Sascha Fahl
Sascha Fahl
Professor for Usable Security and Privacy, Leibniz University Hannover
Bestätigte E-Mail-Adresse bei sec.uni-hannover.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Why Eve and Mallory love Android: An analysis of Android SSL (in) security
S Fahl, M Harbach, T Muders, L Baumgärtner, B Freisleben, M Smith
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5292012
Rethinking SSL development in an appified world
S Fahl, M Harbach, H Perl, M Koetter, M Smith
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1562013
SoK: secure messaging
N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith
2015 IEEE Symposium on Security and Privacy, 232-249, 2015
1522015
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
1442016
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
1172017
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
F Fischer, K Böttinger, H Xiao, C Stranksy, Y Acar, M Backes, S Fahl
IEEE Symposium on Security and Privacy, 2017
1092017
On the ecological validity of a password study
S Fahl, M Harbach, Y Acar, M Smith
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013
1012013
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1002015
Sok: Lessons learned from android security research for appified software platforms
Y Acar, M Backes, S Bugiel, S Fahl, P McDaniel, M Smith
2016 IEEE Symposium on Security and Privacy (SP), 433-451, 2016
732016
Helping Johnny 2.0 to encrypt his Facebook conversations
S Fahl, M Harbach, T Muders, M Smith, U Sander
Proceedings of the Eighth Symposium on Usable Privacy and Security, 1-17, 2012
662012
Confidentiality as a Service--Usable Security for the Cloud
S Fahl, M Harbach, T Muders, M Smith
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
572012
Keep me updated: An empirical study of third-party library updatability on android
E Derr, S Bugiel, S Fahl, Y Acar, M Backes
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
562017
You are not your developer, either: A research agenda for usable security and privacy research beyond end users
Y Acar, S Fahl, ML Mazurek
2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016
522016
Security developer studies with github users: Exploring a convenience sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017), 81-95, 2017
492017
A stitch in time: Supporting android developers in writingsecure code
DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
462017
To Pin or Not to Pin—Helping App Developers Bullet Proof Their {TLS} Connections
M Oltrogge, Y Acar, S Dechand, M Smith, S Fahl
24th {USENIX} Security Symposium ({USENIX} Security 15), 239-254, 2015
462015
Hey, you, get off of my clipboard
S Fahl, M Harbach, M Oltrogge, T Muders, M Smith
International Conference on Financial Cryptography and Data Security, 144-161, 2013
462013
Developers need support, too: A survey of security advice for software developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017
392017
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations
S Fahl, Y Acar, H Perl, M Smith
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
362014
Sorry, I don’t get it: An analysis of warning message texts
M Harbach, S Fahl, P Yakovleva, M Smith
International Conference on Financial Cryptography and Data Security, 94-111, 2013
362013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20