---
_id: '47246'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Simson
  full_name: Garfinkel, Simson
  last_name: Garfinkel
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
citation:
  ama: 'Acar Y, Backes M, Fahl S, et al. Comparing the Usability of Cryptographic
    APIs. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017.
    doi:<a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>'
  apa: Acar, Y., Backes, M., Fahl, S., Garfinkel, S., Kim, D., Mazurek, M. L., &#38;
    Stransky, C. (2017). Comparing the Usability of Cryptographic APIs. <i>2017 IEEE
    Symposium on Security and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp.2017.52">https://doi.org/10.1109/sp.2017.52</a>
  bibtex: '@inproceedings{Acar_Backes_Fahl_Garfinkel_Kim_Mazurek_Stransky_2017, title={Comparing
    the Usability of Cryptographic APIs}, DOI={<a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>},
    booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE},
    author={Acar, Yasemin and Backes, Michael and Fahl, Sascha and Garfinkel, Simson
    and Kim, Doowon and Mazurek, Michelle L. and Stransky, Christian}, year={2017}
    }'
  chicago: Acar, Yasemin, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim,
    Michelle L. Mazurek, and Christian Stransky. “Comparing the Usability of Cryptographic
    APIs.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017.
    <a href="https://doi.org/10.1109/sp.2017.52">https://doi.org/10.1109/sp.2017.52</a>.
  ieee: 'Y. Acar <i>et al.</i>, “Comparing the Usability of Cryptographic APIs,” 2017,
    doi: <a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>.'
  mla: Acar, Yasemin, et al. “Comparing the Usability of Cryptographic APIs.” <i>2017
    IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href="https://doi.org/10.1109/sp.2017.52">10.1109/sp.2017.52</a>.
  short: 'Y. Acar, M. Backes, S. Fahl, S. Garfinkel, D. Kim, M.L. Mazurek, C. Stransky,
    in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017.'
date_created: 2023-09-22T12:48:37Z
date_updated: 2024-06-05T13:14:03Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/sp.2017.52
extern: '1'
language:
- iso: eng
publication: 2017 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: Comparing the Usability of Cryptographic APIs
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47244'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
- first_name: Dominik
  full_name: Wermke, Dominik
  last_name: Wermke
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Acar Y, Stransky C, Wermke D, Mazurek ML, Fahl S. Security Developer Studies
    with GitHub Users: Exploring a Convenience Sample. In: <i>Thirteenth Symposium
    on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14,
    2017</i>. USENIX Association; 2017:81–95.'
  apa: 'Acar, Y., Stransky, C., Wermke, D., Mazurek, M. L., &#38; Fahl, S. (2017).
    Security Developer Studies with GitHub Users: Exploring a Convenience Sample.
    <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara,
    CA, USA, July 12-14, 2017</i>, 81–95.'
  bibtex: '@inproceedings{Acar_Stransky_Wermke_Mazurek_Fahl_2017, title={Security
    Developer Studies with GitHub Users: Exploring a Convenience Sample}, booktitle={Thirteenth
    Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July
    12-14, 2017}, publisher={USENIX Association}, author={Acar, Yasemin and Stransky,
    Christian and Wermke, Dominik and Mazurek, Michelle L. and Fahl, Sascha}, year={2017},
    pages={81–95} }'
  chicago: 'Acar, Yasemin, Christian Stransky, Dominik Wermke, Michelle L. Mazurek,
    and Sascha Fahl. “Security Developer Studies with GitHub Users: Exploring a Convenience
    Sample.” In <i>Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017,
    Santa Clara, CA, USA, July 12-14, 2017</i>, 81–95. USENIX Association, 2017.'
  ieee: 'Y. Acar, C. Stransky, D. Wermke, M. L. Mazurek, and S. Fahl, “Security Developer
    Studies with GitHub Users: Exploring a Convenience Sample,” in <i>Thirteenth Symposium
    on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14,
    2017</i>, 2017, pp. 81–95.'
  mla: 'Acar, Yasemin, et al. “Security Developer Studies with GitHub Users: Exploring
    a Convenience Sample.” <i>Thirteenth Symposium on Usable Privacy and Security,
    SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017</i>, USENIX Association, 2017,
    pp. 81–95.'
  short: 'Y. Acar, C. Stransky, D. Wermke, M.L. Mazurek, S. Fahl, in: Thirteenth Symposium
    on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14,
    2017, USENIX Association, 2017, pp. 81–95.'
date_created: 2023-09-22T12:45:33Z
date_updated: 2024-06-05T13:14:32Z
department:
- _id: '34'
- _id: '858'
extern: '1'
language:
- iso: eng
page: 81–95
publication: Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa
  Clara, CA, USA, July 12-14, 2017
publisher: USENIX Association
status: public
title: 'Security Developer Studies with GitHub Users: Exploring a Convenience Sample'
type: conference
user_id: '14931'
year: '2017'
...
---
_id: '47873'
author:
- first_name: Elissa M.
  full_name: Redmiles, Elissa M.
  last_name: Redmiles
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
citation:
  ama: Redmiles EM, Acar Y, Fahl S, Mazurek ML. <i>A Summary of Survey Methodology
    Best Practices for Security and Privacy Researchers</i>. University of Maryland
    Computer Science Department; 2017. doi:<a href="https://doi.org/10.13016/M22K2W">10.13016/M22K2W</a>
  apa: Redmiles, E. M., Acar, Y., Fahl, S., &#38; Mazurek, M. L. (2017). <i>A Summary
    of Survey Methodology Best Practices for Security and Privacy Researchers</i>.
    University of Maryland Computer Science Department. <a href="https://doi.org/10.13016/M22K2W">https://doi.org/10.13016/M22K2W</a>
  bibtex: '@book{Redmiles_Acar_Fahl_Mazurek_2017, title={A Summary of Survey Methodology
    Best Practices for Security and Privacy Researchers}, DOI={<a href="https://doi.org/10.13016/M22K2W">10.13016/M22K2W</a>},
    publisher={University of Maryland Computer Science Department}, author={Redmiles,
    Elissa M. and Acar, Yasemin and Fahl, Sascha and Mazurek, Michelle L.}, year={2017}
    }'
  chicago: Redmiles, Elissa M., Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek.
    <i>A Summary of Survey Methodology Best Practices for Security and Privacy Researchers</i>.
    University of Maryland Computer Science Department, 2017. <a href="https://doi.org/10.13016/M22K2W">https://doi.org/10.13016/M22K2W</a>.
  ieee: E. M. Redmiles, Y. Acar, S. Fahl, and M. L. Mazurek, <i>A Summary of Survey
    Methodology Best Practices for Security and Privacy Researchers</i>. University
    of Maryland Computer Science Department, 2017.
  mla: Redmiles, Elissa M., et al. <i>A Summary of Survey Methodology Best Practices
    for Security and Privacy Researchers</i>. University of Maryland Computer Science
    Department, 2017, doi:<a href="https://doi.org/10.13016/M22K2W">10.13016/M22K2W</a>.
  short: E.M. Redmiles, Y. Acar, S. Fahl, M.L. Mazurek, A Summary of Survey Methodology
    Best Practices for Security and Privacy Researchers, University of Maryland Computer
    Science Department, 2017.
date_created: 2023-10-09T13:16:14Z
date_updated: 2024-06-05T13:10:02Z
department:
- _id: '34'
- _id: '858'
doi: 10.13016/M22K2W
extern: '1'
language:
- iso: eng
publisher: University of Maryland Computer Science Department
status: public
title: A Summary of Survey Methodology Best Practices for Security and Privacy Researchers
type: report
user_id: '14931'
year: '2017'
...
---
_id: '47240'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sven
  full_name: Bugiel, Sven
  last_name: Bugiel
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Patrick
  full_name: McDaniel, Patrick
  last_name: McDaniel
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
citation:
  ama: 'Acar Y, Backes M, Bugiel S, Fahl S, McDaniel P, Smith M. SoK: Lessons Learned
    from Android Security Research for Appified Software Platforms. In: <i>2016 IEEE
    Symposium on Security and Privacy (SP)</i>. IEEE; 2016. doi:<a href="https://doi.org/10.1109/sp.2016.33">10.1109/sp.2016.33</a>'
  apa: 'Acar, Y., Backes, M., Bugiel, S., Fahl, S., McDaniel, P., &#38; Smith, M.
    (2016). SoK: Lessons Learned from Android Security Research for Appified Software
    Platforms. <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp.2016.33">https://doi.org/10.1109/sp.2016.33</a>'
  bibtex: '@inproceedings{Acar_Backes_Bugiel_Fahl_McDaniel_Smith_2016, title={SoK:
    Lessons Learned from Android Security Research for Appified Software Platforms},
    DOI={<a href="https://doi.org/10.1109/sp.2016.33">10.1109/sp.2016.33</a>}, booktitle={2016
    IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar,
    Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick
    and Smith, Matthew}, year={2016} }'
  chicago: 'Acar, Yasemin, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick McDaniel,
    and Matthew Smith. “SoK: Lessons Learned from Android Security Research for Appified
    Software Platforms.” In <i>2016 IEEE Symposium on Security and Privacy (SP)</i>.
    IEEE, 2016. <a href="https://doi.org/10.1109/sp.2016.33">https://doi.org/10.1109/sp.2016.33</a>.'
  ieee: 'Y. Acar, M. Backes, S. Bugiel, S. Fahl, P. McDaniel, and M. Smith, “SoK:
    Lessons Learned from Android Security Research for Appified Software Platforms,”
    2016, doi: <a href="https://doi.org/10.1109/sp.2016.33">10.1109/sp.2016.33</a>.'
  mla: 'Acar, Yasemin, et al. “SoK: Lessons Learned from Android Security Research
    for Appified Software Platforms.” <i>2016 IEEE Symposium on Security and Privacy
    (SP)</i>, IEEE, 2016, doi:<a href="https://doi.org/10.1109/sp.2016.33">10.1109/sp.2016.33</a>.'
  short: 'Y. Acar, M. Backes, S. Bugiel, S. Fahl, P. McDaniel, M. Smith, in: 2016
    IEEE Symposium on Security and Privacy (SP), IEEE, 2016.'
date_created: 2023-09-22T12:41:43Z
date_updated: 2024-06-05T13:14:55Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/sp.2016.33
extern: '1'
language:
- iso: eng
publication: 2016 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'SoK: Lessons Learned from Android Security Research for Appified Software
  Platforms'
type: conference
user_id: '14931'
year: '2016'
...
---
_id: '47239'
author:
- first_name: Sergej
  full_name: Dechand, Sergej
  last_name: Dechand
- first_name: Dominik
  full_name: Schürmann, Dominik
  last_name: Schürmann
- first_name: Karoline
  full_name: Busse, Karoline
  last_name: Busse
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
citation:
  ama: 'Dechand S, Schürmann D, Busse K, Acar Y, Fahl S, Smith M. An Empirical Study
    of Textual Key-Fingerprint Representations. In: Holz T, Savage S, eds. <i>25th
    USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12,
    2016</i>. USENIX Association; 2016:193–208.'
  apa: Dechand, S., Schürmann, D., Busse, K., Acar, Y., Fahl, S., &#38; Smith, M.
    (2016). An Empirical Study of Textual Key-Fingerprint Representations. In T. Holz
    &#38; S. Savage (Eds.), <i>25th USENIX Security Symposium, USENIX Security 16,
    Austin, TX, USA, August 10-12, 2016</i> (pp. 193–208). USENIX Association.
  bibtex: '@inproceedings{Dechand_Schürmann_Busse_Acar_Fahl_Smith_2016, title={An
    Empirical Study of Textual Key-Fingerprint Representations}, booktitle={25th USENIX
    Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016},
    publisher={USENIX Association}, author={Dechand, Sergej and Schürmann, Dominik
    and Busse, Karoline and Acar, Yasemin and Fahl, Sascha and Smith, Matthew}, editor={Holz,
    Thorsten and Savage, Stefan}, year={2016}, pages={193–208} }'
  chicago: Dechand, Sergej, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha
    Fahl, and Matthew Smith. “An Empirical Study of Textual Key-Fingerprint Representations.”
    In <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August
    10-12, 2016</i>, edited by Thorsten Holz and Stefan Savage, 193–208. USENIX Association,
    2016.
  ieee: S. Dechand, D. Schürmann, K. Busse, Y. Acar, S. Fahl, and M. Smith, “An Empirical
    Study of Textual Key-Fingerprint Representations,” in <i>25th USENIX Security
    Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016</i>, 2016,
    pp. 193–208.
  mla: Dechand, Sergej, et al. “An Empirical Study of Textual Key-Fingerprint Representations.”
    <i>25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August
    10-12, 2016</i>, edited by Thorsten Holz and Stefan Savage, USENIX Association,
    2016, pp. 193–208.
  short: 'S. Dechand, D. Schürmann, K. Busse, Y. Acar, S. Fahl, M. Smith, in: T. Holz,
    S. Savage (Eds.), 25th USENIX Security Symposium, USENIX Security 16, Austin,
    TX, USA, August 10-12, 2016, USENIX Association, 2016, pp. 193–208.'
date_created: 2023-09-22T12:40:35Z
date_updated: 2024-06-05T13:15:58Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Thorsten
  full_name: Holz, Thorsten
  last_name: Holz
- first_name: Stefan
  full_name: Savage, Stefan
  last_name: Savage
extern: '1'
language:
- iso: eng
page: 193–208
publication: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA,
  August 10-12, 2016
publisher: USENIX Association
status: public
title: An Empirical Study of Textual Key-Fingerprint Representations
type: conference
user_id: '14931'
year: '2016'
...
---
_id: '47241'
author:
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Michael
  full_name: Backes, Michael
  last_name: Backes
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Doowon
  full_name: Kim, Doowon
  last_name: Kim
- first_name: Michelle L.
  full_name: Mazurek, Michelle L.
  last_name: Mazurek
- first_name: Christian
  full_name: Stransky, Christian
  last_name: Stransky
citation:
  ama: 'Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. You Get Where You’re
    Looking for: The Impact of Information Sources on Code Security. In: <i>2016 IEEE
    Symposium on Security and Privacy (SP)</i>. IEEE; 2016. doi:<a href="https://doi.org/10.1109/sp.2016.25">10.1109/sp.2016.25</a>'
  apa: 'Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., &#38; Stransky, C.
    (2016). You Get Where You’re Looking for: The Impact of Information Sources on
    Code Security. <i>2016 IEEE Symposium on Security and Privacy (SP)</i>. <a href="https://doi.org/10.1109/sp.2016.25">https://doi.org/10.1109/sp.2016.25</a>'
  bibtex: '@inproceedings{Acar_Backes_Fahl_Kim_Mazurek_Stransky_2016, title={You Get
    Where You’re Looking for: The Impact of Information Sources on Code Security},
    DOI={<a href="https://doi.org/10.1109/sp.2016.25">10.1109/sp.2016.25</a>}, booktitle={2016
    IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Acar,
    Yasemin and Backes, Michael and Fahl, Sascha and Kim, Doowon and Mazurek, Michelle
    L. and Stransky, Christian}, year={2016} }'
  chicago: 'Acar, Yasemin, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek,
    and Christian Stransky. “You Get Where You’re Looking for: The Impact of Information
    Sources on Code Security.” In <i>2016 IEEE Symposium on Security and Privacy (SP)</i>.
    IEEE, 2016. <a href="https://doi.org/10.1109/sp.2016.25">https://doi.org/10.1109/sp.2016.25</a>.'
  ieee: 'Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek, and C. Stransky, “You
    Get Where You’re Looking for: The Impact of Information Sources on Code Security,”
    2016, doi: <a href="https://doi.org/10.1109/sp.2016.25">10.1109/sp.2016.25</a>.'
  mla: 'Acar, Yasemin, et al. “You Get Where You’re Looking for: The Impact of Information
    Sources on Code Security.” <i>2016 IEEE Symposium on Security and Privacy (SP)</i>,
    IEEE, 2016, doi:<a href="https://doi.org/10.1109/sp.2016.25">10.1109/sp.2016.25</a>.'
  short: 'Y. Acar, M. Backes, S. Fahl, D. Kim, M.L. Mazurek, C. Stransky, in: 2016
    IEEE Symposium on Security and Privacy (SP), IEEE, 2016.'
date_created: 2023-09-22T12:42:01Z
date_updated: 2024-06-05T13:15:19Z
department:
- _id: '34'
- _id: '858'
doi: 10.1109/sp.2016.25
extern: '1'
language:
- iso: eng
publication: 2016 IEEE Symposium on Security and Privacy (SP)
publication_status: published
publisher: IEEE
status: public
title: 'You Get Where You''re Looking for: The Impact of Information Sources on Code
  Security'
type: conference
user_id: '14931'
year: '2016'
...
---
_id: '47233'
author:
- first_name: Henning
  full_name: Perl, Henning
  last_name: Perl
- first_name: Sergej
  full_name: Dechand, Sergej
  last_name: Dechand
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
- first_name: Daniel
  full_name: Arp, Daniel
  last_name: Arp
- first_name: Fabian
  full_name: Yamaguchi, Fabian
  last_name: Yamaguchi
- first_name: Konrad
  full_name: Rieck, Konrad
  last_name: Rieck
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
citation:
  ama: 'Perl H, Dechand S, Smith M, et al. VCCFinder: Finding Potential Vulnerabilities
    in Open-Source Projects to Assist Code Audits. In: <i>Proceedings of the 22nd
    ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2015.
    doi:<a href="https://doi.org/10.1145/2810103.2813604">10.1145/2810103.2813604</a>'
  apa: 'Perl, H., Dechand, S., Smith, M., Arp, D., Yamaguchi, F., Rieck, K., Fahl,
    S., &#38; Acar, Y. (2015). VCCFinder: Finding Potential Vulnerabilities in Open-Source
    Projects to Assist Code Audits. <i>Proceedings of the 22nd ACM SIGSAC Conference
    on Computer and Communications Security</i>. <a href="https://doi.org/10.1145/2810103.2813604">https://doi.org/10.1145/2810103.2813604</a>'
  bibtex: '@inproceedings{Perl_Dechand_Smith_Arp_Yamaguchi_Rieck_Fahl_Acar_2015, title={VCCFinder:
    Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits},
    DOI={<a href="https://doi.org/10.1145/2810103.2813604">10.1145/2810103.2813604</a>},
    booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
    Security}, publisher={ACM}, author={Perl, Henning and Dechand, Sergej and Smith,
    Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha
    and Acar, Yasemin}, year={2015} }'
  chicago: 'Perl, Henning, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi,
    Konrad Rieck, Sascha Fahl, and Yasemin Acar. “VCCFinder: Finding Potential Vulnerabilities
    in Open-Source Projects to Assist Code Audits.” In <i>Proceedings of the 22nd
    ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2015.
    <a href="https://doi.org/10.1145/2810103.2813604">https://doi.org/10.1145/2810103.2813604</a>.'
  ieee: 'H. Perl <i>et al.</i>, “VCCFinder: Finding Potential Vulnerabilities in Open-Source
    Projects to Assist Code Audits,” 2015, doi: <a href="https://doi.org/10.1145/2810103.2813604">10.1145/2810103.2813604</a>.'
  mla: 'Perl, Henning, et al. “VCCFinder: Finding Potential Vulnerabilities in Open-Source
    Projects to Assist Code Audits.” <i>Proceedings of the 22nd ACM SIGSAC Conference
    on Computer and Communications Security</i>, ACM, 2015, doi:<a href="https://doi.org/10.1145/2810103.2813604">10.1145/2810103.2813604</a>.'
  short: 'H. Perl, S. Dechand, M. Smith, D. Arp, F. Yamaguchi, K. Rieck, S. Fahl,
    Y. Acar, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
    Security, ACM, 2015.'
date_created: 2023-09-22T12:03:10Z
date_updated: 2024-06-05T13:16:23Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/2810103.2813604
extern: '1'
language:
- iso: eng
publication: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
  Security
publication_status: published
publisher: ACM
status: public
title: 'VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist
  Code Audits'
type: conference
user_id: '14931'
year: '2015'
...
---
_id: '47232'
author:
- first_name: Marten
  full_name: Oltrogge, Marten
  last_name: Oltrogge
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Sergej
  full_name: Dechand, Sergej
  last_name: Dechand
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
citation:
  ama: 'Oltrogge M, Acar Y, Dechand S, Smith M, Fahl S. To Pin or Not to Pin-Helping
    App Developers Bullet Proof Their TLS Connections. In: Jung J, Holz T, eds. <i>24th
    USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14,
    2015</i>. USENIX Association; 2015:239–254.'
  apa: Oltrogge, M., Acar, Y., Dechand, S., Smith, M., &#38; Fahl, S. (2015). To Pin
    or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In J.
    Jung &#38; T. Holz (Eds.), <i>24th USENIX Security Symposium, USENIX Security
    15, Washington, D.C., USA, August 12-14, 2015</i> (pp. 239–254). USENIX Association.
  bibtex: '@inproceedings{Oltrogge_Acar_Dechand_Smith_Fahl_2015, title={To Pin or
    Not to Pin-Helping App Developers Bullet Proof Their TLS Connections}, booktitle={24th
    USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14,
    2015}, publisher={USENIX Association}, author={Oltrogge, Marten and Acar, Yasemin
    and Dechand, Sergej and Smith, Matthew and Fahl, Sascha}, editor={Jung, Jaeyeon
    and Holz, Thorsten}, year={2015}, pages={239–254} }'
  chicago: Oltrogge, Marten, Yasemin Acar, Sergej Dechand, Matthew Smith, and Sascha
    Fahl. “To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections.”
    In <i>24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA,
    August 12-14, 2015</i>, edited by Jaeyeon Jung and Thorsten Holz, 239–254. USENIX
    Association, 2015.
  ieee: M. Oltrogge, Y. Acar, S. Dechand, M. Smith, and S. Fahl, “To Pin or Not to
    Pin-Helping App Developers Bullet Proof Their TLS Connections,” in <i>24th USENIX
    Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015</i>,
    2015, pp. 239–254.
  mla: Oltrogge, Marten, et al. “To Pin or Not to Pin-Helping App Developers Bullet
    Proof Their TLS Connections.” <i>24th USENIX Security Symposium, USENIX Security
    15, Washington, D.C., USA, August 12-14, 2015</i>, edited by Jaeyeon Jung and
    Thorsten Holz, USENIX Association, 2015, pp. 239–254.
  short: 'M. Oltrogge, Y. Acar, S. Dechand, M. Smith, S. Fahl, in: J. Jung, T. Holz
    (Eds.), 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C.,
    USA, August 12-14, 2015, USENIX Association, 2015, pp. 239–254.'
date_created: 2023-09-22T12:01:30Z
date_updated: 2024-06-05T13:16:45Z
department:
- _id: '34'
- _id: '858'
editor:
- first_name: Jaeyeon
  full_name: Jung, Jaeyeon
  last_name: Jung
- first_name: Thorsten
  full_name: Holz, Thorsten
  last_name: Holz
extern: '1'
language:
- iso: eng
page: 239–254
publication: 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C.,
  USA, August 12-14, 2015
publisher: USENIX Association
status: public
title: To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections
type: conference
user_id: '14931'
year: '2015'
...
---
_id: '47162'
alternative_title:
- a study on the root causes of SSL misconfigurations
author:
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Henning
  full_name: Perl, Henning
  last_name: Perl
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
citation:
  ama: 'Fahl S, Acar Y, Perl H, Smith M. Why eve and mallory (also) love webmasters.
    In: <i>Proceedings of the 9th ACM Symposium on Information, Computer and Communications
    Security</i>. ACM; 2014. doi:<a href="https://doi.org/10.1145/2590296.2590341">10.1145/2590296.2590341</a>'
  apa: Fahl, S., Acar, Y., Perl, H., &#38; Smith, M. (2014). Why eve and mallory (also)
    love webmasters. <i>Proceedings of the 9th ACM Symposium on Information, Computer
    and Communications Security</i>. <a href="https://doi.org/10.1145/2590296.2590341">https://doi.org/10.1145/2590296.2590341</a>
  bibtex: '@inproceedings{Fahl_Acar_Perl_Smith_2014, title={Why eve and mallory (also)
    love webmasters}, DOI={<a href="https://doi.org/10.1145/2590296.2590341">10.1145/2590296.2590341</a>},
    booktitle={Proceedings of the 9th ACM symposium on Information, computer and communications
    security}, publisher={ACM}, author={Fahl, Sascha and Acar, Yasemin and Perl, Henning
    and Smith, Matthew}, year={2014} }'
  chicago: Fahl, Sascha, Yasemin Acar, Henning Perl, and Matthew Smith. “Why Eve and
    Mallory (Also) Love Webmasters.” In <i>Proceedings of the 9th ACM Symposium on
    Information, Computer and Communications Security</i>. ACM, 2014. <a href="https://doi.org/10.1145/2590296.2590341">https://doi.org/10.1145/2590296.2590341</a>.
  ieee: 'S. Fahl, Y. Acar, H. Perl, and M. Smith, “Why eve and mallory (also) love
    webmasters,” 2014, doi: <a href="https://doi.org/10.1145/2590296.2590341">10.1145/2590296.2590341</a>.'
  mla: Fahl, Sascha, et al. “Why Eve and Mallory (Also) Love Webmasters.” <i>Proceedings
    of the 9th ACM Symposium on Information, Computer and Communications Security</i>,
    ACM, 2014, doi:<a href="https://doi.org/10.1145/2590296.2590341">10.1145/2590296.2590341</a>.
  short: 'S. Fahl, Y. Acar, H. Perl, M. Smith, in: Proceedings of the 9th ACM Symposium
    on Information, Computer and Communications Security, ACM, 2014.'
date_created: 2023-09-22T11:56:00Z
date_updated: 2024-06-05T13:17:31Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/2590296.2590341
extern: '1'
language:
- iso: eng
publication: Proceedings of the 9th ACM symposium on Information, computer and communications
  security
publication_status: published
publisher: ACM
status: public
title: Why eve and mallory (also) love webmasters
type: conference
user_id: '14931'
year: '2014'
...
---
_id: '47161'
author:
- first_name: Sascha
  full_name: Fahl, Sascha
  last_name: Fahl
- first_name: Marian
  full_name: Harbach, Marian
  last_name: Harbach
- first_name: Yasemin
  full_name: Acar, Yasemin
  id: '94636'
  last_name: Acar
- first_name: Matthew
  full_name: Smith, Matthew
  last_name: Smith
citation:
  ama: 'Fahl S, Harbach M, Acar Y, Smith M. On the ecological validity of a password
    study. In: <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>.
    ACM; 2013. doi:<a href="https://doi.org/10.1145/2501604.2501617">10.1145/2501604.2501617</a>'
  apa: Fahl, S., Harbach, M., Acar, Y., &#38; Smith, M. (2013). On the ecological
    validity of a password study. <i>Proceedings of the Ninth Symposium on Usable
    Privacy and Security</i>. <a href="https://doi.org/10.1145/2501604.2501617">https://doi.org/10.1145/2501604.2501617</a>
  bibtex: '@inproceedings{Fahl_Harbach_Acar_Smith_2013, title={On the ecological validity
    of a password study}, DOI={<a href="https://doi.org/10.1145/2501604.2501617">10.1145/2501604.2501617</a>},
    booktitle={Proceedings of the Ninth Symposium on Usable Privacy and Security},
    publisher={ACM}, author={Fahl, Sascha and Harbach, Marian and Acar, Yasemin and
    Smith, Matthew}, year={2013} }'
  chicago: Fahl, Sascha, Marian Harbach, Yasemin Acar, and Matthew Smith. “On the
    Ecological Validity of a Password Study.” In <i>Proceedings of the Ninth Symposium
    on Usable Privacy and Security</i>. ACM, 2013. <a href="https://doi.org/10.1145/2501604.2501617">https://doi.org/10.1145/2501604.2501617</a>.
  ieee: 'S. Fahl, M. Harbach, Y. Acar, and M. Smith, “On the ecological validity of
    a password study,” 2013, doi: <a href="https://doi.org/10.1145/2501604.2501617">10.1145/2501604.2501617</a>.'
  mla: Fahl, Sascha, et al. “On the Ecological Validity of a Password Study.” <i>Proceedings
    of the Ninth Symposium on Usable Privacy and Security</i>, ACM, 2013, doi:<a href="https://doi.org/10.1145/2501604.2501617">10.1145/2501604.2501617</a>.
  short: 'S. Fahl, M. Harbach, Y. Acar, M. Smith, in: Proceedings of the Ninth Symposium
    on Usable Privacy and Security, ACM, 2013.'
date_created: 2023-09-22T11:49:19Z
date_updated: 2024-06-05T13:17:57Z
department:
- _id: '34'
- _id: '858'
doi: 10.1145/2501604.2501617
extern: '1'
language:
- iso: eng
publication: Proceedings of the Ninth Symposium on Usable Privacy and Security
publication_status: published
publisher: ACM
status: public
title: On the ecological validity of a password study
type: conference
user_id: '14931'
year: '2013'
...
