Follow
Christian Stransky
Christian Stransky
CISPA Helmholtz Center for Information Security, Germany
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
You Get Where You’re Looking For: The Impact of Information Sources on Code Security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2942016
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
Security and Privacy (SP), 2017 IEEE Symposium on, 121-136, 2017
2622017
Stack Overflow Considered Harmful?
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
The Impact of Copy & Paste on Android Application Security. CoRR abs/1710.03135, 2017
262*2017
Comparing the Usability of Cryptographic APIs
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
Proceedings of the 38th IEEE Symposium on Security and Privacy, 2017
2412017
Security Developer Studies with GitHub Users: Exploring a Convenience Sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Symposium on Usable Privacy and Security (SOUPS), 2017
1112017
Developers Need Support, Too: A Survey of Security Advice for Software Developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
Cybersecurity Development (SecDev), 2017 IEEE, 22-26, 2017
1002017
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic {API} Misuse
PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 265-281, 2018
732018
The rise of the citizen developer: Assessing the security impact of online app generators
M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ...
2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018
542018
How Internet Resources Might Be Helping You Develop Faster but Less Securely
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
IEEE Security & Privacy 15 (2), 50-60, 2017
352017
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers
C Stransky, Y Acar, DC Nguyen, D Wermke, EM Redmiles, D Kim, ...
Proc. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET …, 2017
322017
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security
C Stransky, D Wermke, J Schrader, N Huaman, Y Acar, AL Fehlhaber, ...
In Proceedings of Seventeenth Symposium on Usable Privacy and Security …, 2021
152021
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises
N Huaman, B von Skarczinski, C Stransky, D Wermke, Y Acar, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
82021
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites
D Wermke, N Huaman, C Stransky, N Busch, Y Acar, S Fahl
Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 359-377, 2020
62020
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University
C Stransky, O Wiese, V Roth, Y Acar, S Fahl
Proc. 43rd IEEE Symposium on Security and Privacy (SP’22). IEEE, 2022
52022
Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications
D Wermke, C Stransky, N Huaman, N Busch, A Krause, Y Acar, S Fahl
POSTER: On the Effect of Security Warnings on Cryptographic API Misuse
PL Gorski, LL Iacono, Y Acar, S Moeller, C Stransky, S Fahl
POSTER: Towards Ecological Validity for Password Alternative User Studies
Y Acar, M Backes, SFM Koch, C Stransky
POSTER: When Laziness Snaps Back The Impact of Code Generators on App (In) Security
Y Acar, M Backes, S Fahl, C Stransky
The system can't perform the operation now. Try again later.
Articles 1–18