Follow
Sascha Fahl
Sascha Fahl
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
Why Eve and Mallory love Android: An analysis of Android SSL (in) security
S Fahl, M Harbach, T Muders, L Baumgärtner, B Freisleben, M Smith
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
7512012
(Un) informed consent: Studying GDPR consent notices in the field
C Utz, M Degeling, S Fahl, F Schaub, T Holz
Proceedings of the 2019 acm sigsac conference on computer and communications …, 2019
4612019
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE symposium on security and privacy (SP), 289-305, 2016
3932016
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
F Fischer, K Böttinger, H Xiao, C Stranksy, Y Acar, M Backes, S Fahl
IEEE Symposium on Security and Privacy, 2017
3712017
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
3182017
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
3022015
SoK: secure messaging
N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith
2015 IEEE Symposium on Security and Privacy, 232-249, 2015
2972015
Rethinking SSL development in an appified world
S Fahl, M Harbach, H Perl, M Koetter, M Smith
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2392013
Keep me updated: An empirical study of third-party library updatability on android
E Derr, S Bugiel, S Fahl, Y Acar, M Backes
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2132017
You are not your developer, either: A research agenda for usable security and privacy research beyond end users
Y Acar, S Fahl, ML Mazurek
2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016
1842016
A stitch in time: Supporting android developers in writingsecure code
DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1532017
Security developer studies with {GitHub} users: Exploring a convenience sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 81-95, 2017
1502017
On the ecological validity of a password study
S Fahl, M Harbach, Y Acar, M Smith
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013
1502013
Developers need support, too: A survey of security advice for software developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017
1432017
Sok: Lessons learned from android security research for appified software platforms
Y Acar, M Backes, S Bugiel, S Fahl, P McDaniel, M Smith
2016 IEEE Symposium on Security and Privacy (SP), 433-451, 2016
1412016
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
34th Annual Computer Security Applications Conference (ACSAC '18), 2018
1162018
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse
PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 265-281, 2018
1142018
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse
SG Lyastani, M Schilling, S Fahl, M Backes, S Bugiel
27th USENIX Security Symposium (USENIX Security 18), 203-220, 2018
107*2018
The rise of the citizen developer: Assessing the security impact of online app generators
M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ...
2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018
972018
A summary of survey methodology best practices for security and privacy researchers
EM Redmiles, Y Acar, S Fahl, ML Mazurek
952017
The system can't perform the operation now. Try again later.
Articles 1–20