Követés
Christian Stransky
Christian Stransky
KKH Kaufmännische Krankenkasse
E-mail megerősítve itt: sec.uni-hannover.de - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
You Get Where You’re Looking For: The Impact of Information Sources on Code Security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
4072016
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
Security and Privacy (SP), 2017 IEEE Symposium on, 121-136, 2017
3772017
Stack Overflow Considered Harmful?
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
The Impact of Copy & Paste on Android Application Security. CoRR abs/1710.03135, 2017
377*2017
Comparing the Usability of Cryptographic APIs
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
Proceedings of the 38th IEEE Symposium on Security and Privacy, 2017
3222017
Security Developer Studies with GitHub Users: Exploring a Convenience Sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Symposium on Usable Privacy and Security (SOUPS), 2017
1512017
Developers Need Support, Too: A Survey of Security Advice for Software Developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
Cybersecurity Development (SecDev), 2017 IEEE, 22-26, 2017
1492017
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic {API} Misuse
PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 265-281, 2018
1182018
The rise of the citizen developer: Assessing the security impact of online app generators
M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ...
2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018
1052018
How Internet Resources Might Be Helping You Develop Faster but Less Securely
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
IEEE Security & Privacy 15 (2), 50-60, 2017
442017
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers
C Stransky, Y Acar, DC Nguyen, D Wermke, EM Redmiles, D Kim, ...
Proc. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET …, 2017
422017
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security
C Stransky, D Wermke, J Schrader, N Huaman, Y Acar, AL Fehlhaber, ...
In Proceedings of Seventeenth Symposium on Usable Privacy and Security …, 2021
312021
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises
N Huaman, B von Skarczinski, C Stransky, D Wermke, Y Acar, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
302021
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University
C Stransky, O Wiese, V Roth, Y Acar, S Fahl
Proc. 43rd IEEE Symposium on Security and Privacy (SP’22). IEEE, 2022
272022
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites
D Wermke, N Huaman, C Stransky, N Busch, Y Acar, S Fahl
Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 359-377, 2020
202020
" Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication
JH Klemmer, M Gutfleisch, C Stransky, Y Acar, MA Sasse, S Fahl
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
72023
If You {Can’t} Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers
N Huaman, A Krause, D Wermke, JH Klemmer, C Stransky, Y Acar, S Fahl
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 313-330, 2022
62022
" Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine
J Schmüser, N Wöhler, HS Ramulu, C Stransky, D Wermke, S Fahl, ...
arXiv preprint arXiv:2208.11581, 2022
22022
POSTER: On the Effect of Security Warnings on Cryptographic API Misuse
PL Gorski, LL Iacono, Y Acar, S Moeller, C Stransky, S Fahl
1*
Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter
J Schmüser, HS Ramulu, N Wöhler, C Stransky, F Bensmann, D Dimitrov, ...
2024
Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications
D Wermke, C Stransky, N Huaman, N Busch, A Krause, Y Acar, S Fahl
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20