Skip to main content

Showing 1–23 of 23 results for author: Acar, Y

.
  1. arXiv:2405.08762  [pdf, other

    cs.CR

    S3C2 Summit 2024-03: Industry Secure Supply Chain Summit

    Authors: Greg Tystahl, Yasemin Acar, Michel Cukier, William Enck, Christian Kastner, Alexandros Kapravelos, Dominik Wermke, Laurie Williams

    Abstract: Supply chain security has become a very important vector to consider when defending against adversary attacks. Due to this, more and more developers are keen on improving their supply chains to make them more robust against future threats. On March 7th, 2024 researchers from the Secure Software Supply Chain Center (S3C2) gathered 14 industry leaders, developers and consumers of the open source eco… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: This is our WIP paper on the Summit. More versions will be released soon

  2. Unusual isospectral factorizations of shape invariant Hamiltonians with Scarf II potential

    Authors: Yiğit Can Acar, Lorena Acevedo, Şengül Kuru

    Abstract: In this paper, we search the factorizations of the shape invariant Hamiltonians with Scarf II potential. We find two classes; one of them is the standard real factorization which leads us to a real hierarchy of potentials and their energy levels; the other one is complex and it leads us naturally to a hierarchy of complex Hamiltonians. We will show some properties of these complex Hamiltonians: th… ▽ More

    Submitted 7 January, 2024; v1 submitted 12 September, 2023; originally announced September 2023.

    Comments: 13 pages, 5 figures

    MSC Class: 81Q60

    Journal ref: Phys. Scr. 98 (2023) 125229

  3. "Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication

    Authors: Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl

    Abstract: Usable and secure authentication on the web and beyond is mission-critical. While password-based authentication is still widespread, users have trouble dealing with potentially hundreds of online accounts and their passwords. Alternatives or extensions such as multi-factor authentication have their own challenges and find only limited adoption. Finding the right balance between security and usabil… ▽ More

    Submitted 26 November, 2023; v1 submitted 1 September, 2023; originally announced September 2023.

    Comments: Extended version of the paper that appeared at ACM CCS 2023. 18 pages (+2 pages artifact appendix), 4 figures, 11 tables

  4. arXiv:2308.06850  [pdf, other

    cs.CR

    S3C2 Summit 2023-06: Government Secure Supply Chain Summit

    Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: text overlap with arXiv:2307.16557, arXiv:2307.15642

  5. arXiv:2307.16557  [pdf, other

    cs.CR

    S3C2 Summit 2023-02: Industry Secure Supply Chain Summit

    Authors: Trevor Dunlap, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kastner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: text overlap with arXiv:2307.15642

  6. arXiv:2307.15642  [pdf, other

    cs.CR

    S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit

    Authors: Mindy Tran, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kastner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  7. arXiv:2306.09708  [pdf, other

    cs.CR

    "We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

    Authors: Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl

    Abstract: Multi-Factor Authentication is intended to strengthen the security of password-based authentication by adding another factor, such as hardware tokens or one-time passwords using mobile apps. However, this increased authentication security comes with potential drawbacks that can lead to account and asset loss. If users lose access to their additional authentication factors for any reason, they will… ▽ More

    Submitted 19 September, 2023; v1 submitted 16 June, 2023; originally announced June 2023.

  8. arXiv:2302.14326  [pdf, other

    cs.CR cs.CY

    Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations

    Authors: Tadayoshi Kohno, Yasemin Acar, Wulf Loh

    Abstract: The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be "morally good" or at least "morally allowed / acceptable". Among philosophy's contributions are (1) frameworks for evaluating the morality of actions -- including the well-established consequentialist and deontological frameworks -- a… ▽ More

    Submitted 4 August, 2023; v1 submitted 28 February, 2023; originally announced February 2023.

    Comments: In USENIX Security, 2023. For project web page, see https://securityethics.cs.washington.edu/

  9. arXiv:2302.05351  [pdf, other

    cs.HC cs.SE

    Beyond the Boolean: How Programmers Ask About, Use, and Discuss Gender

    Authors: Elijah Bouma-Sims, Yasemin Acar

    Abstract: Categorization via gender is omnipresent throughout society, and thus also computing; gender identity is often requested of users before they use software or web services. Despite this fact, no research has explored how software developers approach requesting gender disclosure from users. To understand how developers think about gender in software, we present an interview study with 15 software de… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

    Comments: To appear at CSCW 2023 and in Proc. ACM Hum.-Comput. Interact., Vol. 7, No. CSCW1, Article 28. (April 2023)

  10. Digital Security -- A Question of Perspective. A Large-Scale Telephone Survey with Four At-Risk User Groups

    Authors: Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse

    Abstract: This paper investigates the digital security experiences of four at-risk user groups in Germany, including older adults (70+), teenagers (14-17), people with migration backgrounds, and people with low formal education. Using computer-assisted telephone interviews, we sampled 250 participants per group, representative of region, gender, and partly age distributions. We examine their device usage, c… ▽ More

    Submitted 12 September, 2023; v1 submitted 25 December, 2022; originally announced December 2022.

  11. A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries

    Authors: Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth

    Abstract: Misconceptions about digital security and privacy topics in the general public frequently lead to insecure behavior. However, little is known about the prevalence and extent of such misconceptions in a global context. In this work, we present the results of the first large-scale survey of a global population on misconceptions: We conducted an online survey with n = 12, 351 participants in 12 count… ▽ More

    Submitted 22 December, 2022; v1 submitted 20 December, 2022; originally announced December 2022.

  12. arXiv:2212.08396  [pdf, ps, other

    cs.HC cs.CR cs.CY cs.SE

    "We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups

    Authors: Dilara Keküllüoğlu, Yasemin Acar

    Abstract: Security and privacy are often neglected in software development, and rarely a priority for developers. This insight is commonly based on research conducted by researchers and on developer populations living and working in the United States, Europe, and the United Kingdom. However, the production of software is global, and crucial populations in important technology hubs are not adequately studied… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

    Comments: In Proceedings of the 44th IEEE Symposium on Security and Privacy (IEEESP'23)

  13. arXiv:2211.06213  [pdf, other

    cs.CR

    Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories

    Authors: Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl

    Abstract: Version control systems for source code, such as Git, are key tools in modern software development environments. Many developers use online services, such as GitHub or GitLab, for collaborative software development. While software projects often require code secrets to work, such as API keys or passwords, they need to be handled securely within the project. Previous research and news articles have… ▽ More

    Submitted 14 November, 2022; v1 submitted 11 November, 2022; originally announced November 2022.

  14. arXiv:2208.11581  [pdf, other

    cs.CR

    "Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine

    Authors: Juliane Schmüser, Noah Wöhler, Harshini Sri Ramulu, Christian Stransky, Dominik Wermke, Sascha Fahl, Yasemin Acar

    Abstract: The Russian Invasion of Ukraine in early 2022 resulted in a rapidly changing (cyber) threat environment. This changing environment incentivized the sharing of security advice on social media, both for the Ukrainian population, as well as against Russian cyber attacks at large. Previous research found a significant influence of online security advice on end users. We collected 8,920 tweets posted… ▽ More

    Submitted 24 August, 2022; originally announced August 2022.

    Comments: 18 pages, 2 figures

  15. arXiv:2101.09340  [pdf, ps, other

    eess.SP

    Pulse Index Modulation

    Authors: Sultan Aldirmaz-Colak, Erdogan Aydin, Yasin Celik, Yusuf Acar, Ertugrul Basar

    Abstract: Emerging systems such as Internet-of-things (IoT) and machine-to-machine (M2M) communications have strict requirements on the power consumption of used equipments and associated complexity in the transceiver design. As a result, multiple-input multiple-output (MIMO) solutions might not be directly suitable for these system due to their high complexity, inter-antenna synchronization (IAS) requireme… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

    Comments: 5 pages, submitted for publication

  16. arXiv:1801.02742  [pdf, other

    cs.CR

    A Large Scale Investigation of Obfuscation Use in Google Play

    Authors: Dominik Wermke, Nicolas Huaman, Yasemin Acar, Brad Reaves, Patrick Traynor, Sascha Fahl

    Abstract: Android applications are frequently plagiarized or repackaged, and software obfuscation is a recommended protection against these practices. However, there is very little data on the overall rates of app obfuscation, the techniques used, or factors that lead to developers to choose to obfuscate their apps. In this paper, we present the first comprehensive analysis of the use of and challenges to s… ▽ More

    Submitted 20 February, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

  17. arXiv:1710.03135  [pdf, other

    cs.CR

    Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security

    Authors: Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl

    Abstract: Online programming discussion platforms such as Stack Overflow serve as a rich source of information for software developers. Available information include vibrant discussions and oftentimes ready-to-use code snippets. Anecdotes report that software developers copy and paste code snippets from those information sources for convenience reasons. Such behavior results in a constant flow of community-… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

  18. Resonant Production of Color Octet Muons at the Future Circular Collider Based Muon-Proton Colliders

    Authors: Yigit Can Acar, Umit Kaya, Bilgehan Baris Oner

    Abstract: We investigate the resonant production of color octet muons in order to explore the discovery potential of the FCC-based μp colliders. It is shown that search potential of μp colliders essentially surpass potential of the LHC and would exceed that of FCC pp collider.

    Submitted 4 June, 2018; v1 submitted 11 March, 2017; originally announced March 2017.

    Comments: 12 pages, 10 figures, 4 tables. To be published in Chinese Physics C

  19. arXiv:1608.02190  [pdf, ps, other

    physics.acc-ph hep-ex hep-ph

    FCC Based Lepton-Hadron and Photon-Hadron Colliders: Luminosity and Physics

    Authors: Y. C. Acar, A. N. Akay, S. Beser, H. Karadeniz, U. Kaya, B. B. Oner, S. Sultansoy

    Abstract: Construction of future electron-positron colliders (or dedicated electron linac) and muon colliders (or dedicated muon ring) tangential to Future Circular Collider (FCC) will give opportunity to utilize highest energy proton and nucleus beams for lepton-hadron and photon-hadron collisions. Luminosity values of FCC based ep, \mup, eA, \muA, \gammap and \gammaA colliders are estimated. Multi-TeV cen… ▽ More

    Submitted 16 May, 2017; v1 submitted 7 August, 2016; originally announced August 2016.

    Comments: 10 pages, 2 figures, 13 tables. arXiv admin note: text overlap with arXiv:1602.03089

  20. arXiv:1605.08028  [pdf, other

    hep-ph hep-ex physics.acc-ph

    Color Octet Electron Search Potential of the FCC Based e-p Colliders

    Authors: Y. C. Acar, U. Kaya, B. B. Oner, S. Sultansoy

    Abstract: Resonant production of color octet electron, e_{8}, at the FCC based ep colliders has been analyzed. It is shown that e-FCC will cover much a wider region of e_{8} masses compared to the LHC. Moreover, with highest electron beam energy, e_{8} search potential of the e-FCC exceeds that of FCC pp collider. If e_{8} is discovered earlier by the FCC pp collider, e-FCC will give opportunity to handle v… ▽ More

    Submitted 31 October, 2016; v1 submitted 25 May, 2016; originally announced May 2016.

    Comments: 10 pages, 10 figures, 5 tables. arXiv admin note: text overlap with arXiv:1511.05814 (Parton showering is considered in this version of the manuscript)

  21. arXiv:1602.03089  [pdf, other

    physics.acc-ph hep-ex

    Main Parameters of LCxFCC Based Electron-Proton Colliders

    Authors: Y. C. Acar, U. Kaya, B. B. Oner, S. Sultansoy

    Abstract: Multi-TeV center of mass energy ep colliders based on the Future Circular Collider (FCC) and linear colliders (LC) are proposed and corresponding luminosity values are estimated. Parameters of upgraded versions of the FCC are determined to optimize luminosity of electron-proton collisions kee** beam-beam effects in mind. It is shown that L_{ep}\sim10^{32}\,cm^{-2}s^{-1} can be achieved with mode… ▽ More

    Submitted 9 February, 2016; originally announced February 2016.

    Comments: 11 pages, 1 figure, 7 tables

  22. arXiv:1511.05814  [pdf, ps, other

    hep-ph hep-ex

    Resonant production of leptogluons at the FCC based lepton-hadron colliders

    Authors: Y. C. Acar, U. Kaya, B. B. Oner, S. Sultansoy

    Abstract: Resonant production of leptogluons at the FCC based ep and \mup colliders have been analyzed. It is shown that e-FCC and μ-FCC will cover much wider region of e_{8} and μ_{8} masses than the LHC. While leptogluons with appropriate masses (if exist) will be discovered earlier by the FCC pp collider, lepton-proton colliders will give opportunity to handle very important additional information. For e… ▽ More

    Submitted 18 November, 2015; originally announced November 2015.

    Comments: 16 pages, 12 figures, 8 tables

  23. arXiv:1510.08284  [pdf, other

    hep-ex hep-ph physics.acc-ph

    FCC based ep and $μ$p colliders

    Authors: Y. C. Acar, U. Kaya, B. B. Oner, S. Sultansoy

    Abstract: Construction of future electron-positron colliders (or dedicated electron linac) and muon colliders close to Future Circular Collider will give opportunity to utilize highest energy proton and nucleus beams for lepton-hadron and photon-hadron collisions. In this paper we estimate main parameters of the FCC based ep and μp colliders.

    Submitted 12 January, 2016; v1 submitted 28 October, 2015; originally announced October 2015.

    Comments: 9 pages, 1 figure, 8 tables