


Остановите войну!
for scientists:


default search action
Sascha Fahl
Person information

- affiliation: Leibniz University Hannover, Germany
- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j3]Christine Utz, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, Florian Schaub:
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites. Proc. Priv. Enhancing Technol. 2023(1): 5-28 (2023) - 2022
- [j2]Nicolas Huaman
, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl:
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web. IEEE Secur. Priv. 20(2): 49-60 (2022) - [c52]Nicolas Huaman, Alexander Krause, Dominik Wermke, Jan H. Klemmer, Christian Stransky, Yasemin Acar, Sascha Fahl:
If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. SOUPS @ USENIX Security Symposium 2022: 313-330 - [c51]Christian Stransky, Oliver Wiese, Volker Roth, Yasemin Acar, Sascha Fahl:
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University. IEEE Symposium on Security and Privacy 2022: 860-875 - [c50]Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study. IEEE Symposium on Security and Privacy 2022: 893-910 - [c49]Dominik Wermke, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, Sascha Fahl:
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. IEEE Symposium on Security and Privacy 2022: 1880-1896 - [c48]Harjot Kaur, Sabrina Amft, Daniel Votipka, Yasemin Acar, Sascha Fahl:
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples. USENIX Security Symposium 2022: 4041-4058 - [i7]Christine Utz, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, Florian Schaub:
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites. CoRR abs/2203.11387 (2022) - [i6]Juliane Schmüser, Noah Wöhler, Harshini Sri Ramulu, Christian Stransky, Dominik Wermke, Sascha Fahl, Yasemin Acar:
"Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine. CoRR abs/2208.11581 (2022) - [i5]Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl:
Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories. CoRR abs/2211.06213 (2022) - 2021
- [c47]Maximilian Häring, Eva Gerlitz, Christian Tiefenau, Matthew Smith, Dominik Wermke, Sascha Fahl, Yasemin Acar:
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany. SOUPS @ USENIX Security Symposium 2021: 77-98 - [c46]Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, Sascha Fahl:
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. SOUPS @ USENIX Security Symposium 2021: 437-454 - [c45]Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl:
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites. IEEE Symposium on Security and Privacy 2021: 1367-1381 - [c44]Nicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, Sascha Fahl
:
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. USENIX Security Symposium 2021: 1235-1252 - [c43]Marten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, Sascha Fahl:
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. USENIX Security Symposium 2021: 4347-4364 - 2020
- [c42]Peter Leo Gorski
, Yasemin Acar, Luigi Lo Iacono, Sascha Fahl:
Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs. CHI 2020: 1-13 - [c41]Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, Sascha Fahl:
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites. SOUPS @ USENIX Security Symposium 2020: 359-377 - [c40]Charles Weir, Ben Hermann, Sascha Fahl:
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security. USENIX Security Symposium 2020: 289-305
2010 – 2019
- 2019
- [c39]Christine Utz
, Martin Degeling
, Sascha Fahl, Florian Schaub, Thorsten Holz:
(Un)informed Consent: Studying GDPR Consent Notices in the Field. CCS 2019: 973-990 - [i4]Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz:
(Un)informed Consent: Studying GDPR Consent Notices in the Field. CoRR abs/1909.02638 (2019) - 2018
- [c38]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. ACSAC 2018: 222-235 - [c37]Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl:
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. SOUPS @ USENIX Security Symposium 2018: 265-281 - [c36]Marten Oltrogge, Erik Derr, Christian Stransky, Yasemin Acar, Sascha Fahl, Christian Rossow, Giancarlo Pellegrino, Sven Bugiel, Michael Backes:
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. IEEE Symposium on Security and Privacy 2018: 634-647 - [c35]Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, Sven Bugiel:
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. USENIX Security Symposium 2018: 203-220 - [c34]Yuxi Wu, Panya Gupta, Miranda Wei, Yasemin Acar, Sascha Fahl, Blase Ur:
Your Secrets Are Safe: How Browsers' Explanations Impact Misconceptions About Private Browsing Mode. WWW 2018: 217-226 - [i3]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. CoRR abs/1801.02742 (2018) - 2017
- [j1]Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim
, Michelle L. Mazurek, Christian Stransky:
How Internet Resources Might Be Helping You Develop Faster but Less Securely. IEEE Secur. Priv. 15(2): 50-60 (2017) - [c33]Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir
, Sascha Fahl:
A Stitch in Time: Supporting Android Developers in WritingSecure Code. CCS 2017: 1065-1077 - [c32]Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz:
Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors. CCS 2017: 1407-1420 - [c31]Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes:
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. CCS 2017: 2187-2200 - [c30]Yasemin Acar, Christian Stransky, Dominik Wermke, Charles Weir
, Michelle L. Mazurek, Sascha Fahl:
Developers Need Support, Too: A Survey of Security Advice for Software Developers. SecDev 2017: 22-26 - [c29]Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl:
Security Developer Studies with GitHub Users: Exploring a Convenience Sample. SOUPS 2017: 81-95 - [c28]Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl:
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. IEEE Symposium on Security and Privacy 2017: 121-136 - [c27]Yasemin Acar, Michael Backes, Sascha Fahl, Simson L. Garfinkel, Doowon Kim
, Michelle L. Mazurek, Christian Stransky:
Comparing the Usability of Cryptographic APIs. IEEE Symposium on Security and Privacy 2017: 154-171 - [c26]Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim
, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, Sascha Fahl:
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. CSET @ USENIX Security Symposium 2017 - [i2]Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl:
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security. CoRR abs/1710.03135 (2017) - [i1]Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Sven Bugiel, Michael Backes:
Studying the Impact of Managers on Password Strength and Reuse. CoRR abs/1712.08940 (2017) - 2016
- [b1]Sascha Fahl:
On the importance of ecologically valid usable security research for end users and IT workers. University of Hanover, Hannover, Germany, 2016 - [c25]Yasemin Acar, Sascha Fahl, Michelle L. Mazurek:
You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. SecDev 2016: 3-8 - [c24]Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim
, Michelle L. Mazurek, Christian Stransky:
You Get Where You're Looking for: The Impact of Information Sources on Code Security. IEEE Symposium on Security and Privacy 2016: 289-305 - [c23]Yasemin Acar, Michael Backes, Sven Bugiel, Sascha Fahl, Patrick D. McDaniel, Matthew Smith:
SoK: Lessons Learned from Android Security Research for Appified Software Platforms. IEEE Symposium on Security and Privacy 2016: 433-451 - [c22]Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, Matthew Smith:
An Empirical Study of Textual Key-Fingerprint Representations. USENIX Security Symposium 2016: 193-208 - 2015
- [c21]Henning Perl, Sergej Dechand, Matthew Smith, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar:
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. CCS 2015: 426-437 - [c20]Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith:
SoK: Secure Messaging. IEEE Symposium on Security and Privacy 2015: 232-249 - [c19]Marten Oltrogge, Yasemin Acar, Sergej Dechand, Matthew Smith, Sascha Fahl:
To Pin or Not to Pin-Helping App Developers Bullet Proof Their TLS Connections. USENIX Security Symposium 2015: 239-254 - 2014
- [c18]Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith:
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. AsiaCCS 2014: 507-512 - [c17]Sascha Fahl, Sergej Dechand, Henning Perl, Felix Fischer, Jaromir Smrcek, Matthew Smith:
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers. CCS 2014: 1143-1155 - [c16]Marian Harbach, Sascha Fahl, Matthew Smith:
Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness. CSF 2014: 97-110 - [c15]Henning Perl, Sascha Fahl, Matthew Smith:
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores. Financial Cryptography 2014: 307-315 - 2013
- [c14]Sascha Fahl, Marian Harbach
, Henning Perl, Markus Koetter, Matthew Smith:
Rethinking SSL development in an appified world. CCS 2013: 49-60 - [c13]Marian Harbach
, Sascha Fahl, Polina Yakovleva, Matthew Smith:
Sorry, I Don't Get It: An Analysis of Warning Message Texts. Financial Cryptography Workshops 2013: 94-111 - [c12]Sascha Fahl, Marian Harbach
, Marten Oltrogge, Thomas Muders, Matthew Smith:
Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers. Financial Cryptography 2013: 144-161 - [c11]Marian Harbach
, Sascha Fahl, Matthias Rieger, Matthew Smith:
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards. Privacy Enhancing Technologies 2013: 245-264 - [c10]Sascha Fahl, Marian Harbach
, Yasemin Acar, Matthew Smith:
On the ecological validity of a password study. SOUPS 2013: 13:1-13:13 - 2012
- [c9]Sascha Fahl, Marian Harbach
, Thomas Muders, Matthew Smith, Lars Baumgärtner, Bernd Freisleben
:
Why eve and mallory love android: an analysis of android SSL (in)security. CCS 2012: 50-61 - [c8]Marian Harbach
, Sascha Fahl, Thomas Muders, Matthew Smith:
Towards measuring warning readability. CCS 2012: 989-991 - [c7]Sascha Fahl, Marian Harbach
, Matthew Smith:
Human-centric visual access control for clinical data management. DEST 2012: 1-8 - [c6]Sascha Fahl, Marian Harbach
, Thomas Muders, Matthew Smith:
TrustSplit: usable confidentiality for social network messaging. HT 2012: 145-154 - [c5]Marian Harbach
, Sascha Fahl, Michael Brenner, Thomas Muders, Matthew Smith:
Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions. PST 2012: 17-24 - [c4]Sascha Fahl, Marian Harbach
, Thomas Muders, Matthew Smith, Uwe Sander:
Helping Johnny 2.0 to encrypt his Facebook conversations. SOUPS 2012: 11 - [c3]Sascha Fahl, Marian Harbach
, Thomas Muders, Matthew Smith:
Confidentiality as a Service - Usable Security for the Cloud. TrustCom 2012: 153-162 - [c2]Marian Harbach
, Sascha Fahl, Thomas Muders, Matthew Smith:
All our messages are belong to us: usable confidentiality in social networks. WWW (Companion Volume) 2012: 519-520 - 2011
- [c1]Matthias Schmidt, Sascha Fahl, Roland Schwarzkopf, Bernd Freisleben
:
TrustBox: A Security Architecture for Preventing Data Breaches. PDP 2011: 635-639
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-26 00:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint