---
_id: '47233'
author:
- first_name: Henning
  full_name: Perl, Henning
  last_name: Perl
- first_name: Sergej
  full_name: Dechand, Sergej
  last_name: Dechand
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
- first_name: Daniel
  full_name: Arp, Daniel
  last_name: Arp
- first_name: Fabian
  full_name: Yamaguchi, Fabian
  last_name: Yamaguchi
- first_name: Konrad
  full_name: Rieck, Konrad
  last_name: Rieck
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Perl H, Dechand S, Smith M, et al. VCCFinder: Finding Potential Vulnerabilities
    in Open-Source Projects to Assist Code Audits. In: <i>Proceedings of the 22nd
    ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2015.
    doi:<a href="https://doi.org/10.1145/2810103.2813604">10.1145/2810103.2813604</a>'
  apa: 'Perl, H., Dechand, S., Smith, M., Arp, D., Yamaguchi, F., Rieck, K., Fahl,
    S., &#38; Acar, Y. (2015). VCCFinder: Finding Potential Vulnerabilities in Open-Source
    Projects to Assist Code Audits. <i>Proceedings of the 22nd ACM SIGSAC Conference
    on Computer and Communications Security</i>. <a href="https://doi.org/10.1145/2810103.2813604">https://doi.org/10.1145/2810103.2813604</a>'
  bibtex: '@inproceedings{Perl_Dechand_Smith_Arp_Yamaguchi_Rieck_Fahl_Acar_2015, title={VCCFinder:
    Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits},
    DOI={<a href="https://doi.org/10.1145/2810103.2813604">10.1145/2810103.2813604</a>},
    booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Perl, Henning and Dechand, Sergej and Smith,
    Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha
    and Acar, Yasemin}, year={2015} }'
  chicago: 'Perl, Henning, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi,
    Konrad Rieck, Sascha Fahl, and Yasemin Acar. “VCCFinder: Finding Potential Vulnerabilities
    in Open-Source Projects to Assist Code Audits.” In <i>Proceedings of the 22nd
    ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2015.
    <a href="https://doi.org/10.1145/2810103.2813604">https://doi.org/10.1145/2810103.2813604</a>.'
  ieee: 'H. Perl <i>et al.</i>, “VCCFinder: Finding Potential Vulnerabilities in Open-Source
    Projects to Assist Code Audits,” 2015, doi: <a href="https://doi.org/10.1145/2810103.2813604">10.1145/2810103.2813604</a>.'
  mla: 'Perl, Henning, et al. “VCCFinder: Finding Potential Vulnerabilities in Open-Source
    Projects to Assist Code Audits.” <i>Proceedings of the 22nd ACM SIGSAC Conference
    on Computer and Communications Security</i>, ACM, 2015, doi:<a href="https://doi.org/10.1145/2810103.2813604">10.1145/2810103.2813604</a>.'
  short: 'H. Perl, S. Dechand, M. Smith, D. Arp, F. Yamaguchi, K. Rieck, S. Fahl,
    Y. Acar, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
    Security, ACM, 2015.'
date_created: 2023-09-22T12:03:10Z
date_updated: 2024-06-05T13:16:23Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/2810103.2813604
extern: '1'
language:
- iso: eng
publication: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist
  Code Audits'
type: conference
user_id: '14931'
year: '2015'
...
---
_id: '47232'
author:
- first_name: Marten
  full_name: Oltrogge, Marten
  last_name: Oltrogge
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sergej
  full_name: Dechand, Sergej
  last_name: Dechand
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Oltrogge M, Acar Y, Dechand S, Smith M, Fahl S. To Pin or Not to Pin-Helping
    App Developers Bullet Proof Their TLS Connections. In: Jung J, Holz T, eds. <i>24th
    USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14,
    2015</i>. USENIX Association; 2015:239–254.'
  apa: Oltrogge, M., Acar, Y., Dechand, S., Smith, M., &#38; Fahl, S. (2015). To Pin
    or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In J.
    Jung &#38; T. Holz (Eds.), <i>24th USENIX Security Symposium, USENIX Security
    15, Washington, D.C., USA, August 12-14, 2015</i> (pp. 239–254). USENIX Association.
  bibtex: '@inproceedings{Oltrogge_Acar_Dechand_Smith_Fahl_2015, title={To Pin or
    Not to Pin-Helping App Developers Bullet Proof Their TLS Connections}, booktitle={24th
    USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14,
    2015}, publisher={USENIX Association}, author={Oltrogge, Marten and Acar, Yasemin
    and Dechand, Sergej and Smith, Matthew and Fahl, Sascha}, editor={Jung, Jaeyeon
    and Holz, Thorsten}, year={2015}, pages={239–254} }'
  chicago: Oltrogge, Marten, Yasemin Acar, Sergej Dechand, Matthew Smith, and Sascha
    Fahl. “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections.”
    In <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA,
    August 12-14, 2015</i>, edited by Jaeyeon Jung and Thorsten Holz, 239–254. USENIX
    Association, 2015.
  ieee: M. Oltrogge, Y. Acar, S. Dechand, M. Smith, and S. Fahl, “To Pin or Not to
    Pin-Helping App Developers Bullet Proof Their TLS Connections,” in <i>24th USENIX
    Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>,
    2015, pp. 239–254.
  mla: Oltrogge, Marten, et al. “To Pin or Not to Pin-Helping App Developers Bullet
    Proof Their TLS Connections.” <i>24th USENIX Security Symposium, USENIX Security
    15, Washington, D.C., USA, August 12-14, 2015</i>, edited by Jaeyeon Jung and
    Thorsten Holz, USENIX Association, 2015, pp. 239–254.
  short: 'M. Oltrogge, Y. Acar, S. Dechand, M. Smith, S. Fahl, in: J. Jung, T. Holz
    (Eds.), 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C.,
    USA, August 12-14, 2015, USENIX Association, 2015, pp. 239–254.'
date_created: 2023-09-22T12:01:30Z
date_updated: 2024-06-05T13:16:45Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Jaeyeon
  full_name: Jung, Jaeyeon
  last_name: Jung
- first_name: Thorsten
  full_name: Holz, Thorsten
  last_name: Holz
extern: '1'
language:
- iso: eng
page: 239–254
publication: 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C.,
  USA, August 12-14, 2015
publisher: USENIX Association
status: public
title: To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections
type: conference
user_id: '14931'
year: '2015'
...
---
_id: '47162'
alternative_title:
- a study on the root causes of SSL misconfigurations
author:
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Henning
  full_name: Perl, Henning
  last_name: Perl
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
citation:
  ama: 'Fahl S, Acar Y, Perl H, Smith M. Why eve and mallory (also) love webmasters.
    In: <i>Proceedings of the 9th ACM Symposium on Information, Computer and Communications
    Security</i>. ACM; 2014. doi:<a href="https://doi.org/10.1145/2590296.2590341">10.1145/2590296.2590341</a>'
  apa: Fahl, S., Acar, Y., Perl, H., &#38; Smith, M. (2014). Why eve and mallory (also)
    love webmasters. <i>Proceedings of the 9th ACM Symposium on Information, Computer
    and Communications Security</i>. <a href="https://doi.org/10.1145/2590296.2590341">https://doi.org/10.1145/2590296.2590341</a>
  bibtex: '@inproceedings{Fahl_Acar_Perl_Smith_2014, title={Why eve and mallory (also)
    love webmasters}, DOI={<a href="https://doi.org/10.1145/2590296.2590341">10.1145/2590296.2590341</a>},
    booktitle={Proceedings of the 9th ACM symposium on Information, computer and communications
    security}, publisher={ACM}, author={Fahl, Sascha and Acar, Yasemin and Perl, Henning
    and Smith, Matthew}, year={2014} }'
  chicago: Fahl, Sascha, Yasemin Acar, Henning Perl, and Matthew Smith. “Why Eve and
    Mallory (Also) Love Webmasters.” In <i>Proceedings of the 9th ACM Symposium on
    Information, Computer and Communications Security</i>. ACM, 2014. <a href="https://doi.org/10.1145/2590296.2590341">https://doi.org/10.1145/2590296.2590341</a>.
  ieee: 'S. Fahl, Y. Acar, H. Perl, and M. Smith, “Why eve and mallory (also) love
    webmasters,” 2014, doi: <a href="https://doi.org/10.1145/2590296.2590341">10.1145/2590296.2590341</a>.'
  mla: Fahl, Sascha, et al. “Why Eve and Mallory (Also) Love Webmasters.” <i>Proceedings
    of the 9th ACM Symposium on Information, Computer and Communications Security</i>,
    ACM, 2014, doi:<a href="https://doi.org/10.1145/2590296.2590341">10.1145/2590296.2590341</a>.
  short: 'S. Fahl, Y. Acar, H. Perl, M. Smith, in: Proceedings of the 9th ACM Symposium
    on Information, Computer and Communications Security, ACM, 2014.'
date_created: 2023-09-22T11:56:00Z
date_updated: 2024-06-05T13:17:31Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/2590296.2590341
extern: '1'
language:
- iso: eng
publication: Proceedings of the 9th ACM symposium on Information, computer and communications
  security
publication_status: published
publisher: ACM
status: public
title: Why eve and mallory (also) love webmasters
type: conference
user_id: '14931'
year: '2014'
...
---
_id: '47161'
author:
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Marian
  full_name: Harbach, Marian
  last_name: Harbach
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
citation:
  ama: 'Fahl S, Harbach M, Acar Y, Smith M. On the ecological validity of a password
    study. In: <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>.
    ACM; 2013. doi:<a href="https://doi.org/10.1145/2501604.2501617">10.1145/2501604.2501617</a>'
  apa: Fahl, S., Harbach, M., Acar, Y., &#38; Smith, M. (2013). On the ecological
    validity of a password study. <i>Proceedings of the Ninth Symposium on Usable
    Privacy and Security</i>. <a href="https://doi.org/10.1145/2501604.2501617">https://doi.org/10.1145/2501604.2501617</a>
  bibtex: '@inproceedings{Fahl_Harbach_Acar_Smith_2013, title={On the ecological validity
    of a password study}, DOI={<a href="https://doi.org/10.1145/2501604.2501617">10.1145/2501604.2501617</a>},
    booktitle={Proceedings of the Ninth Symposium on Usable Privacy and Security},
    publisher={ACM}, author={Fahl, Sascha and Harbach, Marian and Acar, Yasemin and
    Smith, Matthew}, year={2013} }'
  chicago: Fahl, Sascha, Marian Harbach, Yasemin Acar, and Matthew Smith. “On the
    Ecological Validity of a Password Study.” In <i>Proceedings of the Ninth Symposium
    on Usable Privacy and Security</i>. ACM, 2013. <a href="https://doi.org/10.1145/2501604.2501617">https://doi.org/10.1145/2501604.2501617</a>.
  ieee: 'S. Fahl, M. Harbach, Y. Acar, and M. Smith, “On the ecological validity of
    a password study,” 2013, doi: <a href="https://doi.org/10.1145/2501604.2501617">10.1145/2501604.2501617</a>.'
  mla: Fahl, Sascha, et al. “On the Ecological Validity of a Password Study.” <i>Proceedings
    of the Ninth Symposium on Usable Privacy and Security</i>, ACM, 2013, doi:<a href="https://doi.org/10.1145/2501604.2501617">10.1145/2501604.2501617</a>.
  short: 'S. Fahl, M. Harbach, Y. Acar, M. Smith, in: Proceedings of the Ninth Symposium
    on Usable Privacy and Security, ACM, 2013.'
date_created: 2023-09-22T11:49:19Z
date_updated: 2024-06-05T13:17:57Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/2501604.2501617
extern: '1'
language:
- iso: eng
publication: Proceedings of the Ninth Symposium on Usable Privacy and Security
publication_status: published
publisher: ACM
status: public
title: On the ecological validity of a password study
type: conference
user_id: '14931'
year: '2013'
...
