Sven Bugiel
Affiliations:- CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
According to our database1,
Sven Bugiel
authored at least 51 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors (Technical Report).
CoRR, 2023
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
2022
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version).
CoRR, 2022
2021
CoRR, 2021
Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions.
Proceedings of the 30th USENIX Security Symposium, 2021
A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
Proceedings of the 30th USENIX Security Symposium, 2021
Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
Proceedings of the 27th USENIX Security Symposium, 2018
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
login Usenix Mag., 2016
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
2014
Android Security Framework: Enabling Generic and Extensible Access Control on Android.
CoRR, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the SPSM'11, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Implementing an application-specific credential platform using late-launched mobile trusted module.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
2009
Trust in a small package: minimized MRTM software implementation for mobile secure environments.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009