---
_id: '47264'
author:
- first_name: Marten
  full_name: Oltrogge, Marten
  last_name: Oltrogge
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Sabrina
  full_name: Amft, Sabrina
  last_name: Amft
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Oltrogge M, Huaman N, Amft S, Acar Y, Backes M, Fahl S. Why Eve and Mallory
    Still Love Android: Revisiting TLS (In)Security in Android Applications. In: Bailey
    M, Greenstadt R, eds. <i>30th USENIX Security Symposium, USENIX Security 2021,
    August 11-13, 2021</i>. USENIX Association; 2021:4347–4364.'
  apa: 'Oltrogge, M., Huaman, N., Amft, S., Acar, Y., Backes, M., &#38; Fahl, S. (2021).
    Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android
    Applications. In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th USENIX Security
    Symposium, USENIX Security 2021, August 11-13, 2021</i> (pp. 4347–4364). USENIX
    Association.'
  bibtex: '@inproceedings{Oltrogge_Huaman_Amft_Acar_Backes_Fahl_2021, title={Why Eve
    and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications},
    booktitle={30th USENIX Security Symposium, USENIX Security 2021, August 11-13,
    2021}, publisher={USENIX Association}, author={Oltrogge, Marten and Huaman, Nicolas
    and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha}, editor={Bailey,
    Michael and Greenstadt, Rachel}, year={2021}, pages={4347–4364} }'
  chicago: 'Oltrogge, Marten, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael
    Backes, and Sascha Fahl. “Why Eve and Mallory Still Love Android: Revisiting TLS
    (In)Security in Android Applications.” In <i>30th USENIX Security Symposium, USENIX
    Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt,
    4347–4364. USENIX Association, 2021.'
  ieee: 'M. Oltrogge, N. Huaman, S. Amft, Y. Acar, M. Backes, and S. Fahl, “Why Eve
    and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications,”
    in <i>30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021</i>,
    2021, pp. 4347–4364.'
  mla: 'Oltrogge, Marten, et al. “Why Eve and Mallory Still Love Android: Revisiting
    TLS (In)Security in Android Applications.” <i>30th USENIX Security Symposium,
    USENIX Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel
    Greenstadt, USENIX Association, 2021, pp. 4347–4364.'
  short: 'M. Oltrogge, N. Huaman, S. Amft, Y. Acar, M. Backes, S. Fahl, in: M. Bailey,
    R. Greenstadt (Eds.), 30th USENIX Security Symposium, USENIX Security 2021, August
    11-13, 2021, USENIX Association, 2021, pp. 4347–4364.'
date_created: 2023-09-22T13:02:22Z
date_updated: 2024-06-05T13:01:22Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Michael
  full_name: Bailey, Michael
  last_name: Bailey
- first_name: Rachel
  full_name: Greenstadt, Rachel
  last_name: Greenstadt
extern: '1'
language:
- iso: eng
page: 4347–4364
publication: 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021
publisher: USENIX Association
status: public
title: 'Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android
  Applications'
type: conference
user_id: '14931'
year: '2021'
...
---
_id: '47269'
author:
- first_name: Lorenzo
  full_name: Neil, Lorenzo
  last_name: Neil
- first_name: Elijah
  full_name: Bouma-Sims, Elijah
  last_name: Bouma-Sims
- first_name: Evan
  full_name: Lafontaine, Evan
  last_name: Lafontaine
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Bradley
  full_name: Reaves, Bradley
  last_name: Reaves
citation:
  ama: 'Neil L, Bouma-Sims E, Lafontaine E, Acar Y, Reaves B. Investigating Web Service
    Account Remediation Advice. In: Chiasson S, ed. <i>Seventeenth Symposium on Usable
    Privacy and Security, SOUPS 2021, August 8-10, 2021</i>. USENIX Association; 2021:359–376.'
  apa: Neil, L., Bouma-Sims, E., Lafontaine, E., Acar, Y., &#38; Reaves, B. (2021).
    Investigating Web Service Account Remediation Advice. In S. Chiasson (Ed.), <i>Seventeenth
    Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i> (pp.
    359–376). USENIX Association.
  bibtex: '@inproceedings{Neil_Bouma-Sims_Lafontaine_Acar_Reaves_2021, title={Investigating
    Web Service Account Remediation Advice}, booktitle={Seventeenth Symposium on Usable
    Privacy and Security, SOUPS 2021, August 8-10, 2021}, publisher={USENIX Association},
    author={Neil, Lorenzo and Bouma-Sims, Elijah and Lafontaine, Evan and Acar, Yasemin
    and Reaves, Bradley}, editor={Chiasson, Sonia}, year={2021}, pages={359–376} }'
  chicago: Neil, Lorenzo, Elijah Bouma-Sims, Evan Lafontaine, Yasemin Acar, and Bradley
    Reaves. “Investigating Web Service Account Remediation Advice.” In <i>Seventeenth
    Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, edited
    by Sonia Chiasson, 359–376. USENIX Association, 2021.
  ieee: L. Neil, E. Bouma-Sims, E. Lafontaine, Y. Acar, and B. Reaves, “Investigating
    Web Service Account Remediation Advice,” in <i>Seventeenth Symposium on Usable
    Privacy and Security, SOUPS 2021, August 8-10, 2021</i>, 2021, pp. 359–376.
  mla: Neil, Lorenzo, et al. “Investigating Web Service Account Remediation Advice.”
    <i>Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10,
    2021</i>, edited by Sonia Chiasson, USENIX Association, 2021, pp. 359–376.
  short: 'L. Neil, E. Bouma-Sims, E. Lafontaine, Y. Acar, B. Reaves, in: S. Chiasson
    (Ed.), Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August
    8-10, 2021, USENIX Association, 2021, pp. 359–376.'
date_created: 2023-09-22T13:05:16Z
date_updated: 2024-06-05T13:03:38Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Sonia
  full_name: Chiasson, Sonia
  last_name: Chiasson
extern: '1'
language:
- iso: eng
page: 359–376
publication: Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August
  8-10, 2021
publisher: USENIX Association
status: public
title: Investigating Web Service Account Remediation Advice
type: conference
user_id: '14931'
year: '2021'
...
---
_id: '47271'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: Acar Y. <i>Human Factors in Secure Software Development</i>. University of
    Marburg, Germany; 2021.
  apa: Acar, Y. (2021). <i>Human Factors in Secure Software Development</i>. University
    of Marburg, Germany.
  bibtex: '@book{Acar_2021, title={Human Factors in Secure Software Development},
    publisher={University of Marburg, Germany}, author={Acar, Yasemin}, year={2021}
    }'
  chicago: Acar, Yasemin. <i>Human Factors in Secure Software Development</i>. University
    of Marburg, Germany, 2021.
  ieee: Y. Acar, <i>Human Factors in Secure Software Development</i>. University of
    Marburg, Germany, 2021.
  mla: Acar, Yasemin. <i>Human Factors in Secure Software Development</i>. University
    of Marburg, Germany, 2021.
  short: Y. Acar, Human Factors in Secure Software Development, University of Marburg,
    Germany, 2021.
date_created: 2023-09-22T13:06:40Z
date_updated: 2024-06-05T12:56:39Z
department:
- _id: '34'
- _id: '858'
extern: '1'
language:
- iso: eng
publisher: University of Marburg, Germany
status: public
title: Human Factors in Secure Software Development
type: dissertation
user_id: '14931'
year: '2021'
...
---
_id: '47261'
author:
- first_name: Julie M.
  full_name: Haney, Julie M.
  last_name: Haney
- first_name: Susanne M.
  full_name: Furman, Susanne M.
  last_name: Furman
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Haney JM, Furman SM, Acar Y. Smart Home Security and Privacy Mitigations:
    Consumer Perceptions, Practices, and Challenges. In: <i>HCI for Cybersecurity,
    Privacy and Trust</i>. Springer International Publishing; 2020. doi:<a href="https://doi.org/10.1007/978-3-030-50309-3_26">10.1007/978-3-030-50309-3_26</a>'
  apa: 'Haney, J. M., Furman, S. M., &#38; Acar, Y. (2020). Smart Home Security and
    Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. In <i>HCI
    for Cybersecurity, Privacy and Trust</i>. Springer International Publishing. <a
    href="https://doi.org/10.1007/978-3-030-50309-3_26">https://doi.org/10.1007/978-3-030-50309-3_26</a>'
  bibtex: '@inbook{Haney_Furman_Acar_2020, place={Cham}, title={Smart Home Security
    and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges}, DOI={<a
    href="https://doi.org/10.1007/978-3-030-50309-3_26">10.1007/978-3-030-50309-3_26</a>},
    booktitle={HCI for Cybersecurity, Privacy and Trust}, publisher={Springer International
    Publishing}, author={Haney, Julie M. and Furman, Susanne M. and Acar, Yasemin},
    year={2020} }'
  chicago: 'Haney, Julie M., Susanne M. Furman, and Yasemin Acar. “Smart Home Security
    and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” In
    <i>HCI for Cybersecurity, Privacy and Trust</i>. Cham: Springer International
    Publishing, 2020. <a href="https://doi.org/10.1007/978-3-030-50309-3_26">https://doi.org/10.1007/978-3-030-50309-3_26</a>.'
  ieee: 'J. M. Haney, S. M. Furman, and Y. Acar, “Smart Home Security and Privacy
    Mitigations: Consumer Perceptions, Practices, and Challenges,” in <i>HCI for Cybersecurity,
    Privacy and Trust</i>, Cham: Springer International Publishing, 2020.'
  mla: 'Haney, Julie M., et al. “Smart Home Security and Privacy Mitigations: Consumer
    Perceptions, Practices, and Challenges.” <i>HCI for Cybersecurity, Privacy and
    Trust</i>, Springer International Publishing, 2020, doi:<a href="https://doi.org/10.1007/978-3-030-50309-3_26">10.1007/978-3-030-50309-3_26</a>.'
  short: 'J.M. Haney, S.M. Furman, Y. Acar, in: HCI for Cybersecurity, Privacy and
    Trust, Springer International Publishing, Cham, 2020.'
date_created: 2023-09-22T12:59:53Z
date_updated: 2024-06-05T13:04:23Z
department:
- _id: '34'
- _id: '858'
doi: 10.1007/978-3-030-50309-3_26
extern: '1'
language:
- iso: eng
place: Cham
publication: HCI for Cybersecurity, Privacy and Trust
publication_identifier:
  isbn:
  - '9783030503086'
  - '9783030503093'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: 'Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices,
  and Challenges'
type: book_chapter
user_id: '14931'
year: '2020'
...
---
_id: '47260'
author:
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Niklas
  full_name: Busch, Niklas
  last_name: Busch
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Wermke D, Huaman N, Stransky C, Busch N, Acar Y, Fahl S. Cloudy with a Chance
    of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and
    Privacy in Cloud Office Suites. In: Lipford HR, Chiasson S, eds. <i>Sixteenth
    Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>. USENIX
    Association; 2020:359–377.'
  apa: 'Wermke, D., Huaman, N., Stransky, C., Busch, N., Acar, Y., &#38; Fahl, S.
    (2020). Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and
    Expectations of Security and Privacy in Cloud Office Suites. In H. R. Lipford
    &#38; S. Chiasson (Eds.), <i>Sixteenth Symposium on Usable Privacy and Security,
    SOUPS 2020, August 7-11, 2020</i> (pp. 359–377). USENIX Association.'
  bibtex: '@inproceedings{Wermke_Huaman_Stransky_Busch_Acar_Fahl_2020, title={Cloudy
    with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations
    of Security and Privacy in Cloud Office Suites}, booktitle={Sixteenth Symposium
    on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020}, publisher={USENIX
    Association}, author={Wermke, Dominik and Huaman, Nicolas and Stransky, Christian
    and Busch, Niklas and Acar, Yasemin and Fahl, Sascha}, editor={Lipford, Heather
    Richter and Chiasson, Sonia}, year={2020}, pages={359–377} }'
  chicago: 'Wermke, Dominik, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin
    Acar, and Sascha Fahl. “Cloudy with a Chance of Misconceptions: Exploring Users’
    Perceptions and Expectations of Security and Privacy in Cloud Office Suites.”
    In <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11,
    2020</i>, edited by Heather Richter Lipford and Sonia Chiasson, 359–377. USENIX
    Association, 2020.'
  ieee: 'D. Wermke, N. Huaman, C. Stransky, N. Busch, Y. Acar, and S. Fahl, “Cloudy
    with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations
    of Security and Privacy in Cloud Office Suites,” in <i>Sixteenth Symposium on
    Usable Privacy and Security, SOUPS 2020, August 7-11, 2020</i>, 2020, pp. 359–377.'
  mla: 'Wermke, Dominik, et al. “Cloudy with a Chance of Misconceptions: Exploring
    Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites.”
    <i>Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11,
    2020</i>, edited by Heather Richter Lipford and Sonia Chiasson, USENIX Association,
    2020, pp. 359–377.'
  short: 'D. Wermke, N. Huaman, C. Stransky, N. Busch, Y. Acar, S. Fahl, in: H.R.
    Lipford, S. Chiasson (Eds.), Sixteenth Symposium on Usable Privacy and Security,
    SOUPS 2020, August 7-11, 2020, USENIX Association, 2020, pp. 359–377.'
date_created: 2023-09-22T12:59:31Z
date_updated: 2024-06-05T13:04:48Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Heather Richter
  full_name: Lipford, Heather Richter
  last_name: Lipford
- first_name: Sonia
  full_name: Chiasson, Sonia
  last_name: Chiasson
extern: '1'
language:
- iso: eng
page: 359–377
publication: Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August
  7-11, 2020
publisher: USENIX Association
status: public
title: 'Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations
  of Security and Privacy in Cloud Office Suites'
type: conference
user_id: '14931'
year: '2020'
...
---
_id: '47262'
author:
- first_name: Peter Leo
  full_name: Gorski, Peter Leo
  last_name: Gorski
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Luigi
  full_name: Lo Iacono, Luigi
  last_name: Lo Iacono
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Gorski PL, Acar Y, Lo Iacono L, Fahl S. Listen to Developers! A Participatory
    Design Study on Security Warnings for Cryptographic APIs. In: <i>Proceedings of
    the 2020 CHI Conference on Human Factors in Computing Systems</i>. ACM; 2020.
    doi:<a href="https://doi.org/10.1145/3313831.3376142">10.1145/3313831.3376142</a>'
  apa: Gorski, P. L., Acar, Y., Lo Iacono, L., &#38; Fahl, S. (2020). Listen to Developers!
    A Participatory Design Study on Security Warnings for Cryptographic APIs. <i>Proceedings
    of the 2020 CHI Conference on Human Factors in Computing Systems</i>. <a href="https://doi.org/10.1145/3313831.3376142">https://doi.org/10.1145/3313831.3376142</a>
  bibtex: '@inproceedings{Gorski_Acar_Lo Iacono_Fahl_2020, title={Listen to Developers!
    A Participatory Design Study on Security Warnings for Cryptographic APIs}, DOI={<a
    href="https://doi.org/10.1145/3313831.3376142">10.1145/3313831.3376142</a>}, booktitle={Proceedings
    of the 2020 CHI Conference on Human Factors in Computing Systems}, publisher={ACM},
    author={Gorski, Peter Leo and Acar, Yasemin and Lo Iacono, Luigi and Fahl, Sascha},
    year={2020} }'
  chicago: Gorski, Peter Leo, Yasemin Acar, Luigi Lo Iacono, and Sascha Fahl. “Listen
    to Developers! A Participatory Design Study on Security Warnings for Cryptographic
    APIs.” In <i>Proceedings of the 2020 CHI Conference on Human Factors in Computing
    Systems</i>. ACM, 2020. <a href="https://doi.org/10.1145/3313831.3376142">https://doi.org/10.1145/3313831.3376142</a>.
  ieee: 'P. L. Gorski, Y. Acar, L. Lo Iacono, and S. Fahl, “Listen to Developers!
    A Participatory Design Study on Security Warnings for Cryptographic APIs,” 2020,
    doi: <a href="https://doi.org/10.1145/3313831.3376142">10.1145/3313831.3376142</a>.'
  mla: Gorski, Peter Leo, et al. “Listen to Developers! A Participatory Design Study
    on Security Warnings for Cryptographic APIs.” <i>Proceedings of the 2020 CHI Conference
    on Human Factors in Computing Systems</i>, ACM, 2020, doi:<a href="https://doi.org/10.1145/3313831.3376142">10.1145/3313831.3376142</a>.
  short: 'P.L. Gorski, Y. Acar, L. Lo Iacono, S. Fahl, in: Proceedings of the 2020
    CHI Conference on Human Factors in Computing Systems, ACM, 2020.'
date_created: 2023-09-22T13:00:15Z
date_updated: 2024-06-05T13:05:10Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3313831.3376142
extern: '1'
language:
- iso: eng
publication: Proceedings of the 2020 CHI Conference on Human Factors in Computing
  Systems
publication_status: published
publisher: ACM
status: public
title: Listen to Developers! A Participatory Design Study on Security Warnings for
  Cryptographic APIs
type: conference
user_id: '14931'
year: '2020'
...
---
_id: '47879'
author:
- first_name: Julie
  full_name: Haney, Julie
  last_name: Haney
- first_name: Susanne
  full_name: Furman, Susanne
  last_name: Furman
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Haney J, Furman S, Acar Y. Smart Home Security and Privacy Mitigations: Consumer
    Perceptions, Practices, and Challenges. In: International Conference on Human-Computer
    Interaction, Copenhagen, -1; 2020.'
  apa: 'Haney, J., Furman, S., &#38; Acar, Y. (2020). <i>Smart Home Security and Privacy
    Mitigations: Consumer Perceptions, Practices, and Challenges</i>.'
  bibtex: '@inproceedings{Haney_Furman_Acar_2020, title={Smart Home Security and Privacy
    Mitigations: Consumer Perceptions, Practices, and Challenges}, publisher={International
    Conference on Human-Computer Interaction, Copenhagen, -1}, author={Haney, Julie
    and Furman, Susanne and Acar, Yasemin}, year={2020} }'
  chicago: 'Haney, Julie, Susanne Furman, and Yasemin Acar. “Smart Home Security and
    Privacy Mitigations: Consumer Perceptions, Practices, and Challenges.” International
    Conference on Human-Computer Interaction, Copenhagen, -1, 2020.'
  ieee: 'J. Haney, S. Furman, and Y. Acar, “Smart Home Security and Privacy Mitigations:
    Consumer Perceptions, Practices, and Challenges,” 2020.'
  mla: 'Haney, Julie, et al. <i>Smart Home Security and Privacy Mitigations: Consumer
    Perceptions, Practices, and Challenges</i>. International Conference on Human-Computer
    Interaction, Copenhagen, -1, 2020.'
  short: 'J. Haney, S. Furman, Y. Acar, in: International Conference on Human-Computer
    Interaction, Copenhagen, -1, 2020.'
date_created: 2023-10-09T13:20:44Z
date_updated: 2024-06-05T13:04:04Z
department:
- _id: '34'
- _id: '858'
extern: '1'
language:
- iso: eng
publisher: International Conference on Human-Computer Interaction, Copenhagen, -1
status: public
title: 'Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices,
  and Challenges'
type: conference
user_id: '14931'
year: '2020'
...
---
_id: '47253'
alternative_title:
- How Browsers' Explanations Impact Misconceptions About Private Browsing Mode
author:
- first_name: Yuxi
  full_name: Wu, Yuxi
  last_name: Wu
- first_name: Panya
  full_name: Gupta, Panya
  last_name: Gupta
- first_name: Miranda
  full_name: Wei, Miranda
  last_name: Wei
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Blase
  full_name: Ur, Blase
  last_name: Ur
citation:
  ama: 'Wu Y, Gupta P, Wei M, Acar Y, Fahl S, Ur B. Your Secrets Are Safe. In: <i>Proceedings
    of the 2018 World Wide Web Conference on World Wide Web - WWW ’18</i>. ACM Press;
    2018. doi:<a href="https://doi.org/10.1145/3178876.3186088">10.1145/3178876.3186088</a>'
  apa: Wu, Y., Gupta, P., Wei, M., Acar, Y., Fahl, S., &#38; Ur, B. (2018). Your Secrets
    Are Safe. <i>Proceedings of the 2018 World Wide Web Conference on World Wide Web
    - WWW ’18</i>. <a href="https://doi.org/10.1145/3178876.3186088">https://doi.org/10.1145/3178876.3186088</a>
  bibtex: '@inproceedings{Wu_Gupta_Wei_Acar_Fahl_Ur_2018, title={Your Secrets Are
    Safe}, DOI={<a href="https://doi.org/10.1145/3178876.3186088">10.1145/3178876.3186088</a>},
    booktitle={Proceedings of the 2018 World Wide Web Conference on World Wide Web
    - WWW ’18}, publisher={ACM Press}, author={Wu, Yuxi and Gupta, Panya and Wei,
    Miranda and Acar, Yasemin and Fahl, Sascha and Ur, Blase}, year={2018} }'
  chicago: Wu, Yuxi, Panya Gupta, Miranda Wei, Yasemin Acar, Sascha Fahl, and Blase
    Ur. “Your Secrets Are Safe.” In <i>Proceedings of the 2018 World Wide Web Conference
    on World Wide Web - WWW ’18</i>. ACM Press, 2018. <a href="https://doi.org/10.1145/3178876.3186088">https://doi.org/10.1145/3178876.3186088</a>.
  ieee: 'Y. Wu, P. Gupta, M. Wei, Y. Acar, S. Fahl, and B. Ur, “Your Secrets Are Safe,”
    2018, doi: <a href="https://doi.org/10.1145/3178876.3186088">10.1145/3178876.3186088</a>.'
  mla: Wu, Yuxi, et al. “Your Secrets Are Safe.” <i>Proceedings of the 2018 World
    Wide Web Conference on World Wide Web - WWW ’18</i>, ACM Press, 2018, doi:<a href="https://doi.org/10.1145/3178876.3186088">10.1145/3178876.3186088</a>.
  short: 'Y. Wu, P. Gupta, M. Wei, Y. Acar, S. Fahl, B. Ur, in: Proceedings of the
    2018 World Wide Web Conference on World Wide Web - WWW ’18, ACM Press, 2018.'
date_created: 2023-09-22T12:52:15Z
date_updated: 2024-06-05T13:06:44Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3178876.3186088
extern: '1'
language:
- iso: eng
publication: Proceedings of the 2018 World Wide Web Conference on World Wide Web -
  WWW '18
publication_status: published
publisher: ACM Press
status: public
title: Your Secrets Are Safe
type: conference
user_id: '14931'
year: '2018'
...
---
_id: '47255'
author:
- first_name: Julie M.
  full_name: Haney, Julie M.
  last_name: Haney
- first_name: Mary
  full_name: Theofanos, Mary
  last_name: Theofanos
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sandra Spickard
  full_name: Prettyman, Sandra Spickard
  last_name: Prettyman
citation:
  ama: 'Haney JM, Theofanos M, Acar Y, Prettyman SS. “We make it a big deal in the
    company”: Security Mindsets in Organizations that Develop Cryptographic Products.
    In: Zurko ME, Lipford HR, eds. <i>Fourteenth Symposium on Usable Privacy and Security,
    SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>. USENIX Association; 2018:357–373.'
  apa: 'Haney, J. M., Theofanos, M., Acar, Y., &#38; Prettyman, S. S. (2018). “We
    make it a big deal in the company”: Security Mindsets in Organizations that Develop
    Cryptographic Products. In M. E. Zurko &#38; H. R. Lipford (Eds.), <i>Fourteenth
    Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August
    12-14, 2018</i> (pp. 357–373). USENIX Association.'
  bibtex: '@inproceedings{Haney_Theofanos_Acar_Prettyman_2018, title={“We make it
    a big deal in the company”: Security Mindsets in Organizations that Develop Cryptographic
    Products}, booktitle={Fourteenth Symposium on Usable Privacy and Security, SOUPS
    2018, Baltimore, MD, USA, August 12-14, 2018}, publisher={USENIX Association},
    author={Haney, Julie M. and Theofanos, Mary and Acar, Yasemin and Prettyman, Sandra
    Spickard}, editor={Zurko, Mary Ellen and Lipford, Heather Richter}, year={2018},
    pages={357–373} }'
  chicago: 'Haney, Julie M., Mary Theofanos, Yasemin Acar, and Sandra Spickard Prettyman.
    “‘We Make It a Big Deal in the Company’: Security Mindsets in Organizations That
    Develop Cryptographic Products.” In <i>Fourteenth Symposium on Usable Privacy
    and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>, edited by
    Mary Ellen Zurko and Heather Richter Lipford, 357–373. USENIX Association, 2018.'
  ieee: 'J. M. Haney, M. Theofanos, Y. Acar, and S. S. Prettyman, “‘We make it a big
    deal in the company’: Security Mindsets in Organizations that Develop Cryptographic
    Products,” in <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018,
    Baltimore, MD, USA, August 12-14, 2018</i>, 2018, pp. 357–373.'
  mla: 'Haney, Julie M., et al. “‘We Make It a Big Deal in the Company’: Security
    Mindsets in Organizations That Develop Cryptographic Products.” <i>Fourteenth
    Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August
    12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, USENIX
    Association, 2018, pp. 357–373.'
  short: 'J.M. Haney, M. Theofanos, Y. Acar, S.S. Prettyman, in: M.E. Zurko, H.R.
    Lipford (Eds.), Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018,
    Baltimore, MD, USA, August 12-14, 2018, USENIX Association, 2018, pp. 357–373.'
date_created: 2023-09-22T12:53:12Z
date_updated: 2024-06-05T13:07:06Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Mary Ellen
  full_name: Zurko, Mary Ellen
  last_name: Zurko
- first_name: Heather Richter
  full_name: Lipford, Heather Richter
  last_name: Lipford
extern: '1'
language:
- iso: eng
page: 357–373
publication: Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore,
  MD, USA, August 12-14, 2018
publisher: USENIX Association
status: public
title: '"We make it a big deal in the company": Security Mindsets in Organizations
  that Develop Cryptographic Products'
type: conference
user_id: '14931'
year: '2018'
...
---
_id: '47876'
author:
- first_name: Julie
  full_name: Haney, Julie
  last_name: Haney
- first_name: Mary
  full_name: Theofanos, Mary
  last_name: Theofanos
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sandra Spickard
  full_name: Prettyman, Sandra Spickard
  last_name: Prettyman
citation:
  ama: Haney J, Theofanos M, Acar Y, Prettyman SS. <i>Organizational Views of NIST
    Cryptographic Standards and Testing and Validation Programs</i>. National Institute
    of Standards and Technology; 2018. doi:<a href="https://doi.org/10.6028/nist.ir.8241">10.6028/nist.ir.8241</a>
  apa: Haney, J., Theofanos, M., Acar, Y., &#38; Prettyman, S. S. (2018). <i>Organizational
    views of NIST cryptographic standards and testing and validation programs</i>.
    National Institute of Standards and Technology. <a href="https://doi.org/10.6028/nist.ir.8241">https://doi.org/10.6028/nist.ir.8241</a>
  bibtex: '@book{Haney_Theofanos_Acar_Prettyman_2018, title={Organizational views
    of NIST cryptographic standards and testing and validation programs}, DOI={<a
    href="https://doi.org/10.6028/nist.ir.8241">10.6028/nist.ir.8241</a>}, publisher={National
    Institute of Standards and Technology}, author={Haney, Julie and Theofanos, Mary
    and Acar, Yasemin and Prettyman, Sandra Spickard}, year={2018} }'
  chicago: Haney, Julie, Mary Theofanos, Yasemin Acar, and Sandra Spickard Prettyman.
    <i>Organizational Views of NIST Cryptographic Standards and Testing and Validation
    Programs</i>. National Institute of Standards and Technology, 2018. <a href="https://doi.org/10.6028/nist.ir.8241">https://doi.org/10.6028/nist.ir.8241</a>.
  ieee: J. Haney, M. Theofanos, Y. Acar, and S. S. Prettyman, <i>Organizational views
    of NIST cryptographic standards and testing and validation programs</i>. National
    Institute of Standards and Technology, 2018.
  mla: Haney, Julie, et al. <i>Organizational Views of NIST Cryptographic Standards
    and Testing and Validation Programs</i>. National Institute of Standards and Technology,
    2018, doi:<a href="https://doi.org/10.6028/nist.ir.8241">10.6028/nist.ir.8241</a>.
  short: J. Haney, M. Theofanos, Y. Acar, S.S. Prettyman, Organizational Views of
    NIST Cryptographic Standards and Testing and Validation Programs, National Institute
    of Standards and Technology, 2018.
date_created: 2023-10-09T13:18:41Z
date_updated: 2024-06-05T13:05:57Z
department:
- _id: '34'
- _id: '858'
doi: 10.6028/nist.ir.8241
extern: '1'
language:
- iso: eng
publication_status: published
publisher: National Institute of Standards and Technology
status: public
title: Organizational views of NIST cryptographic standards and testing and validation
  programs
type: report
user_id: '14931'
year: '2018'
...
---
_id: '47256'
author:
- first_name: Peter Leo
  full_name: Gorski, Peter Leo
  last_name: Gorski
- first_name: Luigi Lo
  full_name: Iacono, Luigi Lo
  last_name: Iacono
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Sebastian
  full_name: Möller, Sebastian
  last_name: Möller
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Gorski PL, Iacono LL, Wermke D, et al. Developers Deserve Security Warnings,
    Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.
    In: Zurko ME, Lipford HR, eds. <i>Fourteenth Symposium on Usable Privacy and Security,
    SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i>. USENIX Association; 2018:265–281.'
  apa: 'Gorski, P. L., Iacono, L. L., Wermke, D., Stransky, C., Möller, S., Acar,
    Y., &#38; Fahl, S. (2018). Developers Deserve Security Warnings, Too: On the Effect
    of Integrated Security Advice on Cryptographic API Misuse. In M. E. Zurko &#38;
    H. R. Lipford (Eds.), <i>Fourteenth Symposium on Usable Privacy and Security,
    SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018</i> (pp. 265–281). USENIX Association.'
  bibtex: '@inproceedings{Gorski_Iacono_Wermke_Stransky_Möller_Acar_Fahl_2018, title={Developers
    Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on
    Cryptographic API Misuse}, booktitle={Fourteenth Symposium on Usable Privacy and
    Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018}, publisher={USENIX
    Association}, author={Gorski, Peter Leo and Iacono, Luigi Lo and Wermke, Dominik
    and Stransky, Christian and Möller, Sebastian and Acar, Yasemin and Fahl, Sascha},
    editor={Zurko, Mary Ellen and Lipford, Heather Richter}, year={2018}, pages={265–281}
    }'
  chicago: 'Gorski, Peter Leo, Luigi Lo Iacono, Dominik Wermke, Christian Stransky,
    Sebastian Möller, Yasemin Acar, and Sascha Fahl. “Developers Deserve Security
    Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API
    Misuse.” In <i>Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018,
    Baltimore, MD, USA, August 12-14, 2018</i>, edited by Mary Ellen Zurko and Heather
    Richter Lipford, 265–281. USENIX Association, 2018.'
  ieee: 'P. L. Gorski <i>et al.</i>, “Developers Deserve Security Warnings, Too: On
    the Effect of Integrated Security Advice on Cryptographic API Misuse,” in <i>Fourteenth
    Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August
    12-14, 2018</i>, 2018, pp. 265–281.'
  mla: 'Gorski, Peter Leo, et al. “Developers Deserve Security Warnings, Too: On the
    Effect of Integrated Security Advice on Cryptographic API Misuse.” <i>Fourteenth
    Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August
    12-14, 2018</i>, edited by Mary Ellen Zurko and Heather Richter Lipford, USENIX
    Association, 2018, pp. 265–281.'
  short: 'P.L. Gorski, L.L. Iacono, D. Wermke, C. Stransky, S. Möller, Y. Acar, S.
    Fahl, in: M.E. Zurko, H.R. Lipford (Eds.), Fourteenth Symposium on Usable Privacy
    and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, USENIX Association,
    2018, pp. 265–281.'
date_created: 2023-09-22T12:53:46Z
date_updated: 2024-06-05T13:20:00Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Mary Ellen
  full_name: Zurko, Mary Ellen
  last_name: Zurko
- first_name: Heather Richter
  full_name: Lipford, Heather Richter
  last_name: Lipford
extern: '1'
language:
- iso: eng
page: 265–281
publication: Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore,
  MD, USA, August 12-14, 2018
publisher: USENIX Association
status: public
title: 'Developers Deserve Security Warnings, Too: On the Effect of Integrated Security
  Advice on Cryptographic API Misuse'
type: conference
user_id: '14931'
year: '2018'
...
---
_id: '47254'
author:
- first_name: Marten
  full_name: Oltrogge, Marten
  last_name: Oltrogge
- first_name: Erik
  full_name: Derr, Erik
  last_name: Derr
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Christian
  full_name: Rossow, Christian
  last_name: Rossow
- first_name: Giancarlo
  full_name: Pellegrino, Giancarlo
  last_name: Pellegrino
- first_name: Sven
  full_name: Bugiel, Sven
  last_name: Bugiel
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
citation:
  ama: 'Oltrogge M, Derr E, Stransky C, et al. The Rise of the Citizen Developer:
    Assessing the Security Impact of Online App Generators. In: <i>2018 IEEE Symposium
    on Security and Privacy (SP)</i>. IEEE; 2018. doi:<a href="https://doi.org/10.1109/sp.2018.00005">10.1109/sp.2018.00005</a>'
  apa: 'Oltrogge, M., Derr, E., Stransky, C., Acar, Y., Fahl, S., Rossow, C., Pellegrino,
    G., Bugiel, S., &#38; Backes, M. (2018). The Rise of the Citizen Developer: Assessing
    the Security Impact of Online App Generators. <i>2018 IEEE Symposium on Security
    and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp.2018.00005">https://doi.org/10.1109/sp.2018.00005</a>'
  bibtex: '@inproceedings{Oltrogge_Derr_Stransky_Acar_Fahl_Rossow_Pellegrino_Bugiel_Backes_2018,
    title={The Rise of the Citizen Developer: Assessing the Security Impact of Online
    App Generators}, DOI={<a href="https://doi.org/10.1109/sp.2018.00005">10.1109/sp.2018.00005</a>},
    booktitle={2018 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Oltrogge, Marten and Derr, Erik and Stransky, Christian and Acar, Yasemin
    and Fahl, Sascha and Rossow, Christian and Pellegrino, Giancarlo and Bugiel, Sven
    and Backes, Michael}, year={2018} }'
  chicago: 'Oltrogge, Marten, Erik Derr, Christian Stransky, Yasemin Acar, Sascha
    Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, and Michael Backes.
    “The Rise of the Citizen Developer: Assessing the Security Impact of Online App
    Generators.” In <i>2018 IEEE Symposium on Security and Privacy (SP)</i>. IEEE,
    2018. <a href="https://doi.org/10.1109/sp.2018.00005">https://doi.org/10.1109/sp.2018.00005</a>.'
  ieee: 'M. Oltrogge <i>et al.</i>, “The Rise of the Citizen Developer: Assessing
    the Security Impact of Online App Generators,” 2018, doi: <a href="https://doi.org/10.1109/sp.2018.00005">10.1109/sp.2018.00005</a>.'
  mla: 'Oltrogge, Marten, et al. “The Rise of the Citizen Developer: Assessing the
    Security Impact of Online App Generators.” <i>2018 IEEE Symposium on Security
    and Privacy (SP)</i>, IEEE, 2018, doi:<a href="https://doi.org/10.1109/sp.2018.00005">10.1109/sp.2018.00005</a>.'
  short: 'M. Oltrogge, E. Derr, C. Stransky, Y. Acar, S. Fahl, C. Rossow, G. Pellegrino,
    S. Bugiel, M. Backes, in: 2018 IEEE Symposium on Security and Privacy (SP), IEEE,
    2018.'
date_created: 2023-09-22T12:52:42Z
date_updated: 2024-06-05T13:19:28Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/sp.2018.00005
extern: '1'
language:
- iso: eng
publication: 2018 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'The Rise of the Citizen Developer: Assessing the Security Impact of Online
  App Generators'
type: conference
user_id: '14931'
year: '2018'
...
---
_id: '47252'
author:
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Nicolas
  full_name: Huaman, Nicolas
  last_name: Huaman
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Bradley
  full_name: Reaves, Bradley
  last_name: Reaves
- first_name: Patrick
  full_name: Traynor, Patrick
  last_name: Traynor
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Wermke D, Huaman N, Acar Y, Reaves B, Traynor P, Fahl S. A Large Scale Investigation
    of Obfuscation Use in Google Play. In: <i>Proceedings of the 34th Annual Computer
    Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07,
    2018</i>. ACM; 2018:222–235. doi:<a href="https://doi.org/10.1145/3274694.3274726">10.1145/3274694.3274726</a>'
  apa: Wermke, D., Huaman, N., Acar, Y., Reaves, B., Traynor, P., &#38; Fahl, S. (2018).
    A Large Scale Investigation of Obfuscation Use in Google Play. <i>Proceedings
    of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San
    Juan, PR, USA, December 03-07, 2018</i>, 222–235. <a href="https://doi.org/10.1145/3274694.3274726">https://doi.org/10.1145/3274694.3274726</a>
  bibtex: '@inproceedings{Wermke_Huaman_Acar_Reaves_Traynor_Fahl_2018, title={A Large
    Scale Investigation of Obfuscation Use in Google Play}, DOI={<a href="https://doi.org/10.1145/3274694.3274726">10.1145/3274694.3274726</a>},
    booktitle={Proceedings of the 34th Annual Computer Security Applications Conference,
    ACSAC 2018, San Juan, PR, USA, December 03-07, 2018}, publisher={ACM}, author={Wermke,
    Dominik and Huaman, Nicolas and Acar, Yasemin and Reaves, Bradley and Traynor,
    Patrick and Fahl, Sascha}, year={2018}, pages={222–235} }'
  chicago: Wermke, Dominik, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick
    Traynor, and Sascha Fahl. “A Large Scale Investigation of Obfuscation Use in Google
    Play.” In <i>Proceedings of the 34th Annual Computer Security Applications Conference,
    ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, 222–235. ACM, 2018. <a
    href="https://doi.org/10.1145/3274694.3274726">https://doi.org/10.1145/3274694.3274726</a>.
  ieee: 'D. Wermke, N. Huaman, Y. Acar, B. Reaves, P. Traynor, and S. Fahl, “A Large
    Scale Investigation of Obfuscation Use in Google Play,” in <i>Proceedings of the
    34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR,
    USA, December 03-07, 2018</i>, 2018, pp. 222–235, doi: <a href="https://doi.org/10.1145/3274694.3274726">10.1145/3274694.3274726</a>.'
  mla: Wermke, Dominik, et al. “A Large Scale Investigation of Obfuscation Use in
    Google Play.” <i>Proceedings of the 34th Annual Computer Security Applications
    Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018</i>, ACM, 2018,
    pp. 222–235, doi:<a href="https://doi.org/10.1145/3274694.3274726">10.1145/3274694.3274726</a>.
  short: 'D. Wermke, N. Huaman, Y. Acar, B. Reaves, P. Traynor, S. Fahl, in: Proceedings
    of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San
    Juan, PR, USA, December 03-07, 2018, ACM, 2018, pp. 222–235.'
date_created: 2023-09-22T12:51:58Z
date_updated: 2024-06-05T13:20:17Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3274694.3274726
extern: '1'
language:
- iso: eng
page: 222–235
publication: Proceedings of the 34th Annual Computer Security Applications Conference,
  ACSAC 2018, San Juan, PR, USA, December 03-07, 2018
publisher: ACM
status: public
title: A Large Scale Investigation of Obfuscation Use in Google Play
type: conference
user_id: '14931'
year: '2018'
...
---
_id: '47249'
author:
- first_name: Erik
  full_name: Derr, Erik
  last_name: Derr
- first_name: Sven
  full_name: Bugiel, Sven
  last_name: Bugiel
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
citation:
  ama: 'Derr E, Bugiel S, Fahl S, Acar Y, Backes M. Keep me Updated: An Empirical
    Study of Third-Party Library Updatability on Android. In: <i>Proceedings of the
    2017 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017.
    doi:<a href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>'
  apa: 'Derr, E., Bugiel, S., Fahl, S., Acar, Y., &#38; Backes, M. (2017). Keep me
    Updated: An Empirical Study of Third-Party Library Updatability on Android. <i>Proceedings
    of the 2017 ACM SIGSAC Conference on Computer and Communications Security</i>.
    <a href="https://doi.org/10.1145/3133956.3134059">https://doi.org/10.1145/3133956.3134059</a>'
  bibtex: '@inproceedings{Derr_Bugiel_Fahl_Acar_Backes_2017, title={Keep me Updated:
    An Empirical Study of Third-Party Library Updatability on Android}, DOI={<a href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>},
    booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Derr, Erik and Bugiel, Sven and Fahl, Sascha
    and Acar, Yasemin and Backes, Michael}, year={2017} }'
  chicago: 'Derr, Erik, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes.
    “Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android.”
    In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security</i>. ACM, 2017. <a href="https://doi.org/10.1145/3133956.3134059">https://doi.org/10.1145/3133956.3134059</a>.'
  ieee: 'E. Derr, S. Bugiel, S. Fahl, Y. Acar, and M. Backes, “Keep me Updated: An
    Empirical Study of Third-Party Library Updatability on Android,” 2017, doi: <a
    href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>.'
  mla: 'Derr, Erik, et al. “Keep Me Updated: An Empirical Study of Third-Party Library
    Updatability on Android.” <i>Proceedings of the 2017 ACM SIGSAC Conference on
    Computer and Communications Security</i>, ACM, 2017, doi:<a href="https://doi.org/10.1145/3133956.3134059">10.1145/3133956.3134059</a>.'
  short: 'E. Derr, S. Bugiel, S. Fahl, Y. Acar, M. Backes, in: Proceedings of the
    2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017.'
date_created: 2023-09-22T12:50:32Z
date_updated: 2024-06-05T13:09:19Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3133956.3134059
extern: '1'
language:
- iso: eng
publication: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'Keep me Updated: An Empirical Study of Third-Party Library Updatability on
  Android'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47309'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
citation:
  ama: Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. How Internet Resources
    Might Be Helping You Develop Faster but Less Securely. <i>IEEE Secur Priv</i>.
    2017;15(2):50–60. doi:<a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>
  apa: Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C.
    (2017). How Internet Resources Might Be Helping You Develop Faster but Less Securely.
    <i>IEEE Secur. Priv.</i>, <i>15</i>(2), 50–60. <a href="https://doi.org/10.1109/MSP.2017.24">https://doi.org/10.1109/MSP.2017.24</a>
  bibtex: '@article{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2017, title={How Internet
    Resources Might Be Helping You Develop Faster but Less Securely}, volume={15},
    DOI={<a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>}, number={2},
    journal={IEEE Secur. Priv.}, author={Acar, Yasemin and Backes, Michael and Fahl,
    Sascha and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017},
    pages={50–60} }'
  chicago: 'Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek,
    and Christian Stransky. “How Internet Resources Might Be Helping You Develop Faster
    but Less Securely.” <i>IEEE Secur. Priv.</i> 15, no. 2 (2017): 50–60. <a href="https://doi.org/10.1109/MSP.2017.24">https://doi.org/10.1109/MSP.2017.24</a>.'
  ieee: 'Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “How
    Internet Resources Might Be Helping You Develop Faster but Less Securely,” <i>IEEE
    Secur. Priv.</i>, vol. 15, no. 2, pp. 50–60, 2017, doi: <a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>.'
  mla: Acar, Yasemin, et al. “How Internet Resources Might Be Helping You Develop
    Faster but Less Securely.” <i>IEEE Secur. Priv.</i>, vol. 15, no. 2, 2017, pp.
    50–60, doi:<a href="https://doi.org/10.1109/MSP.2017.24">10.1109/MSP.2017.24</a>.
  short: Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, IEEE Secur.
    Priv. 15 (2017) 50–60.
date_created: 2023-09-22T13:39:01Z
date_updated: 2024-06-05T13:09:42Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/MSP.2017.24
extern: '1'
intvolume: '        15'
issue: '2'
language:
- iso: eng
page: 50–60
publication: IEEE Secur. Priv.
status: public
title: How Internet Resources Might Be Helping You Develop Faster but Less Securely
type: journal_article
user_id: '14931'
volume: 15
year: '2017'
...
---
_id: '47245'
author:
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Duc Cuong
  full_name: Nguyen, Duc Cuong
  last_name: Nguyen
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Elissa M.
  full_name: Redmiles, Elissa M.
  last_name: Redmiles
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Simson L.
  full_name: Garfinkel, Simson L.
  last_name: Garfinkel
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Stransky C, Acar Y, Nguyen DC, et al. Lessons Learned from Using an Online
    Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software
    Developers. In: Fernandez JM, Payer M, eds. <i>10th USENIX Workshop on Cyber Security
    Experimentation and Test, CSET 2017, Vancouver, BC, Canada, August 14, 2017</i>.
    USENIX Association; 2017.'
  apa: Stransky, C., Acar, Y., Nguyen, D. C., Wermke, D., Kim, D., Redmiles, E. M.,
    Backes, M., Garfinkel, S. L., Mazurek, M. L., &#38; Fahl, S. (2017). Lessons Learned
    from Using an Online Platform to Conduct Large-Scale, Online Controlled Security
    Experiments with Software Developers. In J. M. Fernandez &#38; M. Payer (Eds.),
    <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017,
    Vancouver, BC, Canada, August 14, 2017</i>. USENIX Association.
  bibtex: '@inproceedings{Stransky_Acar_Nguyen_Wermke_Kim_Redmiles_Backes_Garfinkel_Mazurek_Fahl_2017,
    title={Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online
    Controlled Security Experiments with Software Developers}, booktitle={10th USENIX
    Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC,
    Canada, August 14, 2017}, publisher={USENIX Association}, author={Stransky, Christian
    and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Kim, Doowon and
    Redmiles, Elissa M. and Backes, Michael and Garfinkel, Simson L. and Mazurek,
    Michelle L. and Fahl, Sascha}, editor={Fernandez, José M. and Payer, Mathias},
    year={2017} }'
  chicago: Stransky, Christian, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon
    Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek,
    and Sascha Fahl. “Lessons Learned from Using an Online Platform to Conduct Large-Scale,
    Online Controlled Security Experiments with Software Developers.” In <i>10th USENIX
    Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver, BC,
    Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias Payer. USENIX
    Association, 2017.
  ieee: C. Stransky <i>et al.</i>, “Lessons Learned from Using an Online Platform
    to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers,”
    in <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017,
    Vancouver, BC, Canada, August 14, 2017</i>, 2017.
  mla: Stransky, Christian, et al. “Lessons Learned from Using an Online Platform
    to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.”
    <i>10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017,
    Vancouver, BC, Canada, August 14, 2017</i>, edited by José M. Fernandez and Mathias
    Payer, USENIX Association, 2017.
  short: 'C. Stransky, Y. Acar, D.C. Nguyen, D. Wermke, D. Kim, E.M. Redmiles, M.
    Backes, S.L. Garfinkel, M.L. Mazurek, S. Fahl, in: J.M. Fernandez, M. Payer (Eds.),
    10th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017, Vancouver,
    BC, Canada, August 14, 2017, USENIX Association, 2017.'
date_created: 2023-09-22T12:47:30Z
date_updated: 2024-06-05T13:12:04Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: José M.
  full_name: Fernandez, José M.
  last_name: Fernandez
- first_name: Mathias
  full_name: Payer, Mathias
  last_name: Payer
extern: '1'
language:
- iso: eng
publication: 10th USENIX Workshop on Cyber Security Experimentation and Test, CSET
  2017, Vancouver, BC, Canada, August 14, 2017
publisher: USENIX Association
status: public
title: Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online
  Controlled Security Experiments with Software Developers
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47243'
author:
- first_name: Felix
  full_name: Fischer, Felix
  last_name: Fischer
- first_name: Konstantin
  full_name: Böttinger, Konstantin
  last_name: Böttinger
- first_name: Huang
  full_name: Xiao, Huang
  last_name: Xiao
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Fischer F, Böttinger K, Xiao H, et al. Stack Overflow Considered Harmful?
    The Impact of Copy&#38;Paste on Android Application Security. In: <i>2017 IEEE
    Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>.
    IEEE Computer Society; 2017:121–136. doi:<a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>'
  apa: Fischer, F., Böttinger, K., Xiao, H., Stransky, C., Acar, Y., Backes, M., &#38;
    Fahl, S. (2017). Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste
    on Android Application Security. <i>2017 IEEE Symposium on Security and Privacy,
    SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136. <a href="https://doi.org/10.1109/SP.2017.31">https://doi.org/10.1109/SP.2017.31</a>
  bibtex: '@inproceedings{Fischer_Böttinger_Xiao_Stransky_Acar_Backes_Fahl_2017, title={Stack
    Overflow Considered Harmful? The Impact of Copy&#38;Paste on Android Application
    Security}, DOI={<a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>},
    booktitle={2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA,
    USA, May 22-26, 2017}, publisher={IEEE Computer Society}, author={Fischer, Felix
    and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin
    and Backes, Michael and Fahl, Sascha}, year={2017}, pages={121–136} }'
  chicago: Fischer, Felix, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin
    Acar, Michael Backes, and Sascha Fahl. “Stack Overflow Considered Harmful? The
    Impact of Copy&#38;Paste on Android Application Security.” In <i>2017 IEEE Symposium
    on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 121–136.
    IEEE Computer Society, 2017. <a href="https://doi.org/10.1109/SP.2017.31">https://doi.org/10.1109/SP.2017.31</a>.
  ieee: 'F. Fischer <i>et al.</i>, “Stack Overflow Considered Harmful? The Impact
    of Copy&#38;Paste on Android Application Security,” in <i>2017 IEEE Symposium
    on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, 2017,
    pp. 121–136, doi: <a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>.'
  mla: Fischer, Felix, et al. “Stack Overflow Considered Harmful? The Impact of Copy&#38;Paste
    on Android Application Security.” <i>2017 IEEE Symposium on Security and Privacy,
    SP 2017, San Jose, CA, USA, May 22-26, 2017</i>, IEEE Computer Society, 2017,
    pp. 121–136, doi:<a href="https://doi.org/10.1109/SP.2017.31">10.1109/SP.2017.31</a>.
  short: 'F. Fischer, K. Böttinger, H. Xiao, C. Stransky, Y. Acar, M. Backes, S. Fahl,
    in: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May
    22-26, 2017, IEEE Computer Society, 2017, pp. 121–136.'
date_created: 2023-09-22T12:43:27Z
date_updated: 2024-06-05T13:12:27Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/SP.2017.31
extern: '1'
language:
- iso: eng
page: 121–136
publication: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA,
  May 22-26, 2017
publisher: IEEE Computer Society
status: public
title: Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application
  Security
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47250'
author:
- first_name: Duc Cuong
  full_name: Nguyen, Duc Cuong
  last_name: Nguyen
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Charles
  full_name: Weir, Charles
  last_name: Weir
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Nguyen DC, Wermke D, Acar Y, Backes M, Weir C, Fahl S. A Stitch in Time: Supporting
    Android Developers in Writing Secure Code. In: <i>Proceedings of the 2017 ACM
    SIGSAC Conference on Computer and Communications Security</i>. ACM; 2017. doi:<a
    href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>'
  apa: 'Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., &#38; Fahl, S.
    (2017). A Stitch in Time: Supporting Android Developers in Writing Secure Code.
    <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security</i>. <a href="https://doi.org/10.1145/3133956.3133977">https://doi.org/10.1145/3133956.3133977</a>'
  bibtex: '@inproceedings{Nguyen_Wermke_Acar_Backes_Weir_Fahl_2017, title={A Stitch
    in Time: Supporting Android Developers in Writing Secure Code}, DOI={<a href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>},
    booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Nguyen, Duc Cuong and Wermke, Dominik and
    Acar, Yasemin and Backes, Michael and Weir, Charles and Fahl, Sascha}, year={2017}
    }'
  chicago: 'Nguyen, Duc Cuong, Dominik Wermke, Yasemin Acar, Michael Backes, Charles
    Weir, and Sascha Fahl. “A Stitch in Time: Supporting Android Developers in Writing
    Secure Code.” In <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer
    and Communications Security</i>. ACM, 2017. <a href="https://doi.org/10.1145/3133956.3133977">https://doi.org/10.1145/3133956.3133977</a>.'
  ieee: 'D. C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, and S. Fahl, “A Stitch
    in Time: Supporting Android Developers in Writing Secure Code,” 2017, doi: <a
    href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>.'
  mla: 'Nguyen, Duc Cuong, et al. “A Stitch in Time: Supporting Android Developers
    in Writing Secure Code.” <i>Proceedings of the 2017 ACM SIGSAC Conference on Computer
    and Communications Security</i>, ACM, 2017, doi:<a href="https://doi.org/10.1145/3133956.3133977">10.1145/3133956.3133977</a>.'
  short: 'D.C. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir, S. Fahl, in: Proceedings
    of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM,
    2017.'
date_created: 2023-09-22T12:50:51Z
date_updated: 2024-06-05T13:12:56Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/3133956.3133977
extern: '1'
language:
- iso: eng
publication: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'A Stitch in Time: Supporting Android Developers in Writing Secure Code'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47248'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Charles
  full_name: Weir, Charles
  last_name: Weir
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Acar Y, Stransky C, Wermke D, Weir C, Mazurek ML, Fahl S. Developers Need
    Support, Too: A Survey of Security Advice for Software Developers. In: <i>2017
    IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>'
  apa: 'Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M. L., &#38; Fahl,
    S. (2017). Developers Need Support, Too: A Survey of Security Advice for Software
    Developers. <i>2017 IEEE Cybersecurity Development (SecDev)</i>. <a href="https://doi.org/10.1109/secdev.2017.17">https://doi.org/10.1109/secdev.2017.17</a>'
  bibtex: '@inproceedings{Acar_Stransky_Wermke_Weir_Mazurek_Fahl_2017, title={Developers
    Need Support, Too: A Survey of Security Advice for Software Developers}, DOI={<a
    href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>}, booktitle={2017
    IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar, Yasemin
    and Stransky, Christian and Wermke, Dominik and Weir, Charles and Mazurek, Michelle
    L. and Fahl, Sascha}, year={2017} }'
  chicago: 'Acar, Yasemin, Christian Stransky, Dominik Wermke, Charles Weir, Michelle
    L. Mazurek, and Sascha Fahl. “Developers Need Support, Too: A Survey of Security
    Advice for Software Developers.” In <i>2017 IEEE Cybersecurity Development (SecDev)</i>.
    IEEE, 2017. <a href="https://doi.org/10.1109/secdev.2017.17">https://doi.org/10.1109/secdev.2017.17</a>.'
  ieee: 'Y. Acar, C. Stransky, D. Wermke, C. Weir, M. L. Mazurek, and S. Fahl, “Developers
    Need Support, Too: A Survey of Security Advice for Software Developers,” 2017,
    doi: <a href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>.'
  mla: 'Acar, Yasemin, et al. “Developers Need Support, Too: A Survey of Security
    Advice for Software Developers.” <i>2017 IEEE Cybersecurity Development (SecDev)</i>,
    IEEE, 2017, doi:<a href="https://doi.org/10.1109/secdev.2017.17">10.1109/secdev.2017.17</a>.'
  short: 'Y. Acar, C. Stransky, D. Wermke, C. Weir, M.L. Mazurek, S. Fahl, in: 2017
    IEEE Cybersecurity Development (SecDev), IEEE, 2017.'
date_created: 2023-09-22T12:50:12Z
date_updated: 2024-06-05T13:11:41Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/secdev.2017.17
extern: '1'
language:
- iso: eng
publication: 2017 IEEE Cybersecurity Development (SecDev)
publication_status: published
publisher: IEEE
status: public
title: 'Developers Need Support, Too: A Survey of Security Advice for Software Developers'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47242'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
citation:
  ama: 'Acar Y, Fahl S, Mazurek ML. You are Not Your Developer, Either: A Research
    Agenda for Usable Security and Privacy Research Beyond End Users. In: <i>2016
    IEEE Cybersecurity Development (SecDev)</i>. IEEE; 2017. doi:<a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>'
  apa: 'Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). You are Not Your Developer,
    Either: A Research Agenda for Usable Security and Privacy Research Beyond End
    Users. <i>2016 IEEE Cybersecurity Development (SecDev)</i>. <a href="https://doi.org/10.1109/secdev.2016.013">https://doi.org/10.1109/secdev.2016.013</a>'
  bibtex: '@inproceedings{Acar_Fahl_Mazurek_2017, title={You are Not Your Developer,
    Either: A Research Agenda for Usable Security and Privacy Research Beyond End
    Users}, DOI={<a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>},
    booktitle={2016 IEEE Cybersecurity Development (SecDev)}, publisher={IEEE}, author={Acar,
    Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017} }'
  chicago: 'Acar, Yasemin, Sascha Fahl, and Michelle L. Mazurek. “You Are Not Your
    Developer, Either: A Research Agenda for Usable Security and Privacy Research
    Beyond End Users.” In <i>2016 IEEE Cybersecurity Development (SecDev)</i>. IEEE,
    2017. <a href="https://doi.org/10.1109/secdev.2016.013">https://doi.org/10.1109/secdev.2016.013</a>.'
  ieee: 'Y. Acar, S. Fahl, and M. L. Mazurek, “You are Not Your Developer, Either:
    A Research Agenda for Usable Security and Privacy Research Beyond End Users,”
    2017, doi: <a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>.'
  mla: 'Acar, Yasemin, et al. “You Are Not Your Developer, Either: A Research Agenda
    for Usable Security and Privacy Research Beyond End Users.” <i>2016 IEEE Cybersecurity
    Development (SecDev)</i>, IEEE, 2017, doi:<a href="https://doi.org/10.1109/secdev.2016.013">10.1109/secdev.2016.013</a>.'
  short: 'Y. Acar, S. Fahl, M.L. Mazurek, in: 2016 IEEE Cybersecurity Development
    (SecDev), IEEE, 2017.'
date_created: 2023-09-22T12:42:23Z
date_updated: 2024-06-05T13:13:34Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/secdev.2016.013
extern: '1'
language:
- iso: eng
publication: 2016 IEEE Cybersecurity Development (SecDev)
publication_status: published
publisher: IEEE
status: public
title: 'You are Not Your Developer, Either: A Research Agenda for Usable Security
  and Privacy Research Beyond End Users'
type: conference
user_id: '14931'
year: '2017'
...
