“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ... 2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022 | 25 | 2022 |
Committed to trust: A qualitative study on security & trust in open source software projects D Wermke, N Wöhler, JH Klemmer, M Fourné, Y Acar, S Fahl 2022 IEEE Symposium on Security and Privacy (SP), 1880-1896, 2022 | 19 | 2022 |
Attack-test and verification systems, steps towards verifiable anomaly detection M Fourné, D Petersen, N Pohlmann Gesellschaft für Informatik eV, 2013 | 4 | 2013 |
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security M Fourné, D Wermke, W Enck, S Fahl, Y Acar Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P 2023), 2023 | 1 | 2023 |
Can Verification of Cryptographic Libraries be liberated from the von Neumann Style? M Fourné Gesellschaft für Informatik eV/FG KRYPTO, 2018 | | 2018 |
Aggregation of Network Protocol Data Near Its Source M Fourné, K Stegemann, D Petersen, N Pohlmann Information and Communication Technology: Second IFIP TC5/8 International …, 2014 | | 2014 |