Dominik Wermke Wermke, D., Klemmer, J. H., Wöhler, N., Schmüser, J., Ramulu, H. S., Acar, Y., & Fahl, S. (2023). "Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain. In Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P’23). Fourne, M., Wermke, D., Fahl, S., & Acar, Y. (2023). A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. IEEE SECURITY & PRIVACY, 21(6), 59–63. https://doi.org/10.1109/MSEC.2023.3316569 Fourne, M., Wermke, D., Enck, W., Fahl, S., & Acar, Y. (2023). It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, pp. 1527–1544. https://doi.org/10.1109/SP46215.2023.00187 Fourné, M., Wermke, D., Enck, W., Fahl, S., & Acar, Y. (2023). It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. In Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P'23). Krause, A., Klemmer, J. H., Huaman, N., Wermke, D., Acar, Y., & Fahl, S. (2023). Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories. 32nd USENIX Security Symposium (USENIX Security 23), 2527–2544. Retrieved from https://www.usenix.org/conference/usenixsecurity23/presentation/krause Wermke, D., Wöhler, N., Klemmer, J. H., Fourné, M., Acar, Y., & Fahl, S. (2022). Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022). Huaman, N., Krause, A., Wermke, D., Klemmer, J. H., Stransky, C., Acar, Y., & Fahl, S. (2022). If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). Huaman, N., Skarczinski, B., Stransky, C., Wermke, D., Acar, Y., Dreißigacker, A., & Fahl, S. (2021). A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. 30th USENIX Security Symposium (USENIX Security 21). Häring, M., Gerlitz, E., Tiefenau, C., Smith, M., Wermke, D., Fahl, S., & Acar, Y. (2021). Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany. In Proceedings of Seventeenth Symposium on Usable Privacy and Security (SOUPS 2020). Stransky, C., Wermke, D., Schrader, J., Huaman, N., Acar, Y., Fehlhaber, A. L., … Fahl, S. (2021). On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 437–454. Wermke, D., Huaman, N., Stransky, C., Busch, N., Acar, Y., & Fahl, S. (2020). Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites. Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 359–377. Busse, K., Fahl, S., Wermke, D., Zezschwitz, E., Amft, S., & Smith, M. (2019). Replication: Do We Snooze If We Can’t Lose? Modelling Risk with Incentives in Habituation User Studies. Workshop on Usable Security (USEC) 2019. Wermke, D., Huaman, N., Acar, Y., Reaves, B., Traynor, P., & Fahl, S. (2018). A Large Scale Investigation of Obfuscation Use in Google Play. Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC '18), 222–235. Gorski, P. L., Iacono, L. L., Wermke, D., Stransky, C., Möller, S., Acar, Y., & Fahl, S. (2018). Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. USENIX Symposium on Usable Privacy and Security (SOUPS) 2018, 265–281. Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., & Fahl, S. (2017). A stitch in time: Supporting android developers in writing secure code. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 1065–1077. Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M. L., & Fahl, S. (2017). Developers need support, too: A survey of security advice for software developers. 2017 IEEE Cybersecurity Development (SecDev), 22–26. Stransky, C., Acar, Y., Nguyen, D. C., Wermke, D., Kim, D., Redmiles, E. M., … Fahl, S. (2017). Lessons learned from using an online platform to conduct large-scale, online controlled security experiments with software developers. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17). Acar, Y., Stransky, C., Wermke, D., Mazurek, M., & Fahl, S. (2017). Security developer studies with github users: Exploring a convenience sample. USENIX Symposium on Usable Privacy and Security (SOUPS) 2017, 81–95.