Follow
Yasemin Acar
Yasemin Acar
Paderborn University & The George Washington University
Verified email at sec.uni-hannover.de - Homepage
Title
Cited by
Cited by
Year
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
4072016
Stack overflow considered harmful? the impact of copy&paste on android application security
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
2017 IEEE Symposium on Security and Privacy (SP), 121-136, 2017
3772017
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
3222017
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
3102015
Keep me updated: An empirical study of third-party library updatability on android
E Derr, S Bugiel, S Fahl, Y Acar, M Backes
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2222017
You are not your developer, either: A research agenda for usable security and privacy research beyond end users
Y Acar, S Fahl, ML Mazurek
2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016
1892016
A stitch in time: Supporting android developers in writingsecure code
DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1572017
Security Developer Studies with GitHub Users: Exploring a Convenience Sample
Y Acar, C Stransky, D Wermke, M Mazurek, S Fahl
Symposium on Usable Privacy and Security (SOUPS), 2017
1512017
On the ecological validity of a password study
S Fahl, M Harbach, Y Acar, M Smith
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013
1512013
Developers need support, too: A survey of security advice for software developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017
1492017
Sok: Lessons learned from android security research for appified software platforms
Y Acar, M Backes, S Bugiel, S Fahl, P McDaniel, M Smith
2016 IEEE Symposium on Security and Privacy (SP), 433-451, 2016
1432016
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
1182018
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse
PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 265-281, 2018
1182018
The rise of the citizen developer: Assessing the security impact of online app generators
M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ...
2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018
1052018
A summary of survey methodology best practices for security and privacy researchers
EM Redmiles, Y Acar, S Fahl, ML Mazurek
982017
To Pin or Not to Pin—Helping App Developers Bullet Proof Their {TLS} Connections
M Oltrogge, Y Acar, S Dechand, M Smith, S Fahl
24th {USENIX} Security Symposium ({USENIX} Security 15), 239-254, 2015
852015
An empirical study of textual key-fingerprint representations
S Dechand, D Schürmann, K Busse, Y Acar, S Fahl, M Smith
25th {USENIX} Security Symposium ({USENIX} Security 16), 193-208, 2016
812016
" We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products
JM Haney, M Theofanos, Y Acar, SS Prettyman
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 357-373, 2018
792018
Why Eve and Mallory (also) love webmasters: A study on the root causes of SSL misconfigurations
S Fahl, Y Acar, H Perl, M Smith
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
762014
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks
J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ...
2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022
602022
The system can't perform the operation now. Try again later.
Articles 1–20