Follow
Dominik Wermke
Dominik Wermke
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
A stitch in time: Supporting Android developers in writing secure code
DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl
2017 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS …, 2017
1542017
Security developer studies with GitHub users: Exploring a convenience sample
Y Acar, C Stransky, D Wermke, M Mazurek, S Fahl
USENIX Symposium on Usable Privacy and Security (SOUPS) 2017, 81-95, 2017
1532017
Developers need support, too: A survey of security advice for software developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017
1432017
A Large Scale Investigation of Obfuscation Use in Google Play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
34th Annual Computer Security Applications Conference (ACSAC '18), 222-235, 2018
1182018
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse
PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl
USENIX Symposium on Usable Privacy and Security (SOUPS) 2018, 265-281, 2018
1142018
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects
D Wermke, N Wöhler, JH Klemmer, M Fourné, Y Acar, S Fahl
43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022), 2022
492022
MicroRNA-regulated pathways of flow-stimulated angiogenesis and vascular remodeling in vivo
D Henn, M Abu-Halima, D Wermke, F Falkner, B Thomas, C Köpple, ...
Journal of translational medicine 17, 1-19, 2019
422019
Lessons learned from using an online platform to conduct large-scale, online controlled security experiments with software developers
C Stransky, Y Acar, DC Nguyen, D Wermke, D Kim, EM Redmiles, ...
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
412017
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security
C Stransky, D Wermke, J Schrader, N Huaman, Y Acar, AL Fehlhaber, ...
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 437-454, 2021
312021
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises
N Huaman, B von Skarczinski, C Stransky, D Wermke, Y Acar, ...
30th USENIX Security Symposium (USENIX Security 21), 2021
282021
"Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain
D Wermke, JH Klemmer, N Wöhler, J Schmüser, HS Ramulu, Y Acar, ...
44th IEEE Symposium on Security and Privacy (S&P 2023), 2023
212023
Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites
D Wermke, N Huaman, C Stransky, N Busch, Y Acar, S Fahl
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 359-377, 2020
192020
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany
M Häring, E Gerlitz, C Tiefenau, M Smith, D Wermke, S Fahl, Y Acar
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 2021
182021
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security
M Fourné, D Wermke, W Enck, S Fahl, Y Acar
44th IEEE Symposium on Security and Privacy (S&P 2023), 2023
142023
Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secrets in Source Code Repositories
A Krause, JH Klemmer, N Huaman, D Wermke, Y Acar, S Fahl
32nd USENIX Security Symposium (USENIX Security 2023), 2023
7*2023
If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers
N Huaman, A Krause, D Wermke, JH Klemmer, C Stransky, Y Acar, S Fahl
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 2022
62022
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.
M Fourné, D Wermke, S Fahl, Y Acar
IEEE Security & Privacy 21 (6), 59-63, 2023
52023
Replication: Do We Snooze If We Can’t Lose? Modelling Risk with Incentives in Habituation User Studies
K Busse, S Fahl, D Wermke, E von Zezschwitz, S Amft, M Smith
Workshop on Usable Security (USEC) 2019, 2019
42019
Decomposing and Measuring Trust in Open-Source Software Supply Chains
L Boughton, C Miller, Y Acar, D Wermke, C Kästner
46th International Conference on Software Engineering - New Ideas Track …, 2024
32024
Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter
J Schmüser, HS Ramulu, N Wöhler, C Stransky, F Bensmann, D Dimitrov, ...
ACM CHI Conference on Human Factors in Computing Systems - CHI'24, 2024
2*2024
The system can't perform the operation now. Try again later.
Articles 1–20