@inproceedings{schmüser_ramulu_wöhler_stransky_bensmann_dimitrov_schellhammer_wermke_dietze_acar_et al._2024, title={Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter}, url={https://doi.org/10.1145/3613904.3642826}, DOI={10.1145/3613904.3642826}, abstractNote={The Russian Invasion of Ukraine in 2022 resulted in a rapidly changing cyber threat environment globally and incentivized the sharing of security and privacy advice on social media. Previous research found a strong impact of online security advice on end-user behavior.}, author={Schmüser, Juliane and Ramulu, Harshini Sri and Wöhler, Noah and Stransky, Christian and Bensmann, Felix and Dimitrov, Dimitar and Schellhammer, Sebastian and Wermke, Dominik and Dietze, Stefan and Acar, Yasemin and et al.}, year={2024}, month={May} } @inproceedings{boughton_miller_acar_wermke_kästner_2024, title={Decomposing and Measuring Trust in Open-Source Software Supply Chains}, url={https://doi.org/10.1145/3639476.3639775}, DOI={10.1145/3639476.3639775}, author={Boughton, Lina and Miller, Courtney and Acar, Yasemin and Wermke, Dominik and Kästner, Christian}, year={2024}, month={Apr} } @inproceedings{wermke_klemmer_wöhler_schmüser_ramulu_acar_fahl_2023, title={"Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain}, booktitle={In Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P’23)}, author={Wermke, Dominik and Klemmer, Jan H and Wöhler, Noah and Schmüser, Juliane and Ramulu, Harshini Sri and Acar, Yasemin and Fahl, Sascha}, year={2023}, month={May} } @article{fourne_wermke_fahl_acar_2023, title={A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda}, volume={21}, ISSN={["1558-4046"]}, url={https://doi.org/10.1109/MSEC.2023.3316569}, DOI={10.1109/MSEC.2023.3316569}, abstractNote={While securing dependencies and build systems is necessary, recent attacks have shown that developers are a commonly successfully attacked link in the chain. Therefore, a comprehensive approach that considers the human factor is crucial for effective software supply chain security.}, number={6}, journal={IEEE SECURITY & PRIVACY}, author={Fourne, Marcel and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2023}, month={Nov}, pages={59–63} } @article{fourne_wermke_enck_fahl_acar_2023, title={It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, ISSN={["1081-6011"]}, DOI={10.1109/SP46215.2023.00187}, journal={2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP}, author={Fourne, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023}, pages={1527–1544} } @inproceedings{fourné_wermke_enck_fahl_acar_2023, title={It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security}, booktitle={In Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P'23)}, author={Fourné, Marcel and Wermke, Dominik and Enck, William and Fahl, Sascha and Acar, Yasemin}, year={2023}, month={May} } @inproceedings{krause_klemmer_huaman_wermke_acar_fahl_2023, place={Anaheim, CA}, title={Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories}, url={https://www.usenix.org/conference/usenixsecurity23/presentation/krause}, booktitle={32nd USENIX Security Symposium (USENIX Security 23)}, publisher={USENIX Association}, author={Krause, Alexander and Klemmer, Jan H. and Huaman, Nicolas and Wermke, Dominik and Acar, Yasemin and Fahl, Sascha}, year={2023}, month={Aug}, pages={2527–2544} } @inproceedings{wermke_wöhler_klemmer_fourné_acar_fahl_2022, title={Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects}, booktitle={43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022)}, author={Wermke, Dominik and Wöhler, Noah and Klemmer, Jan H and Fourné, Marcel and Acar, Yasemin and Fahl, Sascha}, year={2022}, month={May} } @inproceedings{huaman_krause_wermke_klemmer_stransky_acar_fahl_2022, title={If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers}, booktitle={Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)}, author={Huaman, Nicolas and Krause, Alexander and Wermke, Dominik and Klemmer, Jan H and Stransky, Christian and Acar, Yasemin and Fahl, Sascha}, year={2022} } @inproceedings{huaman_skarczinski_stransky_wermke_acar_dreißigacker_fahl_2021, title={A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises}, booktitle={30th USENIX Security Symposium (USENIX Security 21)}, author={Huaman, Nicolas and Skarczinski, Bennet and Stransky, Christian and Wermke, Dominik and Acar, Yasemin and Dreißigacker, Arne and Fahl, Sascha}, year={2021} } @inproceedings{häring_gerlitz_tiefenau_smith_wermke_fahl_acar_2021, title={Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany}, booktitle={In Proceedings of Seventeenth Symposium on Usable Privacy and Security (SOUPS 2020)}, author={Häring, Maximilian and Gerlitz, Eva and Tiefenau, Christian and Smith, Matthew and Wermke, Dominik and Fahl, Sascha and Acar, Yasemin}, year={2021} } @inproceedings{stransky_wermke_schrader_huaman_acar_fehlhaber_wei_ur_fahl_2021, title={On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security}, booktitle={Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)}, author={Stransky, Christian and Wermke, Dominik and Schrader, Johanna and Huaman, Nicolas and Acar, Yasemin and Fehlhaber, Anna Lena and Wei, Miranda and Ur, Blase and Fahl, Sascha}, year={2021}, pages={437–454} } @inproceedings{wermke_huaman_stransky_busch_acar_fahl_2020, title={Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites}, booktitle={Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)}, author={Wermke, Dominik and Huaman, Nicolas and Stransky, Christian and Busch, Niklas and Acar, Yasemin and Fahl, Sascha}, year={2020}, pages={359–377} } @inproceedings{busse_fahl_wermke_zezschwitz_amft_smith_2019, title={Replication: Do We Snooze If We Can’t Lose? Modelling Risk with Incentives in Habituation User Studies}, booktitle={Workshop on Usable Security (USEC) 2019}, author={Busse, Karoline and Fahl, Sascha and Wermke, Dominik and Zezschwitz, Emanuel and Amft, Sabrina and Smith, Matthew}, year={2019} } @inproceedings{wermke_huaman_acar_reaves_traynor_fahl_2018, title={A Large Scale Investigation of Obfuscation Use in Google Play}, booktitle={Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC '18)}, author={Wermke, Dominik and Huaman, Nicolas and Acar, Yasemin and Reaves, Bradley and Traynor, Patrick and Fahl, Sascha}, year={2018}, pages={222–235} } @inproceedings{gorski_iacono_wermke_stransky_möller_acar_fahl_2018, title={Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse}, booktitle={USENIX Symposium on Usable Privacy and Security (SOUPS) 2018}, author={Gorski, Peter Leo and Iacono, Luigi Lo and Wermke, Dominik and Stransky, Christian and Möller, Sebastian and Acar, Yasemin and Fahl, Sascha}, year={2018}, pages={265–281} } @inproceedings{nguyen_wermke_acar_backes_weir_fahl_2017, title={A stitch in time: Supporting android developers in writing secure code}, booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, author={Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles and Fahl, Sascha}, year={2017}, pages={1065–1077} } @inproceedings{acar_stransky_wermke_weir_mazurek_fahl_2017, title={Developers need support, too: A survey of security advice for software developers}, booktitle={2017 IEEE Cybersecurity Development (SecDev)}, author={Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Weir, Charles and Mazurek, Michelle L and Fahl, Sascha}, year={2017}, pages={22–26} } @inproceedings{stransky_acar_nguyen_wermke_kim_redmiles_backes_garfinkel_mazurek_fahl_2017, title={Lessons learned from using an online platform to conduct large-scale, online controlled security experiments with software developers}, booktitle={10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17)}, author={Stransky, Christian and Acar, Yasemin and Nguyen, Duc Cuong and Wermke, Dominik and Kim, Doowon and Redmiles, Elissa M and Backes, Michael and Garfinkel, Simson and Mazurek, Michelle L and Fahl, Sascha}, year={2017} } @inproceedings{acar_stransky_wermke_mazurek_fahl_2017, title={Security developer studies with github users: Exploring a convenience sample}, booktitle={USENIX Symposium on Usable Privacy and Security (SOUPS) 2017}, author={Acar, Yasemin and Stransky, Christian and Wermke, Dominik and Mazurek, Michelle and Fahl, Sascha}, year={2017}, pages={81–95} }