[{"status":"public","publication":"2017 IEEE Symposium on Security and Privacy (SP)","type":"conference","language":[{"iso":"eng"}],"extern":"1","_id":"47246","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","year":"2017","citation":{"ama":"Acar Y, Backes M, Fahl S, et al. Comparing the Usability of Cryptographic APIs. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>","ieee":"Y. Acar <i>et al.</i>, “Comparing the Usability of Cryptographic APIs,” 2017, doi: <a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>.","chicago":"Acar, Yasemin, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. “Comparing the Usability of Cryptographic APIs.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/sp.2017.52\">https://doi.org/10.1109/sp.2017.52</a>.","apa":"Acar, Y., Backes, M., Fahl, S., Garfinkel, S., Kim, D., Mazurek, M. L., &#38; Stransky, C. (2017). Comparing the Usability of Cryptographic APIs. <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2017.52\">https://doi.org/10.1109/sp.2017.52</a>","short":"Y. Acar, M. Backes, S. Fahl, S. Garfinkel, D. Kim, M.L. Mazurek, C. Stransky, in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017.","bibtex":"@inproceedings{Acar_Backes_Fahl_Garfinkel_Kim_Mazurek_Stransky_2017, title={Comparing the Usability of Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017} }","mla":"Acar, Yasemin, et al. “Comparing the Usability of Cryptographic APIs.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.52\">10.1109/sp.2017.52</a>."},"publication_status":"published","title":"Comparing the Usability of Cryptographic APIs","doi":"10.1109/sp.2017.52","date_updated":"2024-06-05T13:14:03Z","publisher":"IEEE","date_created":"2023-09-22T12:48:37Z","author":[{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"},{"last_name":"Backes","full_name":"Backes, Michael","first_name":"Michael"},{"first_name":"Sascha","full_name":"Fahl, Sascha","last_name":"Fahl"},{"first_name":"Simson","full_name":"Garfinkel, Simson","last_name":"Garfinkel"},{"first_name":"Doowon","full_name":"Kim, Doowon","last_name":"Kim"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."},{"last_name":"Stransky","full_name":"Stransky, Christian","first_name":"Christian"}]},{"status":"public","publication":"Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017","type":"conference","extern":"1","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47244","page":"81–95","citation":{"mla":"Acar, Yasemin, et al. “Security Developer Studies with GitHub Users: Exploring a Convenience Sample.” <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, USENIX Association, 2017, pp. 81–95.","bibtex":"@inproceedings{Acar_Stransky_Wermke_Mazurek_Fahl_2017, title={Security Developer Studies with GitHub Users: Exploring a Convenience Sample}, booktitle={Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017}, publisher={USENIX Association}, author={Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle L. and Fahl, Sascha}, year={2017}, pages={81–95} }","short":"Y. Acar, C. Stransky, D. Wermke, M.L. Mazurek, S. Fahl, in: Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017, USENIX Association, 2017, pp. 81–95.","apa":"Acar, Y., Stransky, C., Wermke, D., Mazurek, M. L., &#38; Fahl, S. (2017). Security Developer Studies with GitHub Users: Exploring a Convenience Sample. <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95.","chicago":"Acar, Yasemin, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, and Sascha Fahl. “Security Developer Studies with GitHub Users: Exploring a Convenience Sample.” In <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95. USENIX Association, 2017.","ieee":"Y. Acar, C. Stransky, D. Wermke, M. L. Mazurek, and S. Fahl, “Security Developer Studies with GitHub Users: Exploring a Convenience Sample,” in <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, 2017, pp. 81–95.","ama":"Acar Y, Stransky C, Wermke D, Mazurek ML, Fahl S. Security Developer Studies with GitHub Users: Exploring a Convenience Sample. In: <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>. USENIX Association; 2017:81–95."},"year":"2017","title":"Security Developer Studies with GitHub Users: Exploring a Convenience Sample","author":[{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"first_name":"Christian","last_name":"Stransky","full_name":"Stransky, Christian"},{"first_name":"Dominik","full_name":"Wermke, Dominik","last_name":"Wermke"},{"full_name":"Mazurek, Michelle L.","last_name":"Mazurek","first_name":"Michelle L."},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}],"date_created":"2023-09-22T12:45:33Z","date_updated":"2024-06-05T13:14:32Z","publisher":"USENIX Association"},{"date_updated":"2024-06-05T13:10:02Z","publisher":"University of Maryland Computer Science Department","date_created":"2023-10-09T13:16:14Z","author":[{"first_name":"Elissa M.","full_name":"Redmiles, Elissa M.","last_name":"Redmiles"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"full_name":"Mazurek, Michelle L.","last_name":"Mazurek","first_name":"Michelle L."}],"title":"A Summary of Survey Methodology Best Practices for Security and Privacy Researchers","doi":"10.13016/M22K2W","year":"2017","citation":{"ama":"Redmiles EM, Acar Y, Fahl S, Mazurek ML. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department; 2017. doi:<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>","apa":"Redmiles, E. M., Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department. <a href=\"https://doi.org/10.13016/M22K2W\">https://doi.org/10.13016/M22K2W</a>","mla":"Redmiles, Elissa M., et al. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017, doi:<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>.","short":"E.M. Redmiles, Y. Acar, S. Fahl, M.L. Mazurek, A Summary of Survey Methodology Best Practices for Security and Privacy Researchers, University of Maryland Computer Science Department, 2017.","bibtex":"@book{Redmiles_Acar_Fahl_Mazurek_2017, title={A Summary of Survey Methodology Best Practices for Security and Privacy Researchers}, DOI={<a href=\"https://doi.org/10.13016/M22K2W\">10.13016/M22K2W</a>}, publisher={University of Maryland Computer Science Department}, author={Redmiles, Elissa M. and Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }","chicago":"Redmiles, Elissa M., Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek. <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017. <a href=\"https://doi.org/10.13016/M22K2W\">https://doi.org/10.13016/M22K2W</a>.","ieee":"E. M. Redmiles, Y. Acar, S. Fahl, and M. L. Mazurek, <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>. University of Maryland Computer Science Department, 2017."},"_id":"47873","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","extern":"1","language":[{"iso":"eng"}],"type":"report","status":"public"},{"citation":{"mla":"Acar, Yasemin, et al. “SoK: Lessons Learned from Android Security Research for Appified Software Platforms.” <i>2016 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/sp.2016.33\">10.1109/sp.2016.33</a>.","short":"Y. Acar, M. Backes, S. Bugiel, S. Fahl, P. McDaniel, M. Smith, in: 2016 IEEE Symposium on Security and Privacy (SP), IEEE, 2016.","bibtex":"@inproceedings{Acar_Backes_Bugiel_Fahl_McDaniel_Smith_2016, title={SoK: Lessons Learned from Android Security Research for Appified Software Platforms}, DOI={<a href=\"https://doi.org/10.1109/sp.2016.33\">10.1109/sp.2016.33</a>}, booktitle={2016 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew}, year={2016} }","apa":"Acar, Y., Backes, M., Bugiel, S., Fahl, S., McDaniel, P., &#38; Smith, M. (2016). SoK: Lessons Learned from Android Security Research for Appified Software Platforms. <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2016.33\">https://doi.org/10.1109/sp.2016.33</a>","ieee":"Y. Acar, M. Backes, S. Bugiel, S. Fahl, P. McDaniel, and M. Smith, “SoK: Lessons Learned from Android Security Research for Appified Software Platforms,” 2016, doi: <a href=\"https://doi.org/10.1109/sp.2016.33\">10.1109/sp.2016.33</a>.","chicago":"Acar, Yasemin, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel, and Matthew Smith. “SoK: Lessons Learned from Android Security Research for Appified Software Platforms.” In <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/sp.2016.33\">https://doi.org/10.1109/sp.2016.33</a>.","ama":"Acar Y, Backes M, Bugiel S, Fahl S, McDaniel P, Smith M. SoK: Lessons Learned from Android Security Research for Appified Software Platforms. In: <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/sp.2016.33\">10.1109/sp.2016.33</a>"},"year":"2016","publication_status":"published","doi":"10.1109/sp.2016.33","title":"SoK: Lessons Learned from Android Security Research for Appified Software Platforms","author":[{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"full_name":"Backes, Michael","last_name":"Backes","first_name":"Michael"},{"first_name":"Sven","last_name":"Bugiel","full_name":"Bugiel, Sven"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"first_name":"Patrick","full_name":"McDaniel, Patrick","last_name":"McDaniel"},{"first_name":"Matthew","full_name":"Smith, Matthew","last_name":"Smith"}],"date_created":"2023-09-22T12:41:43Z","date_updated":"2024-06-05T13:14:55Z","publisher":"IEEE","status":"public","publication":"2016 IEEE Symposium on Security and Privacy (SP)","type":"conference","language":[{"iso":"eng"}],"extern":"1","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47240"},{"title":"An Empirical Study of Textual Key-Fingerprint Representations","publisher":"USENIX Association","date_updated":"2024-06-05T13:15:58Z","author":[{"first_name":"Sergej","full_name":"Dechand, Sergej","last_name":"Dechand"},{"last_name":"Schürmann","full_name":"Schürmann, Dominik","first_name":"Dominik"},{"first_name":"Karoline","last_name":"Busse","full_name":"Busse, Karoline"},{"first_name":"Yasemin","id":"94636","full_name":"Acar, Yasemin","last_name":"Acar"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"last_name":"Smith","full_name":"Smith, Matthew","first_name":"Matthew"}],"date_created":"2023-09-22T12:40:35Z","year":"2016","citation":{"ieee":"S. Dechand, D. Schürmann, K. Busse, Y. Acar, S. Fahl, and M. Smith, “An Empirical Study of Textual Key-Fingerprint Representations,” in <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i>, 2016, pp. 193–208.","chicago":"Dechand, Sergej, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, and Matthew Smith. “An Empirical Study of Textual Key-Fingerprint Representations.” In <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i>, edited by Thorsten Holz and Stefan Savage, 193–208. USENIX Association, 2016.","ama":"Dechand S, Schürmann D, Busse K, Acar Y, Fahl S, Smith M. An Empirical Study of Textual Key-Fingerprint Representations. In: Holz T, Savage S, eds. <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i>. USENIX Association; 2016:193–208.","apa":"Dechand, S., Schürmann, D., Busse, K., Acar, Y., Fahl, S., &#38; Smith, M. (2016). An Empirical Study of Textual Key-Fingerprint Representations. In T. Holz &#38; S. Savage (Eds.), <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i> (pp. 193–208). USENIX Association.","bibtex":"@inproceedings{Dechand_Schürmann_Busse_Acar_Fahl_Smith_2016, title={An Empirical Study of Textual Key-Fingerprint Representations}, booktitle={25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016}, publisher={USENIX Association}, author={Dechand, Sergej and Schürmann, Dominik and Busse, Karoline and Acar, Yasemin and Fahl, Sascha and Smith, Matthew}, editor={Holz, Thorsten and Savage, Stefan}, year={2016}, pages={193–208} }","short":"S. Dechand, D. Schürmann, K. Busse, Y. Acar, S. Fahl, M. Smith, in: T. Holz, S. Savage (Eds.), 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016, USENIX Association, 2016, pp. 193–208.","mla":"Dechand, Sergej, et al. “An Empirical Study of Textual Key-Fingerprint Representations.” <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i>, edited by Thorsten Holz and Stefan Savage, USENIX Association, 2016, pp. 193–208."},"page":"193–208","language":[{"iso":"eng"}],"extern":"1","_id":"47239","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"editor":[{"last_name":"Holz","full_name":"Holz, Thorsten","first_name":"Thorsten"},{"first_name":"Stefan","last_name":"Savage","full_name":"Savage, Stefan"}],"status":"public","type":"conference","publication":"25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016"},{"publication_status":"published","citation":{"apa":"Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C. (2016). You Get Where You’re Looking for: The Impact of Information Sources on Code Security. <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2016.25\">https://doi.org/10.1109/sp.2016.25</a>","short":"Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, in: 2016 IEEE Symposium on Security and Privacy (SP), IEEE, 2016.","bibtex":"@inproceedings{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2016, title={You Get Where You’re Looking for: The Impact of Information Sources on Code Security}, DOI={<a href=\"https://doi.org/10.1109/sp.2016.25\">10.1109/sp.2016.25</a>}, booktitle={2016 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2016} }","mla":"Acar, Yasemin, et al. “You Get Where You’re Looking for: The Impact of Information Sources on Code Security.” <i>2016 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2016, doi:<a href=\"https://doi.org/10.1109/sp.2016.25\">10.1109/sp.2016.25</a>.","ieee":"Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “You Get Where You’re Looking for: The Impact of Information Sources on Code Security,” 2016, doi: <a href=\"https://doi.org/10.1109/sp.2016.25\">10.1109/sp.2016.25</a>.","chicago":"Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. “You Get Where You’re Looking for: The Impact of Information Sources on Code Security.” In <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2016. <a href=\"https://doi.org/10.1109/sp.2016.25\">https://doi.org/10.1109/sp.2016.25</a>.","ama":"Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. You Get Where You’re Looking for: The Impact of Information Sources on Code Security. In: <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2016. doi:<a href=\"https://doi.org/10.1109/sp.2016.25\">10.1109/sp.2016.25</a>"},"year":"2016","date_created":"2023-09-22T12:42:01Z","author":[{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Michael","last_name":"Backes","full_name":"Backes, Michael"},{"last_name":"Fahl","full_name":"Fahl, Sascha","first_name":"Sascha"},{"full_name":"Kim, Doowon","last_name":"Kim","first_name":"Doowon"},{"first_name":"Michelle L.","last_name":"Mazurek","full_name":"Mazurek, Michelle L."},{"full_name":"Stransky, Christian","last_name":"Stransky","first_name":"Christian"}],"date_updated":"2024-06-05T13:15:19Z","publisher":"IEEE","doi":"10.1109/sp.2016.25","title":"You Get Where You're Looking for: The Impact of Information Sources on Code Security","type":"conference","publication":"2016 IEEE Symposium on Security and Privacy (SP)","status":"public","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"_id":"47241","language":[{"iso":"eng"}],"extern":"1"},{"publication_status":"published","year":"2015","citation":{"mla":"Perl, Henning, et al. “VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.” <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2015, doi:<a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>.","short":"H. Perl, S. Dechand, M. Smith, D. Arp, F. Yamaguchi, K. Rieck, S. Fahl, Y. Acar, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, 2015.","bibtex":"@inproceedings{Perl_Dechand_Smith_Arp_Yamaguchi_Rieck_Fahl_Acar_2015, title={VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits}, DOI={<a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>}, booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin}, year={2015} }","apa":"Perl, H., Dechand, S., Smith, M., Arp, D., Yamaguchi, F., Rieck, K., Fahl, S., &#38; Acar, Y. (2015). VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/2810103.2813604\">https://doi.org/10.1145/2810103.2813604</a>","ieee":"H. Perl <i>et al.</i>, “VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits,” 2015, doi: <a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>.","chicago":"Perl, Henning, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, and Yasemin Acar. “VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.” In <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2015. <a href=\"https://doi.org/10.1145/2810103.2813604\">https://doi.org/10.1145/2810103.2813604</a>.","ama":"Perl H, Dechand S, Smith M, et al. VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. In: <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2015. doi:<a href=\"https://doi.org/10.1145/2810103.2813604\">10.1145/2810103.2813604</a>"},"publisher":"ACM","date_updated":"2024-06-05T13:16:23Z","date_created":"2023-09-22T12:03:10Z","author":[{"first_name":"Henning","last_name":"Perl","full_name":"Perl, Henning"},{"first_name":"Sergej","full_name":"Dechand, Sergej","last_name":"Dechand"},{"last_name":"Smith","full_name":"Smith, Matthew","first_name":"Matthew"},{"full_name":"Arp, Daniel","last_name":"Arp","first_name":"Daniel"},{"first_name":"Fabian","last_name":"Yamaguchi","full_name":"Yamaguchi, Fabian"},{"full_name":"Rieck, Konrad","last_name":"Rieck","first_name":"Konrad"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"last_name":"Acar","full_name":"Acar, Yasemin","id":"94636","first_name":"Yasemin"}],"title":"VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits","doi":"10.1145/2810103.2813604","type":"conference","publication":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","status":"public","_id":"47233","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}],"extern":"1","language":[{"iso":"eng"}]},{"editor":[{"last_name":"Jung","full_name":"Jung, Jaeyeon","first_name":"Jaeyeon"},{"full_name":"Holz, Thorsten","last_name":"Holz","first_name":"Thorsten"}],"status":"public","publication":"24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015","type":"conference","language":[{"iso":"eng"}],"extern":"1","_id":"47232","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","year":"2015","page":"239–254","citation":{"short":"M. Oltrogge, Y. Acar, S. Dechand, M. Smith, S. Fahl, in: J. Jung, T. Holz (Eds.), 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015, USENIX Association, 2015, pp. 239–254.","bibtex":"@inproceedings{Oltrogge_Acar_Dechand_Smith_Fahl_2015, title={To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections}, booktitle={24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015}, publisher={USENIX Association}, author={Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha}, editor={Jung, Jaeyeon and Holz, Thorsten}, year={2015}, pages={239–254} }","mla":"Oltrogge, Marten, et al. “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections.” <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>, edited by Jaeyeon Jung and Thorsten Holz, USENIX Association, 2015, pp. 239–254.","apa":"Oltrogge, M., Acar, Y., Dechand, S., Smith, M., &#38; Fahl, S. (2015). To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In J. Jung &#38; T. Holz (Eds.), <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i> (pp. 239–254). USENIX Association.","chicago":"Oltrogge, Marten, Yasemin Acar, Sergej Dechand, Matthew Smith, and Sascha Fahl. “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections.” In <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>, edited by Jaeyeon Jung and Thorsten Holz, 239–254. USENIX Association, 2015.","ieee":"M. Oltrogge, Y. Acar, S. Dechand, M. Smith, and S. Fahl, “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections,” in <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>, 2015, pp. 239–254.","ama":"Oltrogge M, Acar Y, Dechand S, Smith M, Fahl S. To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In: Jung J, Holz T, eds. <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>. USENIX Association; 2015:239–254."},"title":"To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections","publisher":"USENIX Association","date_updated":"2024-06-05T13:16:45Z","date_created":"2023-09-22T12:01:30Z","author":[{"first_name":"Marten","full_name":"Oltrogge, Marten","last_name":"Oltrogge"},{"first_name":"Yasemin","last_name":"Acar","id":"94636","full_name":"Acar, Yasemin"},{"last_name":"Dechand","full_name":"Dechand, Sergej","first_name":"Sergej"},{"first_name":"Matthew","full_name":"Smith, Matthew","last_name":"Smith"},{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"}]},{"doi":"10.1145/2590296.2590341","title":"Why eve and mallory (also) love webmasters","author":[{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"full_name":"Perl, Henning","last_name":"Perl","first_name":"Henning"},{"first_name":"Matthew","last_name":"Smith","full_name":"Smith, Matthew"}],"date_created":"2023-09-22T11:56:00Z","date_updated":"2024-06-05T13:17:31Z","publisher":"ACM","citation":{"apa":"Fahl, S., Acar, Y., Perl, H., &#38; Smith, M. (2014). Why eve and mallory (also) love webmasters. <i>Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/2590296.2590341\">https://doi.org/10.1145/2590296.2590341</a>","short":"S. Fahl, Y. Acar, H. Perl, M. Smith, in: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ACM, 2014.","mla":"Fahl, Sascha, et al. “Why Eve and Mallory (Also) Love Webmasters.” <i>Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security</i>, ACM, 2014, doi:<a href=\"https://doi.org/10.1145/2590296.2590341\">10.1145/2590296.2590341</a>.","bibtex":"@inproceedings{Fahl_Acar_Perl_Smith_2014, title={Why eve and mallory (also) love webmasters}, DOI={<a href=\"https://doi.org/10.1145/2590296.2590341\">10.1145/2590296.2590341</a>}, booktitle={Proceedings of the 9th ACM symposium on Information, computer and communications security}, publisher={ACM}, author={Fahl, Sascha and Acar, Yasemin and Perl, Henning and Smith, Matthew}, year={2014} }","ama":"Fahl S, Acar Y, Perl H, Smith M. Why eve and mallory (also) love webmasters. In: <i>Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security</i>. ACM; 2014. doi:<a href=\"https://doi.org/10.1145/2590296.2590341\">10.1145/2590296.2590341</a>","ieee":"S. Fahl, Y. Acar, H. Perl, and M. Smith, “Why eve and mallory (also) love webmasters,” 2014, doi: <a href=\"https://doi.org/10.1145/2590296.2590341\">10.1145/2590296.2590341</a>.","chicago":"Fahl, Sascha, Yasemin Acar, Henning Perl, and Matthew Smith. “Why Eve and Mallory (Also) Love Webmasters.” In <i>Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security</i>. ACM, 2014. <a href=\"https://doi.org/10.1145/2590296.2590341\">https://doi.org/10.1145/2590296.2590341</a>."},"year":"2014","publication_status":"published","language":[{"iso":"eng"}],"extern":"1","alternative_title":["a study on the root causes of SSL misconfigurations"],"department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","_id":"47162","status":"public","publication":"Proceedings of the 9th ACM symposium on Information, computer and communications security","type":"conference"},{"publication":"Proceedings of the Ninth Symposium on Usable Privacy and Security","type":"conference","status":"public","_id":"47161","department":[{"_id":"34"},{"_id":"858"}],"user_id":"14931","extern":"1","language":[{"iso":"eng"}],"publication_status":"published","year":"2013","citation":{"bibtex":"@inproceedings{Fahl_Harbach_Acar_Smith_2013, title={On the ecological validity of a password study}, DOI={<a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>}, booktitle={Proceedings of the Ninth Symposium on Usable Privacy and Security}, publisher={ACM}, author={Fahl, Sascha and Harbach, Marian and Acar, Yasemin and Smith, Matthew}, year={2013} }","mla":"Fahl, Sascha, et al. “On the Ecological Validity of a Password Study.” <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>, ACM, 2013, doi:<a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>.","short":"S. Fahl, M. Harbach, Y. Acar, M. Smith, in: Proceedings of the Ninth Symposium on Usable Privacy and Security, ACM, 2013.","apa":"Fahl, S., Harbach, M., Acar, Y., &#38; Smith, M. (2013). On the ecological validity of a password study. <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>. <a href=\"https://doi.org/10.1145/2501604.2501617\">https://doi.org/10.1145/2501604.2501617</a>","ieee":"S. Fahl, M. Harbach, Y. Acar, and M. Smith, “On the ecological validity of a password study,” 2013, doi: <a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>.","chicago":"Fahl, Sascha, Marian Harbach, Yasemin Acar, and Matthew Smith. “On the Ecological Validity of a Password Study.” In <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>. ACM, 2013. <a href=\"https://doi.org/10.1145/2501604.2501617\">https://doi.org/10.1145/2501604.2501617</a>.","ama":"Fahl S, Harbach M, Acar Y, Smith M. On the ecological validity of a password study. In: <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>. ACM; 2013. doi:<a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>"},"publisher":"ACM","date_updated":"2024-06-05T13:17:57Z","date_created":"2023-09-22T11:49:19Z","author":[{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"first_name":"Marian","full_name":"Harbach, Marian","last_name":"Harbach"},{"full_name":"Acar, Yasemin","id":"94636","last_name":"Acar","first_name":"Yasemin"},{"first_name":"Matthew","last_name":"Smith","full_name":"Smith, Matthew"}],"title":"On the ecological validity of a password study","doi":"10.1145/2501604.2501617"}]
