关注
Sascha Fahl
Sascha Fahl
CISPA Helmholtz Center for Information Security
在 cispa.de 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Why Eve and Mallory love Android: An analysis of Android SSL (in) security
S Fahl, M Harbach, T Muders, L Baumgärtner, B Freisleben, M Smith
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
7432012
(Un) informed consent: Studying GDPR consent notices in the field
C Utz, M Degeling, S Fahl, F Schaub, T Holz
Proceedings of the 2019 acm sigsac conference on computer and communications …, 2019
4412019
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE symposium on security and privacy (SP), 289-305, 2016
3812016
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
F Fischer, K Böttinger, H Xiao, C Stranksy, Y Acar, M Backes, S Fahl
IEEE Symposium on Security and Privacy, 2017
3572017
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
3052017
SoK: secure messaging
N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith
2015 IEEE Symposium on Security and Privacy, 232-249, 2015
2912015
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
2882015
Rethinking SSL development in an appified world
S Fahl, M Harbach, H Perl, M Koetter, M Smith
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2382013
Keep me updated: An empirical study of third-party library updatability on android
E Derr, S Bugiel, S Fahl, Y Acar, M Backes
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2002017
You are not your developer, either: A research agenda for usable security and privacy research beyond end users
Y Acar, S Fahl, ML Mazurek
2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016
1712016
On the ecological validity of a password study
S Fahl, M Harbach, Y Acar, M Smith
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013
1482013
A stitch in time: Supporting android developers in writingsecure code
DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1472017
Security developer studies with {GitHub} users: Exploring a convenience sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 81-95, 2017
1452017
Developers need support, too: A survey of security advice for software developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017
1382017
Sok: Lessons learned from android security research for appified software platforms
Y Acar, M Backes, S Bugiel, S Fahl, P McDaniel, M Smith
2016 IEEE Symposium on Security and Privacy (SP), 433-451, 2016
1362016
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
34th Annual Computer Security Applications Conference (ACSAC '18), 2018
1122018
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse
PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 265-281, 2018
1092018
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse
SG Lyastani, M Schilling, S Fahl, M Backes, S Bugiel
27th USENIX Security Symposium (USENIX Security 18), 203-220, 2018
103*2018
Helping Johnny 2.0 to encrypt his Facebook conversations
S Fahl, M Harbach, T Muders, M Smith, U Sander
Proceedings of the eighth symposium on usable privacy and security, 1-17, 2012
922012
A summary of survey methodology best practices for security and privacy researchers
EM Redmiles, Y Acar, S Fahl, ML Mazurek
912017
系统目前无法执行此操作,请稍后再试。
文章 1–20