A large scale investigation of obfuscation use in google play D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl Proceedings of the 34th annual computer security applications conference …, 2018 | 119 | 2018 |
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications M Oltrogge, N Huaman, S Amft, Y Acar, M Backes, S Fahl 30th USENIX Security Symposium (USENIX Security 21), 4347-4364, 2021 | 50 | 2021 |
They would do better if they worked together: The case of interaction problems between password managers and websites N Huaman, S Amft, M Oltrogge, Y Acar, S Fahl 2021 IEEE Symposium on Security and Privacy (SP), 1367-1381, 2021 | 38 | 2021 |
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security C Stransky, D Wermke, J Schrader, N Huaman, Y Acar, AL Fehlhaber, ... Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 437-454, 2021 | 31 | 2021 |
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises N Huaman, B von Skarczinski, C Stransky, D Wermke, Y Acar, ... 30th USENIX Security Symposium (USENIX Security 21), 1235-1252, 2021 | 30 | 2021 |
Cloudy with a chance of misconceptions: exploring users' perceptions and expectations of security and privacy in cloud office suites D Wermke, N Huaman, C Stransky, N Busch, Y Acar, S Fahl Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 359-377, 2020 | 20 | 2020 |
" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments S Amft, S Höltervennhoff, N Huaman, A Krause, L Simko, Y Acar, S Fahl Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 8 | 2023 |
" Would you give the same priority to the bank and a game? I do {not!}" exploring credential management strategies and obstacles during password manager setup S Klivan, S Höltervennhoff, N Huaman, Y Acar, S Fahl Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), 171-190, 2023 | 8 | 2023 |
Pushed by Accident: A {Mixed-Methods} Study on Strategies of Handling Secret Information in Source Code Repositories A Krause, JH Klemmer, N Huaman, D Wermke, Y Acar, S Fahl 32nd USENIX Security Symposium (USENIX Security 23), 2527-2544, 2023 | 7 | 2023 |
If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers N Huaman, A Krause, D Wermke, JH Klemmer, C Stransky, Y Acar, S Fahl Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 313-330, 2022 | 6 | 2022 |
They would do better if they worked together: Interaction problems between password managers and the web N Huaman, S Amft, M Oltrogge, Y Acar, S Fahl IEEE Security & Privacy 20 (2), 49-60, 2022 | 5 | 2022 |
Poster: Committed by Accident–Prevention and Remediation Strategies Against Secret Leakage A Krause, JH Klemmer, N Huaman, D Wermke, Y Acar, S Fahl In 43rd IEEE Symposium on Security and Privacy, 2022 | 3 | 2022 |
Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication. S Amft, S Höltervennhoff, N Huaman, A Krause, L Simko, Y Acar, S Fahl CISPA, 2023 | 2 | 2023 |
A Large Scale Investigation of Obfuscation Use in Google Play Y Acar, B Reaves, P Traynor, S Fahl, D Wermke, N Huaman ACSAC, Dec, 2018 | 2 | 2018 |
" You have to read 50 different {RFCs} that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic Standards N Huaman, J Suray, JH Klemmer, M Fourné, S Klivan, I Trummová, Y Acar, ... 33rd USENIX Security Symposium (USENIX Security 24), 7249-7266, 2024 | 1 | 2024 |
Poster: Pushed by Accident–Prevention and Remediation Strategies Against Secret Leakage A Krause, JH Klemmer, N Huaman, D Wermke, Y Acar, S Fahl In 19th Symposium on Usable Privacy and Security, 2023 | | 2023 |
Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories A Krause, JH Klemmer, N Huaman, D Wermke, Y Acar, S Fahl arXiv preprint arXiv:2211.06213, 2022 | | 2022 |
Poster: They Would do Better if They Worked Together The Case of Interaction Problems Between Password Managers and Websites N Huaman, S Amft, M Oltrogge, Y Acar, S Fahl In 43rd IEEE Symposium on Security and Privacy, 2022 | | 2022 |
Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications D Wermke, C Stransky, N Huaman, N Busch, A Krause, Y Acar, S Fahl In 41st IEEE Symposium on Security and Privacy, 2020 | | 2020 |
Project Leine-A Virtualized Study Infrastructure D Wermke, N Huaman, C Stransky, Y Acar, S Fahl In 26th Annual Network and Distributed System Security Symposium, 2019 | | 2019 |