Works (21)

Updated: November 20th, 2024 05:05

2024 conference paper

Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter

Schmüser, J., Ramulu, H. S., Wöhler, N., Stransky, C., Bensmann, F., Dimitrov, D., … Fahl, S. (2024, May 11).

Source: ORCID
Added: May 15, 2024

2024 article

Decomposing and Measuring Trust in Open-Source Software Supply Chains

2024 IEEE/ACM 46TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: NEW IDEAS AND EMERGING RESULTS, ICSE-NIER 2024, pp. 57–61.

Sources: ORCID, Web Of Science, NC State University Libraries
Added: June 1, 2024

2023 conference paper

"Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain

In Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P’23).

By: D. Wermke, J. Klemmer, N. Wöhler, J. Schmüser, H. Ramulu, Y. Acar, S. Fahl

Source: ORCID
Added: August 15, 2023

2023 journal article

A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda

IEEE SECURITY & PRIVACY, 21(6), 59–63.

By: M. Fourne*, D. Wermke n, S. Fahl* & Y. Acar*

author keywords: Privacy; Supply chain management; Human factors; Software; Security
Sources: ORCID, Web Of Science, NC State University Libraries
Added: November 25, 2023

2023 conference paper

Developers' Approaches to Software Supply Chain Security: An Interview Study

Sammak, R., Rotthaler, A. L., Ramulu, H. S., Wermke, D., & Acar, Y. (2023, November 19).

By: R. Sammak, A. Rotthaler, H. Ramulu, D. Wermke & Y. Acar

Source: ORCID
Added: November 19, 2024

2023 article

It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security

2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, pp. 1527–1544.

By: M. Fourne, D. Wermke, W. Enck, S. Fahl & Y. Acar

Sources: Web Of Science, NC State University Libraries
Added: September 5, 2023

2023 conference paper

It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security

In Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P'23).

By: M. Fourné, D. Wermke, W. Enck, S. Fahl & Y. Acar

Source: ORCID
Added: August 15, 2023

2023 conference paper

Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories

32nd USENIX Security Symposium (USENIX Security 23), 2527–2544. https://www.usenix.org/conference/usenixsecurity23/presentation/krause

By: A. Krause, J. Klemmer, N. Huaman, D. Wermke, Y. Acar & S. Fahl

Event: at Anaheim, CA

Source: ORCID
Added: November 25, 2023

2022 conference paper

Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects

Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022).

By: D. Wermke, N. Wöhler, J. Klemmer, M. Fourné, Y. Acar & S. Fahl

Source: ORCID
Added: August 15, 2023

2022 conference paper

If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers

Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022).

By: N. Huaman, A. Krause, D. Wermke, J. Klemmer, C. Stransky, Y. Acar, S. Fahl

Source: ORCID
Added: August 15, 2023

2021 conference paper

A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises

30th USENIX Security Symposium (USENIX Security 21).

By: N. Huaman, B. Skarczinski, C. Stransky, D. Wermke, Y. Acar, A. Dreißigacker, S. Fahl

Source: ORCID
Added: August 15, 2023

2021 conference paper

Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany

In Proceedings of Seventeenth Symposium on Usable Privacy and Security (SOUPS 2020).

By: M. Häring, E. Gerlitz, C. Tiefenau, M. Smith, D. Wermke, S. Fahl, Y. Acar

Source: ORCID
Added: August 15, 2023

2021 conference paper

On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security

Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 437–454.

By: C. Stransky, D. Wermke, J. Schrader, N. Huaman, Y. Acar, A. Fehlhaber, M. Wei, B. Ur, S. Fahl

Source: ORCID
Added: August 15, 2023

2020 conference paper

Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites

Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 359–377.

By: D. Wermke, N. Huaman, C. Stransky, N. Busch, Y. Acar & S. Fahl

Source: ORCID
Added: August 15, 2023

2019 conference paper

Replication: Do We Snooze If We Can’t Lose? Modelling Risk with Incentives in Habituation User Studies

Workshop on Usable Security (USEC) 2019.

By: K. Busse, S. Fahl, D. Wermke, E. Zezschwitz, S. Amft & M. Smith

Source: ORCID
Added: August 15, 2023

2018 conference paper

A Large Scale Investigation of Obfuscation Use in Google Play

Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC '18), 222–235.

By: D. Wermke, N. Huaman, Y. Acar, B. Reaves, P. Traynor & S. Fahl

Event: ACM

Source: ORCID
Added: August 15, 2023

2018 conference paper

Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse

USENIX Symposium on Usable Privacy and Security (SOUPS) 2018, 265–281.

By: P. Gorski, L. Iacono, D. Wermke, C. Stransky, S. Möller, Y. Acar, S. Fahl

Event: USENIX Association

Source: ORCID
Added: August 15, 2023

2017 conference paper

A stitch in time: Supporting android developers in writing secure code

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 1065–1077.

By: D. Nguyen, D. Wermke, Y. Acar, M. Backes, C. Weir & S. Fahl

Event: ACM

Source: ORCID
Added: August 15, 2023

2017 conference paper

Developers need support, too: A survey of security advice for software developers

2017 IEEE Cybersecurity Development (SecDev), 22–26.

By: Y. Acar, C. Stransky, D. Wermke, C. Weir, M. Mazurek & S. Fahl

Event: IEEE

Source: ORCID
Added: August 15, 2023

2017 conference paper

Lessons learned from using an online platform to conduct large-scale, online controlled security experiments with software developers

10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).

By: C. Stransky, Y. Acar, D. Nguyen, D. Wermke, D. Kim, E. Redmiles, M. Backes, S. Garfinkel, M. Mazurek, S. Fahl

Source: ORCID
Added: August 15, 2023

2017 conference paper

Security developer studies with github users: Exploring a convenience sample

USENIX Symposium on Usable Privacy and Security (SOUPS) 2017, 81–95.

By: Y. Acar, C. Stransky, D. Wermke, M. Mazurek & S. Fahl

Event: USENIX Association

Source: ORCID
Added: August 15, 2023

Employment

Updated: August 15th, 2023 14:47

2023 - present

North Carolina State University Raleigh, NC, US
Assistant Professor Computer Science

2021 - 2023

Helmholtz Center for Information Security Hannover, DE
Researcher Group Fahl

Education

Updated: August 15th, 2023 14:48

Leibniz University Hannover Hanover, DE
Dr. rer. nat. Computer Science

Funding History

Funding history based on the linked ORCID record. Updated: November 13th, 2024 12:53

grant October 1, 2022 - September 30, 2027
Collaborative Proposal: SaTC: Frontiers: Enabling a Secure and Trustworthy Software Supply Chain
Directorate for Computer & Information Science & Engineering

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.