Alexander Krause
Alexander Krause
Home
Publications
Contact
Light
Dark
Automatic
Paper-Conference
“That’s my perspective from 30 years of doing this”: An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code
Keeping cryptographic code up to date and free of vulnerabilities is critical for overall software security. Updating algorithms (e.g., …
Alexander Krause
,
Harjot Kaur
,
Jan H. Klemmer
,
Oliver Wiese
,
Sascha Fahl
PDF
Cite
Skipping the Security Side Quests: A Qualitative Study on Security Practices and Challenges in Game Development
The video game market is one of the biggest for software products. Video game development has progressed in the last decades, from its …
Philip Klostermeyer
,
Sabrina Klivan
,
Sandra Höltervennhoff
,
Alexander Krause
,
Sascha Fahl
PDF
Cite
DOI
"We have Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments
Multi-Factor Authentication is intended to strengthen the security of password-based authentication by adding another factor, such as …
Sabrina Klivan
,
Sandra Höltervennhoff
,
Nicolas Huaman
,
Alexander Krause
,
Lucy Simko
,
Yasemin Acar
,
Sascha Fahl
PDF
Cite
DOI
Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories
Version control systems for source code, such as Git, are key tools in modern software development. Many developers use services like …
Alexander Krause
,
Jan H. Klemmer
,
Nicolas Huaman
,
Dominik Wermke
,
Yasemin Acar
,
Sascha Fahl
PDF
Cite
Dataset
Slides
Video
Paper at USENIX
If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers
Usable security and privacy researchers use many study methodologies, including interviews, surveys, and laboratory studies. Of those, …
Nicolas Huaman
,
Alexander Krause
,
Dominik Wermke
,
Jan H. Klemmer
,
Christian Stransky
,
Yasemin Acar
,
Sascha Fahl
PDF
Cite
Slides
Video
Paper at SOUPS
Cite
×