@inproceedings{47246,
  author       = {{Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}},
  booktitle    = {{2017 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{Comparing the Usability of Cryptographic APIs}}},
  doi          = {{10.1109/sp.2017.52}},
  year         = {{2017}},
}

@inproceedings{47244,
  author       = {{Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle L. and Fahl, Sascha}},
  booktitle    = {{Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017}},
  pages        = {{81–95}},
  publisher    = {{USENIX Association}},
  title        = {{{Security Developer Studies with GitHub Users: Exploring a Convenience Sample}}},
  year         = {{2017}},
}

@techreport{47873,
  author       = {{Redmiles, Elissa M. and Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}},
  publisher    = {{University of Maryland Computer Science Department}},
  title        = {{{A Summary of Survey Methodology Best Practices for Security and Privacy Researchers}}},
  doi          = {{10.13016/M22K2W}},
  year         = {{2017}},
}

@inproceedings{47240,
  author       = {{Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew}},
  booktitle    = {{2016 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{SoK: Lessons Learned from Android Security Research for Appified Software Platforms}}},
  doi          = {{10.1109/sp.2016.33}},
  year         = {{2016}},
}

@inproceedings{47239,
  author       = {{Dechand, Sergej and Schürmann, Dominik and Busse, Karoline and Acar, Yasemin and Fahl, Sascha and Smith, Matthew}},
  booktitle    = {{25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016}},
  editor       = {{Holz, Thorsten and Savage, Stefan}},
  pages        = {{193–208}},
  publisher    = {{USENIX Association}},
  title        = {{{An Empirical Study of Textual Key-Fingerprint Representations}}},
  year         = {{2016}},
}

@inproceedings{47241,
  author       = {{Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}},
  booktitle    = {{2016 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{You Get Where You're Looking for: The Impact of Information Sources on Code Security}}},
  doi          = {{10.1109/sp.2016.25}},
  year         = {{2016}},
}

@inproceedings{47233,
  author       = {{Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin}},
  booktitle    = {{Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}},
  publisher    = {{ACM}},
  title        = {{{VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits}}},
  doi          = {{10.1145/2810103.2813604}},
  year         = {{2015}},
}

@inproceedings{47232,
  author       = {{Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha}},
  booktitle    = {{24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015}},
  editor       = {{Jung, Jaeyeon and Holz, Thorsten}},
  pages        = {{239–254}},
  publisher    = {{USENIX Association}},
  title        = {{{To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections}}},
  year         = {{2015}},
}

@inproceedings{47162,
  author       = {{Fahl, Sascha and Acar, Yasemin and Perl, Henning and Smith, Matthew}},
  booktitle    = {{Proceedings of the 9th ACM symposium on Information, computer and communications security}},
  publisher    = {{ACM}},
  title        = {{{Why eve and mallory (also) love webmasters}}},
  doi          = {{10.1145/2590296.2590341}},
  year         = {{2014}},
}

@inproceedings{47161,
  author       = {{Fahl, Sascha and Harbach, Marian and Acar, Yasemin and Smith, Matthew}},
  booktitle    = {{Proceedings of the Ninth Symposium on Usable Privacy and Security}},
  publisher    = {{ACM}},
  title        = {{{On the ecological validity of a password study}}},
  doi          = {{10.1145/2501604.2501617}},
  year         = {{2013}},
}

