You get where you're looking for: The impact of information sources on code security Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky 2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016 | 378 | 2016 |
Stack overflow considered harmful? the impact of copy&paste on android application security F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl 2017 IEEE Symposium on Security and Privacy (SP), 121-136, 2017 | 354 | 2017 |
Comparing the usability of cryptographic apis Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky 2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017 | 302 | 2017 |
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 285 | 2015 |
Keep me updated: An empirical study of third-party library updatability on android E Derr, S Bugiel, S Fahl, Y Acar, M Backes Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 198 | 2017 |
You are not your developer, either: A research agenda for usable security and privacy research beyond end users Y Acar, S Fahl, ML Mazurek 2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016 | 170 | 2016 |
On the ecological validity of a password study S Fahl, M Harbach, Y Acar, M Smith Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013 | 148 | 2013 |
A stitch in time: Supporting android developers in writingsecure code DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 147 | 2017 |
Security Developer Studies with GitHub Users: Exploring a Convenience Sample Y Acar, C Stransky, D Wermke, M Mazurek, S Fahl Symposium on Usable Privacy and Security (SOUPS), 2017 | 145 | 2017 |
Developers need support, too: A survey of security advice for software developers Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl 2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017 | 138 | 2017 |
Sok: Lessons learned from android security research for appified software platforms Y Acar, M Backes, S Bugiel, S Fahl, P McDaniel, M Smith 2016 IEEE Symposium on Security and Privacy (SP), 433-451, 2016 | 134 | 2016 |
A large scale investigation of obfuscation use in google play D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 110 | 2018 |
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 265-281, 2018 | 106 | 2018 |
A summary of survey methodology best practices for security and privacy researchers EM Redmiles, Y Acar, S Fahl, ML Mazurek | 89 | 2017 |
The rise of the citizen developer: Assessing the security impact of online app generators M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ... 2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018 | 87 | 2018 |
To Pin or Not to Pin—Helping App Developers Bullet Proof Their {TLS} Connections M Oltrogge, Y Acar, S Dechand, M Smith, S Fahl 24th {USENIX} Security Symposium ({USENIX} Security 15), 239-254, 2015 | 80 | 2015 |
An empirical study of textual key-fingerprint representations S Dechand, D Schürmann, K Busse, Y Acar, S Fahl, M Smith 25th {USENIX} Security Symposium ({USENIX} Security 16), 193-208, 2016 | 76 | 2016 |
Why Eve and Mallory (also) love webmasters: A study on the root causes of SSL misconfigurations S Fahl, Y Acar, H Perl, M Smith Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 75 | 2014 |
" We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products JM Haney, M Theofanos, Y Acar, SS Prettyman Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 357-373, 2018 | 74 | 2018 |
" It's the Company, the Government, You and I": User Perceptions of Responsibility for Smart Home Privacy and Security. JM Haney, Y Acar, S Furman USENIX Security Symposium, 411-428, 2021 | 49 | 2021 |