@inproceedings{47842,
  author       = {{Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}},
  booktitle    = {{2023 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}}},
  doi          = {{10.1109/sp46215.2023.10179320}},
  year         = {{2023}},
}

@article{53368,
  author       = {{Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}},
  journal      = {{IEEE Security & Privacy}},
  number       = {{6}},
  pages        = {{59–63}},
  publisher    = {{IEEE}},
  title        = {{{A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}}},
  volume       = {{21}},
  year         = {{2023}},
}

@article{53348,
  author       = {{Fourné, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}},
  journal      = {{IEEE Secur. Priv.}},
  number       = {{6}},
  pages        = {{59–63}},
  title        = {{{A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}}},
  doi          = {{10.1109/MSEC.2023.3316569}},
  volume       = {{21}},
  year         = {{2023}},
}

@inproceedings{47844,
  author       = {{Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt, Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar, Yasemin}},
  booktitle    = {{2022 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks}}},
  doi          = {{10.1109/sp46214.2022.9833713}},
  year         = {{2022}},
}

@inproceedings{47843,
  author       = {{Wermke, Dominik and Wohler, Noah and Klemmer, Jan H. and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha}},
  booktitle    = {{2022 IEEE Symposium on Security and Privacy (SP)}},
  publisher    = {{IEEE}},
  title        = {{{Committed to Trust: A Qualitative Study on Security &amp; Trust in Open Source Software Projects}}},
  doi          = {{10.1109/sp46214.2022.9833686}},
  year         = {{2022}},
}

@inbook{47839,
  author       = {{Fourné, Marcel and Stegemann, Kevin and Petersen, Dominique and Pohlmann, Norbert}},
  booktitle    = {{Information and Communication Technology}},
  isbn         = {{9783642550317}},
  issn         = {{0302-9743}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{{Aggregation of Network Protocol Data Near Its Source}}},
  doi          = {{10.1007/978-3-642-55032-4_49}},
  year         = {{2014}},
}

@inbook{47841,
  author       = {{Fourné, Marcel and Petersen, Dominique and Pohlmann, Norbert}},
  booktitle    = {{INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt}},
  isbn         = {{978-3-88579-614-5}},
  pages        = {{2213–2224}},
  publisher    = {{Gesellschaft für Informatik e.V.}},
  title        = {{{Attack-test and verification systems, steps towards verifiable anomaly detection}}},
  year         = {{2013}},
}

