Why Eve and Mallory love Android: An analysis of Android SSL (in) security S Fahl, M Harbach, T Muders, L Baumgärtner, B Freisleben, M Smith Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 743 | 2012 |
(Un) informed consent: Studying GDPR consent notices in the field C Utz, M Degeling, S Fahl, F Schaub, T Holz Proceedings of the 2019 acm sigsac conference on computer and communications …, 2019 | 441 | 2019 |
You get where you're looking for: The impact of information sources on code security Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky 2016 IEEE symposium on security and privacy (SP), 289-305, 2016 | 381 | 2016 |
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security F Fischer, K Böttinger, H Xiao, C Stranksy, Y Acar, M Backes, S Fahl IEEE Symposium on Security and Privacy, 2017 | 357 | 2017 |
Comparing the usability of cryptographic apis Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky 2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017 | 305 | 2017 |
SoK: secure messaging N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith 2015 IEEE Symposium on Security and Privacy, 232-249, 2015 | 291 | 2015 |
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 288 | 2015 |
Rethinking SSL development in an appified world S Fahl, M Harbach, H Perl, M Koetter, M Smith Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 238 | 2013 |
Keep me updated: An empirical study of third-party library updatability on android E Derr, S Bugiel, S Fahl, Y Acar, M Backes Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 200 | 2017 |
You are not your developer, either: A research agenda for usable security and privacy research beyond end users Y Acar, S Fahl, ML Mazurek 2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016 | 171 | 2016 |
On the ecological validity of a password study S Fahl, M Harbach, Y Acar, M Smith Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013 | 148 | 2013 |
A stitch in time: Supporting android developers in writingsecure code DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 147 | 2017 |
Security developer studies with {GitHub} users: Exploring a convenience sample Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 81-95, 2017 | 145 | 2017 |
Developers need support, too: A survey of security advice for software developers Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl 2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017 | 138 | 2017 |
Sok: Lessons learned from android security research for appified software platforms Y Acar, M Backes, S Bugiel, S Fahl, P McDaniel, M Smith 2016 IEEE Symposium on Security and Privacy (SP), 433-451, 2016 | 136 | 2016 |
A large scale investigation of obfuscation use in google play D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl 34th Annual Computer Security Applications Conference (ACSAC '18), 2018 | 112 | 2018 |
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 265-281, 2018 | 109 | 2018 |
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse SG Lyastani, M Schilling, S Fahl, M Backes, S Bugiel 27th USENIX Security Symposium (USENIX Security 18), 203-220, 2018 | 103* | 2018 |
Helping Johnny 2.0 to encrypt his Facebook conversations S Fahl, M Harbach, T Muders, M Smith, U Sander Proceedings of the eighth symposium on usable privacy and security, 1-17, 2012 | 92 | 2012 |
A summary of survey methodology best practices for security and privacy researchers EM Redmiles, Y Acar, S Fahl, ML Mazurek | 91 | 2017 |