Author of the publication

Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories.

, , , , , and . USENIX Security Symposium, page 2527-2544. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hey, You, Get Off of My Clipboard, , , , and . Financial Cryptography and Data Security, volume 7859 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications, , , , , , and . In 41st IEEE Symposium on Security and Privacy, IEEE S&P 2020, May 18-20, 2020, (May 2020)Securing Your Crypto-API Usage Through Tool Support - A Usability Study., , , , , , , , and . SecDev, page 14-25. IEEE, (2023)"Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup., , , , and . SOUPS, page 171-190. USENIX Association, (2023)If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers., , , , , , and . SOUPS @ USENIX Security Symposium, page 313-330. USENIX Association, (2022)Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs., , , and . CHI, page 1-13. ACM, (2020)"You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic Standards., , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)How Internet Resources Might Be Helping You Develop Faster but Less Securely., , , , , and . IEEE Security & Privacy, 15 (2): 50-60 (2017)Poster: Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , and . In Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, (August 2018)(Un)informed Consent: Studying GDPR Consent Notices in the Field., , , , and . ACM Conference on Computer and Communications Security, page 973-990. ACM, (2019)