“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ... 2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022 | 39 | 2022 |
Committed to trust: A qualitative study on security & trust in open source software projects D Wermke, N Wöhler, JH Klemmer, M Fourné, Y Acar, S Fahl 2022 IEEE Symposium on Security and Privacy (SP), 1880-1896, 2022 | 34 | 2022 |
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security M Fourné, D Wermke, W Enck, S Fahl, Y Acar Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P 2023), 2023 | 7 | 2023 |
Attack-test and verification systems, steps towards verifiable anomaly detection M Fourné, D Petersen, N Pohlmann Gesellschaft für Informatik eV, 2013 | 7 | 2013 |
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. M Fourné, D Wermke, S Fahl, Y Acar | 2* | |
“These results must be false”: A usability evaluation of constant-time analysis tools M Fourné, DDA Braga, J Jancar, M Sabt, P Schwabe, G Barthe, ... | 1 | 2024 |
Aggregation of Network Protocol Data Near Its Source M Fourné, K Stegemann, D Petersen, N Pohlmann Information and Communication Technology: Second IFIP TC5/8 International …, 2014 | 1 | 2014 |
Can Verification of Cryptographic Libraries be liberated from the von Neumann Style? M Fourné Gesellschaft für Informatik eV/FG KRYPTO, 2018 | | 2018 |
Human Factors in Open Source Security M Fourné | | |