. Kim, M.L. Mazurek, C. Stransky,
    in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017.'
date_created: 2023-09-22T12:48:37Z
date_updated: 2024-06-05T13:14:03Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/sp.2017.52
extern: '1'
language:
- iso: eng
publication: 2017 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: Comparing the Usability of Cryptographic APIs
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47244'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Acar Y, Stransky C, Wermke D, Mazurek ML, Fahl S. Security Developer Studies
    with GitHub Users: Exploring a Convenience Sample. In: <i>Thirteenth Symposium
    on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14,
    2017</i>. USENIX Association; 2017:81–95.'
  apa: 'Acar, Y., Stransky, C., Wermke, D., Mazurek, M. L., &#38; Fahl, S. (2017).
    Security Developer Studies with GitHub Users: Exploring a Convenience Sample.
    <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara,
    CA, USA, July 12-14, 2017</i>, 81–95.'
  bibtex: '@inproceedings{Acar_Stransky_Wermke_Mazurek_Fahl_2017, title={Security
    Developer Studies with GitHub Users: Exploring a Convenience Sample}, booktitle={Thirteenth
    Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July
    12-14, 2017}, publisher={USENIX Association}, author={Acar, Yasemin and Stransky,
    Christian and Wermke, Dominik and Mazurek, Michelle L. and Fahl, Sascha}, year={2017},
    pages={81–95} }'
  chicago: 'Acar, Yasemin, Christian Stransky, Dominik Wermke, Michelle L. Mazurek,
    and Sascha Fahl. “Security Developer Studies with GitHub Users: Exploring a Convenience
    Sample.” In <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017,
    Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95. USENIX Association, 2017.'
  ieee: 'Y. Acar, C. Stransky, D. Wermke, M. L. Mazurek, and S. Fahl, “Security Developer
    Studies with GitHub Users: Exploring a Convenience Sample,” in <i>Thirteenth Symposium
    on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14,
    2017</i>, 2017, pp. 81–95.'
  mla: 'Acar, Yasemin, et al. “Security Developer Studies with GitHub Users: Exploring
    a Convenience Sample.” <i>Thirteenth Symposium on Usable Privacy and Security,
    SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, USENIX Association, 2017,
    pp. 81–95.'
  short: 'Y. Acar, C. Stransky, D. Wermke, M.L. Mazurek, S. Fahl, in: Thirteenth Symposium
    on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14,
    2017, USENIX Association, 2017, pp. 81–95.'
date_created: 2023-09-22T12:45:33Z
date_updated: 2024-06-05T13:14:32Z
department:
- _id: '34'
- _id: '858'
extern: '1'
language:
- iso: eng
page: 81–95
publication: Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa
  Clara, CA, USA, July 12-14, 2017
publisher: USENIX Association
status: public
title: 'Security Developer Studies with GitHub Users: Exploring a Convenience Sample'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47873'
author:
- first_name: Elissa M.
  full_name: Redmiles, Elissa M.
  last_name: Redmiles
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
citation:
  ama: Redmiles EM, Acar Y, Fahl S, Mazurek ML. <i>A Summary of Survey Methodology
    Best Practices for Security and Privacy Researchers</i>. University of Maryland
    Computer Science Department; 2017. doi:<a href="https://doi.org/10.13016/M22K2W">10.13016/M22K2W</a>
  apa: Redmiles, E. M., Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). <i>A Summary
    of Survey Methodology Best Practices for Security and Privacy Researchers</i>.
    University of Maryland Computer Science Department. <a href="https://doi.org/10.13016/M22K2W">https://doi.org/10.13016/M22K2W</a>
  bibtex: '@book{Redmiles_Acar_Fahl_Mazurek_2017, title={A Summary of Survey Methodology
    Best Practices for Security and Privacy Researchers}, DOI={<a href="https://doi.org/10.13016/M22K2W">10.13016/M22K2W</a>},
    publisher={University of Maryland Computer Science Department}, author={Redmiles,
    Elissa M. and Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017}
    }'
  chicago: Redmiles, Elissa M., Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek.
    <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>.
    University of Maryland Computer Science Department, 2017. <a href="https://doi.org/10.13016/M22K2W">https://doi.org/10.13016/M22K2W</a>.
  ieee: E. M. Redmiles, Y. Acar, S. Fahl, and M. L. Mazurek, <i>A Summary of Survey
    Methodology Best Practices for Security and Privacy Researchers</i>. University
    of Maryland Computer Science Department, 2017.
  mla: Redmiles, Elissa M., et al. <i>A Summary of Survey Methodology Best Practices
    for Security and Privacy Researchers</i>. University of Maryland Computer Science
    Department, 2017, doi:<a href="https://doi.org/10.13016/M22K2W">10.13016/M22K2W</a>.
  short: E.M. Redmiles, Y. Acar, S. Fahl, M.L. Mazurek, A Summary of Survey Methodology
    Best Practices for Security and Privacy Researchers, University of Maryland Computer
    Science Department, 2017.
date_created: 2023-10-09T13:16:14Z
date_updated: 2024-06-05T13:10:02Z
department:
- _id: '34'
- _id: '858'
doi: 10.13016/M22K2W
extern: '1'
language:
- iso: eng
publisher: University of Maryland Computer Science Department
status: public
title: A Summary of Survey Methodology Best Practices for Security and Privacy Researchers
type: report
user_id: '14931'
year: '2017'
...
---
_id: '47240'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sven
  full_name: Bugiel, Sven
  last_name: Bugiel
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Patrick
  full_name: McDaniel, Patrick
  last_name: McDaniel
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
citation:
  ama: 'Acar Y, Backes M, Bugiel S, Fahl S, McDaniel P, Smith M. SoK: Lessons Learned
    from Android Security Research for Appified Software Platforms. In: <i>2016 IEEE
    Symposium on Security and Privacy (SP)</i>. IEEE; 2016. doi:<a href="https://doi.org/10.1109/sp.2016.33">10.1109/sp.2016.33</a>'
  apa: 'Acar, Y., Backes, M., Bugiel, S., Fahl, S., McDaniel, P., &#38; Smith, M.
    (2016). SoK: Lessons Learned from Android Security Research for Appified Software
    Platforms. <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp.2016.33">https://doi.org/10.1109/sp.2016.33</a>'
  bibtex: '@inproceedings{Acar_Backes_Bugiel_Fahl_McDaniel_Smith_2016, title={SoK:
    Lessons Learned from Android Security Research for Appified Software Platforms},
    DOI={<a href="https://doi.org/10.1109/sp.2016.33">10.1109/sp.2016.33</a>}, booktitle={2016
    IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar,
    Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick
    and Smith, Matthew}, year={2016} }'
  chicago: 'Acar, Yasemin, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel,
    and Matthew Smith. “SoK: Lessons Learned from Android Security Research for Appified
    Software Platforms.” In <i>2016 IEEE Symposium on Security and Privacy (SP)</i>.
    IEEE, 2016. <a href="https://doi.org/10.1109/sp.2016.33">https://doi.org/10.1109/sp.2016.33</a>.'
  ieee: 'Y. Acar, M. Backes, S. Bugiel, S. Fahl, P. McDaniel, and M. Smith, “SoK:
    Lessons Learned from Android Security Research for Appified Software Platforms,”
    2016, doi: <a href="https://doi.org/10.1109/sp.2016.33">10.1109/sp.2016.33</a>.'
  mla: 'Acar, Yasemin, et al. “SoK: Lessons Learned from Android Security Research
    for Appified Software Platforms.” <i>2016 IEEE Symposium on Security and Privacy
    (SP)</i>, IEEE, 2016, doi:<a href="https://doi.org/10.1109/sp.2016.33">10.1109/sp.2016.33</a>.'
  short: 'Y. Acar, M. Backes, S. Bugiel, S. Fahl, P. McDaniel, M. Smith, in: 2016
    IEEE Symposium on Security and Privacy (SP), IEEE, 2016.'
date_created: 2023-09-22T12:41:43Z
date_updated: 2024-06-05T13:14:55Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/sp.2016.33
extern: '1'
language:
- iso: eng
publication: 2016 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'SoK: Lessons Learned from Android Security Research for Appified Software
  Platforms'
type: conference
user_id: '14931'
year: '2016'
...
---
_id: '47239'
author:
- first_name: Sergej
  full_name: Dechand, Sergej
  last_name: Dechand
- first_name: Dominik
  full_name: Schürmann, Dominik
  last_name: Schürmann
- first_name: Karoline
  full_name: Busse, Karoline
  last_name: Busse
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
citation:
  ama: 'Dechand S, Schürmann D, Busse K, Acar Y, Fahl S, Smith M. An Empirical Study
    of Textual Key-Fingerprint Representations. In: Holz T, Savage S, eds. <i>25th
    USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12,
    2016</i>. USENIX Association; 2016:193–208.'
  apa: Dechand, S., Schürmann, D., Busse, K., Acar, Y., Fahl, S., &#38; Smith, M.
    (2016). An Empirical Study of Textual Key-Fingerprint Representations. In T. Holz
    &#38; S. Savage (Eds.), <i>25th USENIX Security Symposium, USENIX Security 16,
    Austin, TX, USA, August 10-12, 2016</i> (pp. 193–208). USENIX Association.
  bibtex: '@inproceedings{Dechand_Schürmann_Busse_Acar_Fahl_Smith_2016, title={An
    Empirical Study of Textual Key-Fingerprint Representations}, booktitle={25th USENIX
    Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016},
    publisher={USENIX Association}, author={Dechand, Sergej and Schürmann, Dominik
    and Busse, Karoline and Acar, Yasemin and Fahl, Sascha and Smith, Matthew}, editor={Holz,
    Thorsten and Savage, Stefan}, year={2016}, pages={193–208} }'
  chicago: Dechand, Sergej, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha
    Fahl, and Matthew Smith. “An Empirical Study of Textual Key-Fingerprint Representations.”
    In <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August
    10-12, 2016</i>, edited by Thorsten Holz and Stefan Savage, 193–208. USENIX Association,
    2016.
  ieee: S. Dechand, D. Schürmann, K. Busse, Y. Acar, S. Fahl, and M. Smith, “An Empirical
    Study of Textual Key-Fingerprint Representations,” in <i>25th USENIX Security
    Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i>, 2016,
    pp. 193–208.
  mla: Dechand, Sergej, et al. “An Empirical Study of Textual Key-Fingerprint Representations.”
    <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August
    10-12, 2016</i>, edited by Thorsten Holz and Stefan Savage, USENIX Association,
    2016, pp. 193–208.
  short: 'S. Dechand, D. Schürmann, K. Busse, Y. Acar, S. Fahl, M. Smith, in: T. Holz,
    S. Savage (Eds.), 25th USENIX Security Symposium, USENIX Security 16, Austin,
    TX, USA, August 10-12, 2016, USENIX Association, 2016, pp. 193–208.'
date_created: 2023-09-22T12:40:35Z
date_updated: 2024-06-05T13:15:58Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Thorsten
  full_name: Holz, Thorsten
  last_name: Holz
- first_name: Stefan
  full_name: Savage, Stefan
  last_name: Savage
extern: '1'
language:
- iso: eng
page: 193–208
publication: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA,
  August 10-12, 2016
publisher: USENIX Association
status: public
title: An Empirical Study of Textual Key-Fingerprint Representations
type: conference
user_id: '14931'
year: '2016'
...
---
_id: '47241'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
citation:
  ama: 'Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. You Get Where You’re
    Looking for: The Impact of Information Sources on Code Security. In: <i>2016 IEEE
    Symposium on Security and Privacy (SP)</i>. IEEE; 2016. doi:<a href="https://doi.org/10.1109/sp.2016.25">10.1109/sp.2016.25</a>'
  apa: 'Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C.
    (2016). You Get Where You’re Looking for: The Impact of Information Sources on
    Code Security. <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp.2016.25">https://doi.org/10.1109/sp.2016.25</a>'
  bibtex: '@inproceedings{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2016, title={You Get
    Where You’re Looking for: The Impact of Information Sources on Code Security},
    DOI={<a href="https://doi.org/10.1109/sp.2016.25">10.1109/sp.2016.25</a>}, booktitle={2016
    IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar,
    Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle
    L. and Stransky, Christian}, year={2016} }'
  chicago: 'Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek,
    and Christian Stransky. “You Get Where You’re Looking for: The Impact of Information
    Sources on Code Security.” In <i>2016 IEEE Symposium on Security and Privacy (SP)</i>.
    IEEE, 2016. <a href="https://doi.org/10.1109/sp.2016.25">https://doi.org/10.1109/sp.2016.25</a>.'
  ieee: 'Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “You
    Get Where You’re Looking for: The Impact of Information Sources on Code Security,”
    2016, doi: <a href="https://doi.org/10.1109/sp.2016.25">10.1109/sp.2016.25</a>.'
  mla: 'Acar, Yasemin, et al. “You Get Where You’re Looking for: The Impact of Information
    Sources on Code Security.” <i>2016 IEEE Symposium on Security and Privacy (SP)</i>,
    IEEE, 2016, doi:<a href="https://doi.org/10.1109/sp.2016.25">10.1109/sp.2016.25</a>.'
  short: 'Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, in: 2016
    IEEE Symposium on Security and Privacy (SP), IEEE, 2016.'
date_created: 2023-09-22T12:42:01Z
date_updated: 2024-06-05T13:15:19Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/sp.2016.25
extern: '1'
language:
- iso: eng
publication: 2016 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'You Get Where You''re Looking for: The Impact of Information Sources on Code
  Security'
type: conference
user_id: '14931'
year: '2016'
...
