Behavioural Security Research Group
Behavioural Security Research Group
Home
Projects
Publications
Courses
For Students
Team
Publications
Type
Uncategorized
Conference paper
Journal article
Book section
Date
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
Privacy at a Glance: A Process to Learn Modular Privacy Icons During Web Browsing
Maximiliane Windl
,
Anna-Marie Ortloff
,
Niels Henze
,
Valentin Schwind
Replication: Measuring User Perceptions in Smartphone Security and Privacy in Germany
Maxim Schessler
,
Eva Gerlitz
,
Maximilian Häring
,
Matthew Smith
Replicating a Study of Ransomware in Germany
Anna-Marie Ortloff
,
Maike Vossen
,
Christian Tiefenau
Behavioral responses to a cyber attack in a hospital environment
Markus Willing
,
Christian Dresen
,
Eva Gerlitz
,
Maximilian Häring
,
Matthew Smith
,
Carmen Binnewies
,
Tim Guess
,
Uwe Haverkamp
,
Sebastian Schinzel
Do you Really Code? Designing and Evaluating Screening Questions for Online Surveys with Programmers
Anastasia Danilova
,
Alena Naiakshina
,
Stefan Horstmann
,
Matthew Smith
The Effect of Nudges and Boosts on Browsing Privacy in a Naturalistic Environment
Anna-Marie Ortloff
,
Steven Zimmerman
,
David Elsweiler
,
Niels Henze
Werkzeuge für Usable (Cyber-)Security
Luigi Lo Iacono
,
Matthew Smith
,
Peter Leo Gorski
Please do not use !?_ or your License Plate Number: Analyzing Password Policies in German Companies
Eva Gerlitz
,
Maximilian Häring
,
Matthew Smith
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany
Maximilian Häring
,
Eva Gerlitz
,
Christian Tiefenau
,
Yasemin Acar
,
Sascha Fahl
,
Matthew Smith
,
Dominik Wermke
Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage
Anastasia Danilova
,
Alena Naiakshina
,
Anna Rasgauski
,
Matthew Smith
A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players
Stephan Plöger
,
Mischa Meier
,
Matthew Smith
Vision: I don’t want to use my Phone! A Cognitive Walkthrough for YubiKeys
Claudia Bischoff
,
Eva Gerlitz
,
Matthew Smith
Implementation and In Situ Assessment of Contextual Privacy Policies
Anna-Marie Ortloff
,
Maximiliane Windl
,
Valentin Schwind
,
Niels Henze
On Conducting Security Developer Studies with CS Students: Examining a Password-Storage Study with CS Students, Freelancers, and Company Developers
Alena Naiakshina
,
Anastasia Danilova
,
Eva Gerlitz
,
Matthew Smith
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators
Christian Tiefenau
,
Maximilian Häring
,
Katharina Krombholz
,
Emanuel von Zezschwitz
Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers
Anastasia Danilova
,
Alena Naiakshina
,
Johanna Deuter
,
Matthew Smith
Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?
Christian Tiefenau
,
Maximilian Häring
,
Eva Gerlitz
,
Emanuel von Zezschwitz
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right
Christian Tiefenau
,
Emanuel von Zezschwitz
,
Maximilian Häring
,
Katharina Krombholz
,
Matthew Smith
"Please enter your PIN" -- On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices
Christian Tiefenau
,
Maximilian Häring
,
Mohamed Khamis
,
Emanuel von Zezschwitz
SentiBooks: Enhancing Audiobooks via Affective Computing and Smart Light Bulbs
Anna-Marie Ortloff
,
Lydia Güntner
,
Maximiliane Windl
,
Thomas Schmidt
,
Martin Kocur
,
Christian Wolff
In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception
Sergej Dechand
,
Alena Naiakshina
,
Anastasia Danilova
,
Matthew Smith
"If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers
Alena Naiakshina
,
Anastasia Danilova
,
Eva Gerlitz
,
Emanuel von Zezschwitz
,
Matthew Smith
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS
Katharina Krombholz
,
Karoline Busse
,
Katharina Pfeffer
,
Matthew Smith
,
Emanuel von Zezschwitz
Towards a Graphical User Interface for Quantitative Analysis in Digital Musicology
Anna-Marie Ortloff
,
Maximiliane Windl
,
Lydia Güntner
,
Thomas Schmidt
Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice
Karoline Busse
,
Julia Schäfer
,
Matthew Smith
Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 19231)
Adam Shostack
,
Matthew Smith
,
Sam Weber
,
Mary Ellen Zurko
A Case Study on (Security) Update Processes in Working Environments: Understanding the Context
Maximilian Häring
,
Christian Tiefenau
,
Eva Gerlitz
,
Ronald Brenner
,
Emanuel von Zezschwitz
Evaluation kontextueller Datenschutzerklärungen
Anna-Marie Ortloff
,
Lydia Güntner
,
Maximiliane Windl
,
Denis Feth
,
Svenja Polst
Deception Task Design in Developer Password Studies: Exploring a Student Sample
Alena Naiakshina
,
Anastasia Danilova
,
Christian Tiefenau
,
Matthew Smith
Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
Alena Naiakshina
,
Anastasia Danilova
,
Christian Tiefenau
,
Marco Herzog
,
Sergej Dechand
,
Matthew Smith
Obstacles to the Adoption of Secure Communication Tools
Ruba Abu-Salma
,
M. Angela Sasse
,
Joseph Bonneau
,
Anastasia Danilova
,
Alena Naiakshina
,
Matthew Smith
Exploring Design Directions for Wearable Privacy
Katharina Krombholz
,
Adrian Dabrowski
,
Matthew Smith
,
Edgar Weippl
The Security-Usability Tradeoff Myth [Guest editors' introduction]
M. Angela Sasse
,
Matthew Smith
Developers are Not the Enemy!: The Need for Usable Security APIs
Matthew Green
,
Matthew Smith
SoK: Lessons Learned from Android Security Research for Appified Software Platforms
Yasemin Acar
,
Michael Backes
,
Sven Bugiel
,
Sascha Fahl
,
Patrick McDaniel
,
Matthew Smith
Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study
Khaled Yakdan
,
Sergej Dechand
,
Elmar Gerhards-Padilla
,
Matthew Smith
Usable Security—The Source Awakens
Matthew Smith
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
Henning Perl
,
Sergej Dechand
,
Matthew Smith
,
Daniel Arp
,
Fabian Yamaguchi
,
Konrad Rieck
,
Sascha Fahl
,
Yasemin Acar
SoK: Secure Messaging
Nik Unger
,
Sergej Dechand
,
Joseph Bonneau
,
Sascha Fahl
,
Henning Perl
,
Ian Goldberg
,
Matthew Smith
Where Have You Been? Using Location-Based Security Questions for Fallback Authentication
Alina Hang
,
Alexander De Luca
,
Matthew Smith
,
Michael Richter
,
Heinrich Hussmann
To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections
Marten Oltrogge
,
Yasemin Acar
,
Sergej Dechand
,
Matthew Smith
,
Sascha Fahl
Participatory Design for Security-Related User Interfaces – NDSS Symposium
Susanne Weber
,
Marian Harbach
,
Matthew Smith
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing
Katharina Krombholz
,
Adrian Dabrowski
,
Matthew Smith
,
Edgar Weippl
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations – NDSS Symposium
Khaled Yakdan
,
Sebastian Eschweiler
,
Elmar Gerhards-Padilla
,
Matthew Smith
Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely
Matthew Green
,
Matthew Smith
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers
Sascha Fahl
,
Sergej Dechand
,
Henning Perl
,
Felix Fischer
,
Jaromir Smrcek
,
Matthew Smith
Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness
Marian Harbach
,
Sascha Fahl
,
Matthew Smith
Privacy/performance trade-off in private search on bio-medical data
H. Perl
,
Y. Mohammed
,
M. Brenner
,
M. Smith
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations
Sascha Fahl
,
Yasemin Acar
,
Henning Perl
,
Matthew Smith
Using personal examples to improve risk communication for security & privacy decisions
Marian Harbach
,
Markus Hettig
,
Susanne Weber
,
Matthew Smith
Now you see me, now you don't: protecting smartphone authentication from shoulder surfers
Alexander De Luca
,
Marian Harbach
,
Emanuel von Zezschwitz
,
Max-Emanuel Maurer
,
Bernhard Ewald Slawik
,
Heinrich Hussmann
,
Matthew Smith
You Won’t Be Needing These Any More: On Removing Unused Certificates from Trust Stores
Henning Perl
,
Sascha Fahl
,
Matthew Smith
On the Awareness, Control and Privacy of Shared Photo Metadata
Benjamin Henne
,
Maximilian Koch
,
Matthew Smith
It’s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception
Marian Harbach
,
Emanuel von Zezschwitz
,
Andreas Fichtner
,
Alexander De Luca
,
Matthew Smith
Rethinking SSL development in an appified world
Sascha Fahl
,
Marian Harbach
,
Henning Perl
,
Markus Koetter
,
Matthew Smith
On the ecological validity of a password study
Sascha Fahl
,
Marian Harbach
,
Yasemin Acar
,
Matthew Smith
Sorry, I Don’t Get It: An Analysis of Warning Message Texts
Marian Harbach
,
Sascha Fahl
,
Polina Yakovleva
,
Matthew Smith
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards
Marian Harbach
,
Sascha Fahl
,
Matthias Rieger
,
Matthew Smith
Hey, You, Get Off of My Clipboard
Sascha Fahl
,
Marian Harbach
,
Marten Oltrogge
,
Thomas Muders
,
Matthew Smith
Why eve and mallory love android: an analysis of android SSL (in)security
Sascha Fahl
,
Marian Harbach
,
Thomas Muders
,
Lars Baumgärtner
,
Bernd Freisleben
,
Matthew Smith
Helping Johnny 2.0 to encrypt his Facebook conversations
Sascha Fahl
,
Marian Harbach
,
Thomas Muders
,
Matthew Smith
,
Uwe Sander
Big data privacy issues in public social media
Matthew Smith
,
Christian Szongott
,
Benjamin Henne
,
Gabriele von Voigt
Cite
×