7 Publications

Mark all

[7]
2023 | Conference Paper | LibreCat-ID: 47842
Fourné, M., Wermke, D., Enck, W., Fahl, S., & Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. 2023 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp46215.2023.10179320
LibreCat | DOI
 
[6]
2023 | Journal Article | LibreCat-ID: 53348
Fourné, M., Wermke, D., Fahl, S., & Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. IEEE Secur. Priv., 21(6), 59–63. https://doi.org/10.1109/MSEC.2023.3316569
LibreCat | DOI
 
[5]
2023 | Journal Article | LibreCat-ID: 53368
Fourné, M., Wermke, D., Fahl, S., & Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. IEEE Security & Privacy, 21(6), 59–63.
LibreCat
 
[4]
2022 | Conference Paper | LibreCat-ID: 47844
Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G., Fouque, P.-A., & Acar, Y. (2022). “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. 2022 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp46214.2022.9833713
LibreCat | DOI
 
[3]
2022 | Conference Paper | LibreCat-ID: 47843
Wermke, D., Wohler, N., Klemmer, J. H., Fourné, M., Acar, Y., & Fahl, S. (2022). Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. 2022 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp46214.2022.9833686
LibreCat | DOI
 
[2]
2014 | Book Chapter | LibreCat-ID: 47839
Fourné, M., Stegemann, K., Petersen, D., & Pohlmann, N. (2014). Aggregation of Network Protocol Data Near Its Source. In Information and Communication Technology. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-55032-4_49
LibreCat | DOI
 
[1]
2013 | Book Chapter | LibreCat-ID: 47841
Fourné, M., Petersen, D., & Pohlmann, N. (2013). Attack-test and verification systems, steps towards verifiable anomaly detection. In INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt (pp. 2213–2224). Gesellschaft für Informatik e.V.
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed

7 Publications

Mark all

[7]
2023 | Conference Paper | LibreCat-ID: 47842
Fourné, M., Wermke, D., Enck, W., Fahl, S., & Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. 2023 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp46215.2023.10179320
LibreCat | DOI
 
[6]
2023 | Journal Article | LibreCat-ID: 53348
Fourné, M., Wermke, D., Fahl, S., & Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. IEEE Secur. Priv., 21(6), 59–63. https://doi.org/10.1109/MSEC.2023.3316569
LibreCat | DOI
 
[5]
2023 | Journal Article | LibreCat-ID: 53368
Fourné, M., Wermke, D., Fahl, S., & Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. IEEE Security & Privacy, 21(6), 59–63.
LibreCat
 
[4]
2022 | Conference Paper | LibreCat-ID: 47844
Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G., Fouque, P.-A., & Acar, Y. (2022). “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. 2022 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp46214.2022.9833713
LibreCat | DOI
 
[3]
2022 | Conference Paper | LibreCat-ID: 47843
Wermke, D., Wohler, N., Klemmer, J. H., Fourné, M., Acar, Y., & Fahl, S. (2022). Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. 2022 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp46214.2022.9833686
LibreCat | DOI
 
[2]
2014 | Book Chapter | LibreCat-ID: 47839
Fourné, M., Stegemann, K., Petersen, D., & Pohlmann, N. (2014). Aggregation of Network Protocol Data Near Its Source. In Information and Communication Technology. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-55032-4_49
LibreCat | DOI
 
[1]
2013 | Book Chapter | LibreCat-ID: 47841
Fourné, M., Petersen, D., & Pohlmann, N. (2013). Attack-test and verification systems, steps towards verifiable anomaly detection. In INFORMATIK 2013 – Informatik angepasst an Mensch, Organisation und Umwelt (pp. 2213–2224). Gesellschaft für Informatik e.V.
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed