@inproceedings{47264,
  author       = {{Oltrogge, Marten and Huaman, Nicolas and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha}},
  booktitle    = {{30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021}},
  editor       = {{Bailey, Michael and Greenstadt, Rachel}},
  pages        = {{4347–4364}},
  publisher    = {{USENIX Association}},
  title        = {{{Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications}}},
  year         = {{2021}},
}

@inproceedings{47269,
  author       = {{Neil, Lorenzo and Bouma-Sims, Elijah and Lafontaine, Evan and Acar, Yasemin and Reaves, Bradley}},
  booktitle    = {{Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021}},
  editor       = {{Chiasson, Sonia}},
  pages        = {{359–376}},
  publisher    = {{USENIX Association}},
  title        = {{{Investigating Web Service Account Remediation Advice}}},
  year         = {{2021}},
}

@phdthesis{47271,
  author       = {{Acar, Yasemin}},
  publisher    = {{University of Marburg, Germany}},
  title        = {{{Human Factors in Secure Software Development}}},
  year         = {{2021}},
}

@inbook{47261,
  author       = {{Haney, Julie M. and Furman, Susanne M. and Acar, Yasemin}},
  booktitle    = {{HCI for Cybersecurity, Privacy and Trust}},
  isbn         = {{9783030503086}},
  issn         = {{0302-9743}},
  publisher    = {{Springer International Publishing}},
  title        = {{{Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}}},
  doi          = {{10.1007/978-3-030-50309-3_26}},
  year         = {{2020}},
}

@inproceedings{47260,
  author       = {{Wermke, Dominik and Huaman, Nicolas and Stransky, Christian and Busch, Niklas and Acar, Yasemin and Fahl, Sascha}},
  booktitle    = {{Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020}},
  editor       = {{Lipford, Heather Richter and Chiasson, Sonia}},
  pages        = {{359–377}},
  publisher    = {{USENIX Association}},
  title        = {{{Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites}}},
  year         = {{2020}},
}

@inproceedings{47262,
  author       = {{Gorski, Peter Leo and Acar, Yasemin and Lo Iacono, Luigi and Fahl, Sascha}},
  booktitle    = {{Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems}},
  publisher    = {{ACM}},
  title        = {{{Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs}}},
  doi          = {{10.1145/3313831.3376142}},
  year         = {{2020}},
}

@inproceedings{47879,
  author       = {{Haney, Julie and Furman, Susanne and Acar, Yasemin}},
  publisher    = {{International Conference on Human-Computer Interaction, Copenhagen, -1}},
  title        = {{{Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}}},
  year         = {{2020}},
}

@inproceedings{47253,
  author       = {{Wu, Yuxi and Gupta, Panya and Wei, Miranda and Acar, Yasemin and Fahl, Sascha and Ur, Blase}},
  booktitle    = {{Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18}},
  publisher    = {{ACM Press}},
  title        = {{{Your Secrets Are Safe}}},
  doi          = {{10.1145/3178876.3186088}},
  year         = {{2018}},
}

@inproceedings{47255,
  author       = {{Haney, Julie M. and Theofanos, Mary and Acar, Yasemin and Prettyman, Sandra Spickard}},
  booktitle    = {{Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018}},
  editor       = {{Zurko, Mary Ellen and Lipford, Heather Richter}},
  pages        = {{357–373}},
  publisher    = {{USENIX Association}},
  title        = {{{"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products}}},
  year         = {{2018}},
}

@techreport{47876,
  author       = {{Haney, Julie and Theofanos, Mary and Acar, Yasemin and Prettyman, Sandra Spickard}},
  publisher    = {{National Institute of Standards and Technology}},
  title        = {{{Organizational views of NIST cryptographic standards and testing and validation programs}}},
  doi          = {{10.6028/nist.ir.8241}},
  year         = {{2018}},
}

@inproceedings{47256,
  author       = {{Gorski, Peter Leo and Iacono, Luigi Lo and Wermke, Dominik and Stransky, Christian and Möller, Sebastian and Acar, Yasemin and Fahl, Sascha}},
  booktitle    = {{Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018}},
  editor       = {{Zurko, Mary Ellen and Lipford, Heather Richter}},
  pages        = {{265–281}},
  publisher    = {{USENIX Association}},
  title        = {{{Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse}}},
  year         = {{2018}},
}

@inproceedings{47254,
  author       = {{Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven and Backes, Michael}},
  booktitle    = {{2018 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators}}},
  doi          = {{10.1109/sp.2018.00005}},
  year         = {{2018}},
}

@inproceedings{47252,
  author       = {{Wermke, Dominik and Huaman, Nicolas and Acar, Yasemin and Reaves, Bradley and Traynor, Patrick and Fahl, Sascha}},
  booktitle    = {{Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018}},
  pages        = {{222–235}},
  publisher    = {{ACM}},
  title        = {{{A Large Scale Investigation of Obfuscation Use in Google Play}}},
  doi          = {{10.1145/3274694.3274726}},
  year         = {{2018}},
}

@inproceedings{47249,
  author       = {{Derr, Erik and Bugiel, Sven and Fahl, Sascha and Acar, Yasemin and Backes, Michael}},
  booktitle    = {{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}},
  publisher    = {{ACM}},
  title        = {{{Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android}}},
  doi          = {{10.1145/3133956.3134059}},
  year         = {{2017}},
}

@article{47309,
  author       = {{Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}},
  journal      = {{IEEE Secur. Priv.}},
  number       = {{2}},
  pages        = {{50–60}},
  title        = {{{How Internet Resources Might Be Helping You Develop Faster but Less Securely}}},
  doi          = {{10.1109/MSP.2017.24}},
  volume       = {{15}},
  year         = {{2017}},
}

@inproceedings{47245,
  author       = {{Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Kim, Doowon and Redmiles, Elissa M. and Backes, Michael and Garfinkel, Simson L. and Mazurek, Michelle L. and Fahl, Sascha}},
  booktitle    = {{10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017}},
  editor       = {{Fernandez, José M. and Payer, Mathias}},
  publisher    = {{USENIX Association}},
  title        = {{{Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers}}},
  year         = {{2017}},
}

@inproceedings{47243,
  author       = {{Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha}},
  booktitle    = {{2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017}},
  pages        = {{121–136}},
  publisher    = {{IEEE Computer Society}},
  title        = {{{Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security}}},
  doi          = {{10.1109/SP.2017.31}},
  year         = {{2017}},
}

@inproceedings{47250,
  author       = {{Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles and Fahl, Sascha}},
  booktitle    = {{Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}},
  publisher    = {{ACM}},
  title        = {{{A Stitch in Time: Supporting Android Developers in Writing Secure Code}}},
  doi          = {{10.1145/3133956.3133977}},
  year         = {{2017}},
}

@inproceedings{47248,
  author       = {{Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Weir, Charles and Mazurek, Michelle L. and Fahl, Sascha}},
  booktitle    = {{2017 IEEE Cybersecurity Development (SecDev)}},
  publisher    = {{IEEE}},
  title        = {{{Developers Need Support, Too: A Survey of Security Advice for Software Developers}}},
  doi          = {{10.1109/secdev.2017.17}},
  year         = {{2017}},
}

@inproceedings{47242,
  author       = {{Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}},
  booktitle    = {{2016 IEEE Cybersecurity Development (SecDev)}},
  publisher    = {{IEEE}},
  title        = {{{You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users}}},
  doi          = {{10.1109/secdev.2016.013}},
  year         = {{2017}},
}

