You get where you're looking for: The impact of information sources on code security Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky 2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016 | 406 | 2016 |
Stack overflow considered harmful? the impact of copy&paste on android application security F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl 2017 IEEE Symposium on Security and Privacy (SP), 121-136, 2017 | 376 | 2017 |
Comparing the usability of cryptographic apis Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky 2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017 | 323 | 2017 |
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 310 | 2015 |
Keep me updated: An empirical study of third-party library updatability on android E Derr, S Bugiel, S Fahl, Y Acar, M Backes Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 218 | 2017 |
You are not your developer, either: A research agenda for usable security and privacy research beyond end users Y Acar, S Fahl, ML Mazurek 2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016 | 188 | 2016 |
A stitch in time: Supporting android developers in writingsecure code DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 156 | 2017 |
Security Developer Studies with GitHub Users: Exploring a Convenience Sample Y Acar, C Stransky, D Wermke, M Mazurek, S Fahl Symposium on Usable Privacy and Security (SOUPS), 2017 | 151 | 2017 |
On the ecological validity of a password study S Fahl, M Harbach, Y Acar, M Smith Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013 | 151 | 2013 |
Developers need support, too: A survey of security advice for software developers Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl 2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017 | 148 | 2017 |
Sok: Lessons learned from android security research for appified software platforms Y Acar, M Backes, S Bugiel, S Fahl, P McDaniel, M Smith 2016 IEEE Symposium on Security and Privacy (SP), 433-451, 2016 | 142 | 2016 |
A large scale investigation of obfuscation use in google play D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 118 | 2018 |
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 265-281, 2018 | 118 | 2018 |
The rise of the citizen developer: Assessing the security impact of online app generators M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ... 2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018 | 103 | 2018 |
A summary of survey methodology best practices for security and privacy researchers EM Redmiles, Y Acar, S Fahl, ML Mazurek | 96 | 2017 |
To Pin or Not to Pin—Helping App Developers Bullet Proof Their {TLS} Connections M Oltrogge, Y Acar, S Dechand, M Smith, S Fahl 24th {USENIX} Security Symposium ({USENIX} Security 15), 239-254, 2015 | 84 | 2015 |
An empirical study of textual key-fingerprint representations S Dechand, D Schürmann, K Busse, Y Acar, S Fahl, M Smith 25th {USENIX} Security Symposium ({USENIX} Security 16), 193-208, 2016 | 81 | 2016 |
" We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products JM Haney, M Theofanos, Y Acar, SS Prettyman Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 357-373, 2018 | 78 | 2018 |
Why Eve and Mallory (also) love webmasters: A study on the root causes of SSL misconfigurations S Fahl, Y Acar, H Perl, M Smith Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 76 | 2014 |
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ... 2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022 | 60 | 2022 |