Sascha Fahl
Sascha Fahl
CISPA Helmholtz Center for Information Security and Leibniz University Hannover, Germany
Bestätigte E-Mail-Adresse bei cispa.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Why Eve and Mallory love Android: An analysis of Android SSL (in) security
S Fahl, M Harbach, T Muders, L Baumgärtner, B Freisleben, M Smith
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5982012
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
1972016
SoK: secure messaging
N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith
2015 IEEE Symposium on Security and Privacy, 232-249, 2015
1912015
Rethinking SSL development in an appified world
S Fahl, M Harbach, H Perl, M Koetter, M Smith
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1872013
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
F Fischer, K Böttinger, H Xiao, C Stranksy, Y Acar, M Backes, S Fahl
IEEE Symposium on Security and Privacy, 2017
1712017
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
1702017
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1442015
On the ecological validity of a password study
S Fahl, M Harbach, Y Acar, M Smith
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013
1212013
Keep me updated: An empirical study of third-party library updatability on android
E Derr, S Bugiel, S Fahl, Y Acar, M Backes
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1002017
(un) informed consent: Studying gdpr consent notices in the field
C Utz, M Degeling, S Fahl, F Schaub, T Holz
Proceedings of the 2019 acm sigsac conference on computer and communications …, 2019
942019
Sok: Lessons learned from android security research for appified software platforms
Y Acar, M Backes, S Bugiel, S Fahl, P McDaniel, M Smith
2016 IEEE Symposium on Security and Privacy (SP), 433-451, 2016
912016
You are not your developer, either: A research agenda for usable security and privacy research beyond end users
Y Acar, S Fahl, ML Mazurek
2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016
792016
A stitch in time: Supporting android developers in writingsecure code
DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
752017
Helping Johnny 2.0 to encrypt his Facebook conversations
S Fahl, M Harbach, T Muders, M Smith, U Sander
Proceedings of the eighth symposium on usable privacy and security, 1-17, 2012
732012
Security developer studies with github users: Exploring a convenience sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017), 81-95, 2017
712017
Developers need support, too: A survey of security advice for software developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017
662017
Confidentiality as a Service--Usable Security for the Cloud
S Fahl, M Harbach, T Muders, M Smith
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
652012
To Pin or Not to Pin—Helping App Developers Bullet Proof Their {TLS} Connections
M Oltrogge, Y Acar, S Dechand, M Smith, S Fahl
24th {USENIX} Security Symposium ({USENIX} Security 15), 239-254, 2015
552015
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
542018
Hey, you, get off of my clipboard
S Fahl, M Harbach, M Oltrogge, T Muders, M Smith
International Conference on Financial Cryptography and Data Security, 144-161, 2013
542013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20