Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

71 Publications


2017 | Conference Paper | LibreCat-ID: 47242
Acar Y, Fahl S, Mazurek ML. You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. In: 2016 IEEE Cybersecurity Development (SecDev). IEEE; 2017. doi:10.1109/secdev.2016.013
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 47246
Acar Y, Backes M, Fahl S, et al. Comparing the Usability of Cryptographic APIs. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE; 2017. doi:10.1109/sp.2017.52
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 47244
Acar Y, Stransky C, Wermke D, Mazurek ML, Fahl S. Security Developer Studies with GitHub Users: Exploring a Convenience Sample. In: Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017. USENIX Association; 2017:81–95.
LibreCat
 

2017 | Report | LibreCat-ID: 47873
Redmiles EM, Acar Y, Fahl S, Mazurek ML. A Summary of Survey Methodology Best Practices for Security and Privacy Researchers. University of Maryland Computer Science Department; 2017. doi:10.13016/M22K2W
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 47240
Acar Y, Backes M, Bugiel S, Fahl S, McDaniel P, Smith M. SoK: Lessons Learned from Android Security Research for Appified Software Platforms. In: 2016 IEEE Symposium on Security and Privacy (SP). IEEE; 2016. doi:10.1109/sp.2016.33
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 47239
Dechand S, Schürmann D, Busse K, Acar Y, Fahl S, Smith M. An Empirical Study of Textual Key-Fingerprint Representations. In: Holz T, Savage S, eds. 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. USENIX Association; 2016:193–208.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 47241
Acar Y, Backes M, Fahl S, Kim D, Mazurek ML, Stransky C. You Get Where You’re Looking for: The Impact of Information Sources on Code Security. In: 2016 IEEE Symposium on Security and Privacy (SP). IEEE; 2016. doi:10.1109/sp.2016.25
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 47233
Perl H, Dechand S, Smith M, et al. VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM; 2015. doi:10.1145/2810103.2813604
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 47232
Oltrogge M, Acar Y, Dechand S, Smith M, Fahl S. To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In: Jung J, Holz T, eds. 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015. USENIX Association; 2015:239–254.
LibreCat
 

2014 | Conference Paper | LibreCat-ID: 47162
Fahl S, Acar Y, Perl H, Smith M. Why eve and mallory (also) love webmasters. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. ACM; 2014. doi:10.1145/2590296.2590341
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 47161
Fahl S, Harbach M, Acar Y, Smith M. On the ecological validity of a password study. In: Proceedings of the Ninth Symposium on Usable Privacy and Security. ACM; 2013. doi:10.1145/2501604.2501617
LibreCat | DOI
 

Filters and Search Terms

department=858

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed