You Get Where You’re Looking For: The Impact of Information Sources on Code Security Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky | 393 | 2016 |
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl Security and Privacy (SP), 2017 IEEE Symposium on, 121-136, 2017 | 370 | 2017 |
Stack Overflow Considered Harmful? F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl The Impact of Copy & Paste on Android Application Security. CoRR abs/1710.03135, 2017 | 370* | 2017 |
Comparing the Usability of Cryptographic APIs Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky Proceedings of the 38th IEEE Symposium on Security and Privacy, 2017 | 317 | 2017 |
Security Developer Studies with GitHub Users: Exploring a Convenience Sample Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl Symposium on Usable Privacy and Security (SOUPS), 2017 | 150 | 2017 |
Developers Need Support, Too: A Survey of Security Advice for Software Developers Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl Cybersecurity Development (SecDev), 2017 IEEE, 22-26, 2017 | 143 | 2017 |
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic {API} Misuse PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 265-281, 2018 | 114 | 2018 |
The rise of the citizen developer: Assessing the security impact of online app generators M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ... 2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018 | 97 | 2018 |
How Internet Resources Might Be Helping You Develop Faster but Less Securely Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky IEEE Security & Privacy 15 (2), 50-60, 2017 | 42 | 2017 |
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers C Stransky, Y Acar, DC Nguyen, D Wermke, EM Redmiles, D Kim, ... Proc. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET …, 2017 | 41 | 2017 |
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security C Stransky, D Wermke, J Schrader, N Huaman, Y Acar, AL Fehlhaber, ... In Proceedings of Seventeenth Symposium on Usable Privacy and Security …, 2021 | 31 | 2021 |
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises N Huaman, B von Skarczinski, C Stransky, D Wermke, Y Acar, ... 30th {USENIX} Security Symposium ({USENIX} Security 21), 2021 | 28 | 2021 |
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University C Stransky, O Wiese, V Roth, Y Acar, S Fahl Proc. 43rd IEEE Symposium on Security and Privacy (SP’22). IEEE, 2022 | 25 | 2022 |
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites D Wermke, N Huaman, C Stransky, N Busch, Y Acar, S Fahl Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 359-377, 2020 | 19 | 2020 |
If You {Can’t} Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers N Huaman, A Krause, D Wermke, JH Klemmer, C Stransky, Y Acar, S Fahl Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 313-330, 2022 | 6 | 2022 |
" Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication JH Klemmer, M Gutfleisch, C Stransky, Y Acar, MA Sasse, S Fahl Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 5 | 2023 |
" Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine J Schmüser, N Wöhler, HS Ramulu, C Stransky, D Wermke, S Fahl, ... arXiv preprint arXiv:2208.11581, 2022 | 2 | 2022 |
POSTER: On the Effect of Security Warnings on Cryptographic API Misuse PL Gorski, LL Iacono, Y Acar, S Moeller, C Stransky, S Fahl | 1* | |
Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter J Schmüser, HS Ramulu, N Wöhler, C Stransky, F Bensmann, D Dimitrov, ... | | 2024 |
Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications D Wermke, C Stransky, N Huaman, N Busch, A Krause, Y Acar, S Fahl | | |