Christian Stransky
Christian Stransky
Verified email at sec.uni-hannover.de - Homepage
Title
Cited by
Cited by
Year
You Get Where You’re Looking For: The Impact of Information Sources on Code Security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
1882016
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
Security and Privacy (SP), 2017 IEEE Symposium on, 121-136, 2017
1572017
Stack Overflow Considered Harmful?
F Fischer, K Böttinger, H Xiao, C Stransky, Y Acar, M Backes, S Fahl
The Impact of Copy & Paste on Android Application Security. CoRR abs/1710.03135, 2017
157*2017
Comparing the Usability of Cryptographic APIs
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
Proceedings of the 38th IEEE Symposium on Security and Privacy, 2017
1562017
Security Developer Studies with GitHub Users: Exploring a Convenience Sample
Y Acar, C Stransky, D Wermke, ML Mazurek, S Fahl
Symposium on Usable Privacy and Security (SOUPS), 2017
672017
Developers Need Support, Too: A Survey of Security Advice for Software Developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
Cybersecurity Development (SecDev), 2017 IEEE, 22-26, 2017
562017
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic {API} Misuse
PL Gorski, LL Iacono, D Wermke, C Stransky, S Möller, Y Acar, S Fahl
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 265-281, 2018
342018
The rise of the citizen developer: Assessing the security impact of online app generators
M Oltrogge, E Derr, C Stransky, Y Acar, S Fahl, C Rossow, G Pellegrino, ...
2018 IEEE Symposium on Security and Privacy (SP), 634-647, 2018
252018
How Internet Resources Might Be Helping You Develop Faster but Less Securely
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
IEEE Security & Privacy 15 (2), 50-60, 2017
222017
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers
C Stransky, Y Acar, DC Nguyen, D Wermke, EM Redmiles, D Kim, ...
Proc. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET …, 2017
192017
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites
D Wermke, N Huaman, C Stransky, N Busch, Y Acar, S Fahl
Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 359-377, 2020
2020
Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications
D Wermke, C Stransky, N Huaman, N Busch, A Krause, Y Acar, S Fahl
POSTER: On the Effect of Security Warnings on Cryptographic API Misuse
PL Gorski, LL Iacono, Y Acar, S Moeller, C Stransky, S Fahl
POSTER: Towards Ecological Validity for Password Alternative User Studies
Y Acar, M Backes, SFM Koch, C Stransky
POSTER: When Laziness Snaps Back The Impact of Code Generators on App (In) Security
Y Acar, M Backes, S Fahl, C Stransky
The system can't perform the operation now. Try again later.
Articles 1–15