Behavioural Security Research Group
Behavioural Security Research Group
Home
Projects
Publications
Courses
For Students
Team
English
Deutsch
Authors
Publications
Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost
Eva Gerlitz
,
Maximilian Häring
,
Charlotte Theresa Mädler
,
Matthew Smith
,
Christian Tiefenau
Evolution of Password Expiry in Companies: Measuring the Adoption of Recommendations by the German Federal Office for Information Security
Eva Gerlitz
,
Maximilian Häring
,
Matthew Smith
,
Christian Tiefenau
SoK: I Have the (Developer) Power! Sample Size Estimation for Fishers Exact, Chi-Squared, McNemars, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable Security
Anna-Marie Ortloff
,
Christian Tiefenau
,
Matthew Smith
Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany
Lisa Geierhaas
,
Fabian Otto
,
Maximilian Häring
,
Matthew Smith
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice
Anna-Marie Ortloff
,
Matthias Fassl
,
Alexander Ponticello
,
Florin Martius
,
Anne Mertens
,
Katharina Krombholz
,
Matthew Smith
Less About Privacy: Revisiting a Survey about the German COVID-19 Contact Tracing App
Maximilian Häring
,
Eva Gerlitz
,
Matthew Smith
,
Christian Tiefenau
Let's Hash: Helping Developers with Password Security
Lisa Geierhaas
,
Anna-Marie Ortloff
,
Matthew Smith
,
Alena Naiakshina
A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players
Stephan Plöger
,
Mischa Meier
,
Matthew Smith
Behavioral responses to a cyber attack in a hospital environment
Markus Willing
,
Christian Dresen
,
Eva Gerlitz
,
Maximilian Häring
,
Matthew Smith
,
Carmen Binnewies
,
Tim Guess
,
Uwe Haverkamp
,
Sebastian Schinzel
Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage
Anastasia Danilova
,
Alena Naiakshina
,
Anna Rasgauski
,
Matthew Smith
Do you Really Code? Designing and Evaluating Screening Questions for Online Surveys with Programmers
Anastasia Danilova
,
Alena Naiakshina
,
Stefan Horstmann
,
Matthew Smith
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany
Maximilian Häring
,
Eva Gerlitz
,
Christian Tiefenau
,
Yasemin Acar
,
Sascha Fahl
,
Matthew Smith
,
Dominik Wermke
Please do not use !?_ or your License Plate Number: Analyzing Password Policies in German Companies
Eva Gerlitz
,
Maximilian Häring
,
Matthew Smith
Replication: Measuring User Perceptions in Smartphone Security and Privacy in Germany
Maxim Schessler
,
Eva Gerlitz
,
Maximilian Häring
,
Matthew Smith
Werkzeuge für Usable (Cyber-)Security
Luigi Lo Iacono
,
Matthew Smith
,
Peter Leo Gorski
On Conducting Security Developer Studies with CS Students: Examining a Password-Storage Study with CS Students, Freelancers, and Company Developers
Alena Naiakshina
,
Anastasia Danilova
,
Eva Gerlitz
,
Matthew Smith
Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers
Anastasia Danilova
,
Alena Naiakshina
,
Johanna Deuter
,
Matthew Smith
\"If HTTPS Were Secure, I Wouldn't Need 2FA\" - End User and Administrator Mental Models of HTTPS
Katharina Krombholz
,
Karoline Busse
,
Katharina Pfeffer
,
Matthew Smith
,
Emanuel Von Zezschwitz
\"If you want, I can store the encrypted password\": A Password-Storage Field Study with Freelance Developers
Alena Naiakshina
,
Anastasia Danilova
,
Eva Gerlitz
,
Emanuel Von Zezschwitz
,
Matthew Smith
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right
Christian Tiefenau
,
Emanuel Von Zezschwitz
,
Maximilian Häring
,
Katharina Krombholz
,
Matthew Smith
Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 19231)
Adam Shostack
,
Matthew Smith
,
Sam Weber
,
Mary Ellen Zurko
In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception
Sergej Dechand
,
Alena Naiakshina
,
Anastasia Danilova
,
Matthew Smith
Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice
Karoline Busse
,
Julia Schäfer
,
Matthew Smith
Vision: I don’t want to use my Phone! A Cognitive Walkthrough for YubiKeys
Claudia Bischoff
,
Eva Gerlitz
,
Matthew Smith
Deception Task Design in Developer Password Studies: Exploring a Student Sample
Alena Naiakshina
,
Anastasia Danilova
,
Christian Tiefenau
,
Matthew Smith
Exploring Design Directions for Wearable Privacy
Katharina Krombholz
,
Adrian Dabrowski
,
Matthew Smith
,
Edgar Weippl
Obstacles to the Adoption of Secure Communication Tools
Ruba Abu-Salma
,
M. Angela Sasse
,
Joseph Bonneau
,
Anastasia Danilova
,
Alena Naiakshina
,
Matthew Smith
Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
Alena Naiakshina
,
Anastasia Danilova
,
Christian Tiefenau
,
Marco Herzog
,
Sergej Dechand
,
Matthew Smith
Developers are Not the Enemy!: The Need for Usable Security APIs
Matthew Green
,
Matthew Smith
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
Khaled Yakdan
,
Sergej Dechand
,
Elmar Gerhards-Padilla
,
Matthew Smith
SoK: Lessons Learned from Android Security Research for Appified Software Platforms
Yasemin Acar
,
Michael Backes
,
Sven Bugiel
,
Sascha Fahl
,
Patrick McDaniel
,
Matthew Smith
The Security-Usability Tradeoff Myth [Guest editors' introduction]
M. Angela Sasse
,
Matthew Smith
Usable Security—The Source Awakens
Matthew Smith
Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely
Matthew Green
,
Matthew Smith
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations – NDSS Symposium
Khaled Yakdan
,
Sebastian Eschweiler
,
Elmar Gerhards-Padilla
,
Matthew Smith
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing
Katharina Krombholz
,
Adrian Dabrowski
,
Matthew Smith
,
Edgar Weippl
Participatory Design for Security-Related User Interfaces – NDSS Symposium
Susanne Weber
,
Marian Harbach
,
Matthew Smith
SoK: Secure Messaging
Nik Unger
,
Sergej Dechand
,
Joseph Bonneau
,
Sascha Fahl
,
Henning Perl
,
Ian Goldberg
,
Matthew Smith
To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections
Marten Oltrogge
,
Yasemin Acar
,
Sergej Dechand
,
Matthew Smith
,
Sascha Fahl
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
Henning Perl
,
Sergej Dechand
,
Matthew Smith
,
Daniel Arp
,
Fabian Yamaguchi
,
Konrad Rieck
,
Sascha Fahl
,
Yasemin Acar
Where Have You Been? Using Location-Based Security Questions for Fallback Authentication
Alina Hang
,
Alexander De Luca
,
Matthew Smith
,
Michael Richter
,
Heinrich Hussmann
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers
Sascha Fahl
,
Sergej Dechand
,
Henning Perl
,
Felix Fischer
,
Jaromir Smrcek
,
Matthew Smith
It’s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception
Marian Harbach
,
Emanuel Von Zezschwitz
,
Andreas Fichtner
,
Alexander De Luca
,
Matthew Smith
Now you see me, now you don't: protecting smartphone authentication from shoulder surfers
Alexander De Luca
,
Marian Harbach
,
Emanuel Von Zezschwitz
,
Max-Emanuel Maurer
,
Bernhard Ewald Slawik
,
Heinrich Hussmann
,
Matthew Smith
On the Awareness, Control and Privacy of Shared Photo Metadata
Benjamin Henne
,
Maximilian Koch
,
Matthew Smith
Using personal examples to improve risk communication for security & privacy decisions
Marian Harbach
,
Markus Hettig
,
Susanne Weber
,
Matthew Smith
Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness
Marian Harbach
,
Sascha Fahl
,
Matthew Smith
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations
Sascha Fahl
,
Yasemin Acar
,
Henning Perl
,
Matthew Smith
You Won’t Be Needing These Any More: On Removing Unused Certificates from Trust Stores
Henning Perl
,
Sascha Fahl
,
Matthew Smith
Hey, You, Get Off of My Clipboard
Sascha Fahl
,
Marian Harbach
,
Marten Oltrogge
,
Thomas Muders
,
Matthew Smith
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards
Marian Harbach
,
Sascha Fahl
,
Matthias Rieger
,
Matthew Smith
On the ecological validity of a password study
Sascha Fahl
,
Marian Harbach
,
Yasemin Acar
,
Matthew Smith
Rethinking SSL development in an appified world
Sascha Fahl
,
Marian Harbach
,
Henning Perl
,
Markus Koetter
,
Matthew Smith
Sorry, I Don’t Get It: An Analysis of Warning Message Texts
Marian Harbach
,
Sascha Fahl
,
Polina Yakovleva
,
Matthew Smith
Big data privacy issues in public social media
Matthew Smith
,
Christian Szongott
,
Benjamin Henne
,
Gabriele Von Voigt
Helping Johnny 2.0 to encrypt his Facebook conversations
Sascha Fahl
,
Marian Harbach
,
Thomas Muders
,
Matthew Smith
,
Uwe Sander
Why eve and mallory love android: an analysis of android SSL (in)security
Sascha Fahl
,
Marian Harbach
,
Thomas Muders
,
Lars Baumgärtner
,
Bernd Freisleben
,
Matthew Smith
Cite
×