Skip to main content

Showing 1–15 of 15 results for author: Acar, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.08762  [pdf, other

    cs.CR

    S3C2 Summit 2024-03: Industry Secure Supply Chain Summit

    Authors: Greg Tystahl, Yasemin Acar, Michel Cukier, William Enck, Christian Kastner, Alexandros Kapravelos, Dominik Wermke, Laurie Williams

    Abstract: Supply chain security has become a very important vector to consider when defending against adversary attacks. Due to this, more and more developers are keen on improving their supply chains to make them more robust against future threats. On March 7th, 2024 researchers from the Secure Software Supply Chain Center (S3C2) gathered 14 industry leaders, developers and consumers of the open source eco… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: This is our WIP paper on the Summit. More versions will be released soon

  2. "Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication

    Authors: Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl

    Abstract: Usable and secure authentication on the web and beyond is mission-critical. While password-based authentication is still widespread, users have trouble dealing with potentially hundreds of online accounts and their passwords. Alternatives or extensions such as multi-factor authentication have their own challenges and find only limited adoption. Finding the right balance between security and usabil… ▽ More

    Submitted 26 November, 2023; v1 submitted 1 September, 2023; originally announced September 2023.

    Comments: Extended version of the paper that appeared at ACM CCS 2023. 18 pages (+2 pages artifact appendix), 4 figures, 11 tables

  3. arXiv:2308.06850  [pdf, other

    cs.CR

    S3C2 Summit 2023-06: Government Secure Supply Chain Summit

    Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: text overlap with arXiv:2307.16557, arXiv:2307.15642

  4. arXiv:2307.16557  [pdf, other

    cs.CR

    S3C2 Summit 2023-02: Industry Secure Supply Chain Summit

    Authors: Trevor Dunlap, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kastner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: text overlap with arXiv:2307.15642

  5. arXiv:2307.15642  [pdf, other

    cs.CR

    S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit

    Authors: Mindy Tran, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kastner, Laurie Williams

    Abstract: Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4j incidents that have affected thousands of customers and businesses. The US government and industry are equally interested in enhancing software supp… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  6. arXiv:2306.09708  [pdf, other

    cs.CR

    "We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

    Authors: Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl

    Abstract: Multi-Factor Authentication is intended to strengthen the security of password-based authentication by adding another factor, such as hardware tokens or one-time passwords using mobile apps. However, this increased authentication security comes with potential drawbacks that can lead to account and asset loss. If users lose access to their additional authentication factors for any reason, they will… ▽ More

    Submitted 19 September, 2023; v1 submitted 16 June, 2023; originally announced June 2023.

  7. arXiv:2302.14326  [pdf, other

    cs.CR cs.CY

    Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations

    Authors: Tadayoshi Kohno, Yasemin Acar, Wulf Loh

    Abstract: The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be "morally good" or at least "morally allowed / acceptable". Among philosophy's contributions are (1) frameworks for evaluating the morality of actions -- including the well-established consequentialist and deontological frameworks -- a… ▽ More

    Submitted 4 August, 2023; v1 submitted 28 February, 2023; originally announced February 2023.

    Comments: In USENIX Security, 2023. For project web page, see https://securityethics.cs.washington.edu/

  8. arXiv:2302.05351  [pdf, other

    cs.HC cs.SE

    Beyond the Boolean: How Programmers Ask About, Use, and Discuss Gender

    Authors: Elijah Bouma-Sims, Yasemin Acar

    Abstract: Categorization via gender is omnipresent throughout society, and thus also computing; gender identity is often requested of users before they use software or web services. Despite this fact, no research has explored how software developers approach requesting gender disclosure from users. To understand how developers think about gender in software, we present an interview study with 15 software de… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

    Comments: To appear at CSCW 2023 and in Proc. ACM Hum.-Comput. Interact., Vol. 7, No. CSCW1, Article 28. (April 2023)

  9. Digital Security -- A Question of Perspective. A Large-Scale Telephone Survey with Four At-Risk User Groups

    Authors: Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse

    Abstract: This paper investigates the digital security experiences of four at-risk user groups in Germany, including older adults (70+), teenagers (14-17), people with migration backgrounds, and people with low formal education. Using computer-assisted telephone interviews, we sampled 250 participants per group, representative of region, gender, and partly age distributions. We examine their device usage, c… ▽ More

    Submitted 12 September, 2023; v1 submitted 25 December, 2022; originally announced December 2022.

  10. A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries

    Authors: Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth

    Abstract: Misconceptions about digital security and privacy topics in the general public frequently lead to insecure behavior. However, little is known about the prevalence and extent of such misconceptions in a global context. In this work, we present the results of the first large-scale survey of a global population on misconceptions: We conducted an online survey with n = 12, 351 participants in 12 count… ▽ More

    Submitted 22 December, 2022; v1 submitted 20 December, 2022; originally announced December 2022.

  11. arXiv:2212.08396  [pdf, ps, other

    cs.HC cs.CR cs.CY cs.SE

    "We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups

    Authors: Dilara Keküllüoğlu, Yasemin Acar

    Abstract: Security and privacy are often neglected in software development, and rarely a priority for developers. This insight is commonly based on research conducted by researchers and on developer populations living and working in the United States, Europe, and the United Kingdom. However, the production of software is global, and crucial populations in important technology hubs are not adequately studied… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

    Comments: In Proceedings of the 44th IEEE Symposium on Security and Privacy (IEEESP'23)

  12. arXiv:2211.06213  [pdf, other

    cs.CR

    Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories

    Authors: Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl

    Abstract: Version control systems for source code, such as Git, are key tools in modern software development environments. Many developers use online services, such as GitHub or GitLab, for collaborative software development. While software projects often require code secrets to work, such as API keys or passwords, they need to be handled securely within the project. Previous research and news articles have… ▽ More

    Submitted 14 November, 2022; v1 submitted 11 November, 2022; originally announced November 2022.

  13. arXiv:2208.11581  [pdf, other

    cs.CR

    "Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine

    Authors: Juliane Schmüser, Noah Wöhler, Harshini Sri Ramulu, Christian Stransky, Dominik Wermke, Sascha Fahl, Yasemin Acar

    Abstract: The Russian Invasion of Ukraine in early 2022 resulted in a rapidly changing (cyber) threat environment. This changing environment incentivized the sharing of security advice on social media, both for the Ukrainian population, as well as against Russian cyber attacks at large. Previous research found a significant influence of online security advice on end users. We collected 8,920 tweets posted… ▽ More

    Submitted 24 August, 2022; originally announced August 2022.

    Comments: 18 pages, 2 figures

  14. arXiv:1801.02742  [pdf, other

    cs.CR

    A Large Scale Investigation of Obfuscation Use in Google Play

    Authors: Dominik Wermke, Nicolas Huaman, Yasemin Acar, Brad Reaves, Patrick Traynor, Sascha Fahl

    Abstract: Android applications are frequently plagiarized or repackaged, and software obfuscation is a recommended protection against these practices. However, there is very little data on the overall rates of app obfuscation, the techniques used, or factors that lead to developers to choose to obfuscate their apps. In this paper, we present the first comprehensive analysis of the use of and challenges to s… ▽ More

    Submitted 20 February, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

  15. arXiv:1710.03135  [pdf, other

    cs.CR

    Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security

    Authors: Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl

    Abstract: Online programming discussion platforms such as Stack Overflow serve as a rich source of information for software developers. Available information include vibrant discussions and oftentimes ready-to-use code snippets. Anecdotes report that software developers copy and paste code snippets from those information sources for convenience reasons. Such behavior results in a constant flow of community-… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.