Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
71 Publications
2017 | Conference Paper | LibreCat-ID: 47242
Acar, Y., Fahl, S., & Mazurek, M. L. (2017). You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. 2016 IEEE Cybersecurity Development (SecDev). https://doi.org/10.1109/secdev.2016.013
LibreCat
| DOI
2017 | Conference Paper | LibreCat-ID: 47246
Acar, Y., Backes, M., Fahl, S., Garfinkel, S., Kim, D., Mazurek, M. L., & Stransky, C. (2017). Comparing the Usability of Cryptographic APIs. 2017 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp.2017.52
LibreCat
| DOI
2017 | Conference Paper | LibreCat-ID: 47244
Acar, Y., Stransky, C., Wermke, D., Mazurek, M. L., & Fahl, S. (2017). Security Developer Studies with GitHub Users: Exploring a Convenience Sample. Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017, 81–95.
LibreCat
2017 | Report | LibreCat-ID: 47873
Redmiles, E. M., Acar, Y., Fahl, S., & Mazurek, M. L. (2017). A Summary of Survey Methodology Best Practices for Security and Privacy Researchers. University of Maryland Computer Science Department. https://doi.org/10.13016/M22K2W
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 47240
Acar, Y., Backes, M., Bugiel, S., Fahl, S., McDaniel, P., & Smith, M. (2016). SoK: Lessons Learned from Android Security Research for Appified Software Platforms. 2016 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp.2016.33
LibreCat
| DOI
2016 | Conference Paper | LibreCat-ID: 47239
Dechand, S., Schürmann, D., Busse, K., Acar, Y., Fahl, S., & Smith, M. (2016). An Empirical Study of Textual Key-Fingerprint Representations. In T. Holz & S. Savage (Eds.), 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016 (pp. 193–208). USENIX Association.
LibreCat
2016 | Conference Paper | LibreCat-ID: 47241
Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M. L., & Stransky, C. (2016). You Get Where You’re Looking for: The Impact of Information Sources on Code Security. 2016 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp.2016.25
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 47233
Perl, H., Dechand, S., Smith, M., Arp, D., Yamaguchi, F., Rieck, K., Fahl, S., & Acar, Y. (2015). VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/2810103.2813604
LibreCat
| DOI
2015 | Conference Paper | LibreCat-ID: 47232
Oltrogge, M., Acar, Y., Dechand, S., Smith, M., & Fahl, S. (2015). To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. In J. Jung & T. Holz (Eds.), 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015 (pp. 239–254). USENIX Association.
LibreCat
2014 | Conference Paper | LibreCat-ID: 47162
Fahl, S., Acar, Y., Perl, H., & Smith, M. (2014). Why eve and mallory (also) love webmasters. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. https://doi.org/10.1145/2590296.2590341
LibreCat
| DOI
2013 | Conference Paper | LibreCat-ID: 47161
Fahl, S., Harbach, M., Acar, Y., & Smith, M. (2013). On the ecological validity of a password study. Proceedings of the Ninth Symposium on Usable Privacy and Security. https://doi.org/10.1145/2501604.2501617
LibreCat
| DOI