7 Publications

Mark all

[7]
2023 | Conference Paper | LibreCat-ID: 47842
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security
M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 2023 IEEE Symposium on Security and Privacy (SP), IEEE, 2023.
LibreCat | DOI
 
[6]
2023 | Journal Article | LibreCat-ID: 53348
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda
M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Secur. Priv. 21 (2023) 59–63.
LibreCat | DOI
 
[5]
2023 | Journal Article | LibreCat-ID: 53368
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda
M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Security & Privacy 21 (2023) 59–63.
LibreCat
 
[4]
2022 | Conference Paper | LibreCat-ID: 47844
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks
J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A. Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.
LibreCat | DOI
 
[3]
2022 | Conference Paper | LibreCat-ID: 47843
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects
D. Wermke, N. Wohler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.
LibreCat | DOI
 
[2]
2014 | Book Chapter | LibreCat-ID: 47839
Aggregation of Network Protocol Data Near Its Source
M. Fourné, K. Stegemann, D. Petersen, N. Pohlmann, in: Information and Communication Technology, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014.
LibreCat | DOI
 
[1]
2013 | Book Chapter | LibreCat-ID: 47841
Attack-test and verification systems, steps towards verifiable anomaly detection
M. Fourné, D. Petersen, N. Pohlmann, in: INFORMATIK 2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt, Gesellschaft für Informatik e.V., Bonn, 2013, pp. 2213–2224.
LibreCat
 

Search

Filter Publications

Display / Sort

Export / Embed

7 Publications

Mark all

[7]
2023 | Conference Paper | LibreCat-ID: 47842
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security
M. Fourné, D. Wermke, W. Enck, S. Fahl, Y. Acar, in: 2023 IEEE Symposium on Security and Privacy (SP), IEEE, 2023.
LibreCat | DOI
 
[6]
2023 | Journal Article | LibreCat-ID: 53348
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda
M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Secur. Priv. 21 (2023) 59–63.
LibreCat | DOI
 
[5]
2023 | Journal Article | LibreCat-ID: 53368
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda
M. Fourné, D. Wermke, S. Fahl, Y. Acar, IEEE Security & Privacy 21 (2023) 59–63.
LibreCat
 
[4]
2022 | Conference Paper | LibreCat-ID: 47844
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks
J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A. Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.
LibreCat | DOI
 
[3]
2022 | Conference Paper | LibreCat-ID: 47843
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects
D. Wermke, N. Wohler, J.H. Klemmer, M. Fourné, Y. Acar, S. Fahl, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.
LibreCat | DOI
 
[2]
2014 | Book Chapter | LibreCat-ID: 47839
Aggregation of Network Protocol Data Near Its Source
M. Fourné, K. Stegemann, D. Petersen, N. Pohlmann, in: Information and Communication Technology, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014.
LibreCat | DOI
 
[1]
2013 | Book Chapter | LibreCat-ID: 47841
Attack-test and verification systems, steps towards verifiable anomaly detection
M. Fourné, D. Petersen, N. Pohlmann, in: INFORMATIK 2013 – Informatik Angepasst an Mensch, Organisation Und Umwelt, Gesellschaft für Informatik e.V., Bonn, 2013, pp. 2213–2224.
LibreCat
 

Search

Filter Publications

Display / Sort

Export / Embed