Follow
Sascha Fahl
Sascha Fahl
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
Why Eve and Mallory love Android: An analysis of Android SSL (in) security
S Fahl, M Harbach, T Muders, L Baumgärtner, B Freisleben, M Smith
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
6982012
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
3202016
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
F Fischer, K Böttinger, H Xiao, C Stranksy, Y Acar, M Backes, S Fahl
IEEE Symposium on Security and Privacy, 2017
2882017
(Un) informed consent: Studying GDPR consent notices in the field
C Utz, M Degeling, S Fahl, F Schaub, T Holz
Proceedings of the 2019 acm sigsac conference on computer and communications …, 2019
2812019
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
2582017
SoK: secure messaging
N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith
2015 IEEE Symposium on Security and Privacy, 232-249, 2015
2582015
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2262015
Rethinking SSL development in an appified world
S Fahl, M Harbach, H Perl, M Koetter, M Smith
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2232013
Keep me updated: An empirical study of third-party library updatability on android
E Derr, S Bugiel, S Fahl, Y Acar, M Backes
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1622017
On the ecological validity of a password study
S Fahl, M Harbach, Y Acar, M Smith
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-13, 2013
1422013
You are not your developer, either: A research agenda for usable security and privacy research beyond end users
Y Acar, S Fahl, ML Mazurek
2016 IEEE Cybersecurity Development (SecDev), 3-8, 2016
1362016
Sok: Lessons learned from android security research for appified software platforms
Y Acar, M Backes, S Bugiel, S Fahl, P McDaniel, M Smith
2016 IEEE Symposium on Security and Privacy (SP), 433-451, 2016
1212016
Security developer studies with github users: Exploring a convenience sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Thirteenth Symposium on Usable Privacy and Security, 81-95, 2017
1202017
A stitch in time: Supporting android developers in writingsecure code
DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1192017
Developers need support, too: A survey of security advice for software developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017
1112017
A large scale investigation of obfuscation use in google play
D Wermke, N Huaman, Y Acar, B Reaves, P Traynor, S Fahl
Proceedings of the 34th annual computer security applications conference …, 2018
892018
Helping Johnny 2.0 to encrypt his Facebook conversations
S Fahl, M Harbach, T Muders, M Smith, U Sander
Proceedings of the eighth symposium on usable privacy and security, 1-17, 2012
842012
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic API misuse
PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl
Fourteenth Symposium on Usable Privacy and Security, 265-281, 2018
822018
To pin or not to pin—helping app developers bullet proof their {TLS} connections
M Oltrogge, Y Acar, S Dechand, M Smith, S Fahl
24th {USENIX} Security Symposium ({USENIX} Security 15), 239-254, 2015
762015
A summary of survey methodology best practices for security and privacy researchers
EM Redmiles, Y Acar, S Fahl, ML Mazurek
722017
The system can't perform the operation now. Try again later.
Articles 1–20