Items where Author is "Smith, Matthew"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 13.

Book Section

Fahl, Sascha and Harbach, Marian and Oltrogge, Marten and Muders, Thomas and Smith, Matthew
(2013) Hey, You, Get Off of My Clipboard.
In: UNSPECIFIED Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 144-161. ISBN 978-3-642-39884-1
(Unpublished)

Conference or Workshop Item

Krombholz, Katharina and Busse, Karoline and Pfeffer, Katharina and Smith, Matthew and von Zezschwitz, Emanuel
(2019) "If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
In: S&P 2019.
Conference: S&P - IEEE Symposium on Security and Privacy

Krombholz, Katharina and Dabrowski, Adrian and Smith, Matthew and Weippl, Edgar
(2017) Exploring Design Directions for Wearable Privacy.
In: USEC'17.
Conference: NDSS - Network and Distributed System Security Symposium

Schürmann, Dominik and Busse, Karoline and Smith, Matthew and Fahl, Sascha and Dechand, Sergej and Acar, Yasemin
(2016) An Empirical Study of Textual Key-Fingerprint Representations.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security - Usenix Security Symposium

Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016) SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: S&P - IEEE Symposium on Security and Privacy

Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha
(2015) To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections.
In: 24th USENIX Security Symposium (USENIX Security 15).
Conference: USENIX-Security - Usenix Security Symposium

Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin
(2015) Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits.
In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS - ACM Conference on Computer and Communications Security

Unger, Nik and Dechand, Sergej and Bonneau, Joseph and Fahl, Sascha and Perl, Henning and Goldberg, Ian and Smith, Matthew
(2015) SoK: Secure Messaging.
In: 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015.
Conference: S&P - IEEE Symposium on Security and Privacy

Fahl, Sascha and Dechand, Sergej and Perl, Henning and Fischer, Felix and Smrcek, Jaromir and Smith, Matthew
(2014) Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.
In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014.
Conference: None | Not Set

Harbach, Marian and Fahl, Sascha and Smith, Matthew
(2014) Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness.
In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Fahl, Sascha and Acar, Yasemin and Perl, Henning and Smith, Matthew
(2014) Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations.
In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014.
Conference: None | Not Set

Perl, Henning and Fahl, Sascha and Smith, Matthew
(2014) You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores.
In: Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers.
Conference: None | Not Set

Fahl, Sascha and Harbach, Marian and Muders, Thomas and Baumgärtner, Lars and Freisleben, Bernd and Smith, Matthew
(2012) Why Eve and Mallory Love Android: An Analysis of Android SSL (in)Security.
In: Proceedings of the 2012 ACM Conference on Computer and Communications Security.
Conference: CCS - ACM Conference on Computer and Communications Security

This list was generated on Mon Apr 22 00:03:35 2019 CEST.