USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 22 results:
Filters: Author is Sascha Fahl [Clear All Filters]
The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts. 33rd USENIX Security Symposium (USENIX Security 24). :7213--7230.
.
2024. A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service. 33rd USENIX Security Symposium (USENIX Security 24). :7267--7284.
.
2024. "You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic Standards. 33rd USENIX Security Symposium (USENIX Security 24). :7249--7266.
.
2024. “I wouldn't want my unsafe code to run my pacemaker”: An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust. 32nd USENIX Security Symposium (USENIX Security 23). :2509--2525.
.
2023. Privacy Mental Models of Electronic Health Records: A German Case Study. Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). :525--542.
.
2023. Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories. 32nd USENIX Security Symposium (USENIX Security 23). :2527--2544.
.
2023. “Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry. 32nd USENIX Security Symposium (USENIX Security 23). :3763--3780.
.
2023. "Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). :171--190.
.
2023. If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). :313--330.
.
2022. Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples. 31st USENIX Security Symposium (USENIX Security 22). :4041--4058.
.
2022. A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. 30th USENIX Security Symposium (USENIX Security 21). :1235--1252.
.
2021. On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :437--454.
.
2021. Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :77--98.
.
2021. Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. 30th USENIX Security Symposium (USENIX Security 21). :4347--4364.
.
2021. Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites. Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). :359--377.
.
2020. From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security 29th USENIX Security Symposium (USENIX Security 20). :289--305.
.
2020. Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse 27th USENIX Security Symposium (USENIX Security 18). :203--220.
.
2018. Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). :265--281.
.
2018. Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
.
2017. Security Developer Studies with GitHub Users: Exploring a Convenience Sample. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :81--95.
.
2017. An Empirical Study of Textual Key-Fingerprint Representations. 25th USENIX Security Symposium (USENIX Security 16). :193--208.
.
2016. To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections. 24th USENIX Security Symposium (USENIX Security 15). :239--254.
.
2015.