Follow
Christian Stransky
Christian Stransky
KKH Kaufmännische Krankenkasse
Verified email at sec.uni-hannover.de - Homepage
Title
Cited by
Cited by
Year
You Get Where You’re Looking For: The Impact of Information Sources on Code Security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
3932016
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
Security and Privacy (SP), 2017 IEEE Symposium on, 121-136, 2017
3702017
Stack Overflow Considered Harmful?
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
The Impact of Copy & Paste on Android Application Security. CoRR abs/1710.03135, 2017
370*2017
Comparing the Usability of Cryptographic APIs
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
Proceedings of the 38th IEEE Symposium on Security and Privacy, 2017
3172017
Security Developer Studies with GitHub Users: Exploring a Convenience Sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Symposium on Usable Privacy and Security (SOUPS), 2017
1502017
Developers Need Support, Too: A Survey of Security Advice for Software Developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
Cybersecurity Development (SecDev), 2017 IEEE, 22-26, 2017
1432017
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic {API} Misuse
PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 265-281, 2018
1142018
The rise of the citizen developer: Assessing the security impact of online app generators
M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ...
2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018
972018
How Internet Resources Might Be Helping You Develop Faster but Less Securely
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
IEEE Security & Privacy 15 (2), 50-60, 2017
422017
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers
C Stransky, Y Acar, DC Nguyen, D Wermke, EM Redmiles, D Kim, ...
Proc. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET …, 2017
412017
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security
C Stransky, D Wermke, J Schrader, N Huaman, Y Acar, AL Fehlhaber, ...
In Proceedings of Seventeenth Symposium on Usable Privacy and Security …, 2021
312021
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises
N Huaman, B von Skarczinski, C Stransky, D Wermke, Y Acar, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
282021
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University
C Stransky, O Wiese, V Roth, Y Acar, S Fahl
Proc. 43rd IEEE Symposium on Security and Privacy (SP’22). IEEE, 2022
252022
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites
D Wermke, N Huaman, C Stransky, N Busch, Y Acar, S Fahl
Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 359-377, 2020
192020
If You {Can’t} Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers
N Huaman, A Krause, D Wermke, JH Klemmer, C Stransky, Y Acar, S Fahl
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 313-330, 2022
62022
" Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication
JH Klemmer, M Gutfleisch, C Stransky, Y Acar, MA Sasse, S Fahl
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
52023
" Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine
J Schmüser, N Wöhler, HS Ramulu, C Stransky, D Wermke, S Fahl, ...
arXiv preprint arXiv:2208.11581, 2022
22022
POSTER: On the Effect of Security Warnings on Cryptographic API Misuse
PL Gorski, LL Iacono, Y Acar, S Moeller, C Stransky, S Fahl
1*
Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter
J Schmüser, HS Ramulu, N Wöhler, C Stransky, F Bensmann, D Dimitrov, ...
2024
Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications
D Wermke, C Stransky, N Huaman, N Busch, A Krause, Y Acar, S Fahl
The system can't perform the operation now. Try again later.
Articles 1–20