USENIX reaffirms its commitment to diversity, equity, and inclusion.
Biblio
Export 12 results:
Filters: Author is Sascha Fahl [Clear All Filters]
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. 30th USENIX Security Symposium (USENIX Security 21). :1235--1252.
.
2021. On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :437--454.
.
2021. Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany. Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). :77--98.
.
2021. Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. 30th USENIX Security Symposium (USENIX Security 21). :4347--4364.
.
2021. Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites. Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). :359--377.
.
2020. From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security 29th USENIX Security Symposium (USENIX Security 20). :289--305.
.
2020. Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse 27th USENIX Security Symposium (USENIX Security 18). :203--220.
.
2018. Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). :265--281.
.
2018. Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
.
2017. Security Developer Studies with GitHub Users: Exploring a Convenience Sample. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :81--95.
.
2017. An Empirical Study of Textual Key-Fingerprint Representations. 25th USENIX Security Symposium (USENIX Security 16). :193--208.
.
2016. To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections. 24th USENIX Security Symposium (USENIX Security 15). :239--254.
.
2015.