Zobrazeno 1 - 10
of 113
pro vyhledávání: '"Açar, Yasemin"'
In 2023, Sonatype reported a 200\% increase in software supply chain attacks, including major build infrastructure attacks. To secure the software supply chain, practitioners can follow security framework guidance like the Supply-chain Levels for Sof
Externí odkaz:
http://arxiv.org/abs/2409.05014
Autor:
Zahan, Nusrat, Acar, Yasemin, Cukier, Michel, Enck, William, Kästner, Christian, Kapravelos, Alexandros, Wermke, Dominik, Williams, Laurie
Cyber attacks leveraging or targeting the software supply chain, such as the SolarWinds and the Log4j incidents, affected thousands of businesses and their customers, drawing attention from both industry and government stakeholders. To foster open di
Externí odkaz:
http://arxiv.org/abs/2408.16529
Autor:
Tystahl, Greg, Acar, Yasemin, Cukier, Michel, Enck, William, Kastner, Christian, Kapravelos, Alexandros, Wermke, Dominik, Williams, Laurie
Supply chain security has become a very important vector to consider when defending against adversary attacks. Due to this, more and more developers are keen on improving their supply chains to make them more robust against future threats. On March 7
Externí odkaz:
http://arxiv.org/abs/2405.08762
Autor:
Klemmer, Jan H., Gutfleisch, Marco, Stransky, Christian, Acar, Yasemin, Sasse, M. Angela, Fahl, Sascha
Usable and secure authentication on the web and beyond is mission-critical. While password-based authentication is still widespread, users have trouble dealing with potentially hundreds of online accounts and their passwords. Alternatives or extensio
Externí odkaz:
http://arxiv.org/abs/2309.00744
Autor:
Enck, William, Acar, Yasemin, Cukier, Michel, Kapravelos, Alexandros, Kästner, Christian, Williams, Laurie
Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4
Externí odkaz:
http://arxiv.org/abs/2308.06850
Autor:
Dunlap, Trevor, Acar, Yasemin, Cucker, Michel, Enck, William, Kapravelos, Alexandros, Kastner, Christian, Williams, Laurie
Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4
Externí odkaz:
http://arxiv.org/abs/2307.16557
Autor:
Tran, Mindy, Acar, Yasemin, Cucker, Michel, Enck, William, Kapravelos, Alexandros, Kastner, Christian, Williams, Laurie
Recent years have shown increased cyber attacks targeting less secure elements in the software supply chain and causing fatal damage to businesses and organizations. Past well-known examples of software supply chain attacks are the SolarWinds or log4
Externí odkaz:
http://arxiv.org/abs/2307.15642
Autor:
Amft, Sabrina, Höltervennhoff, Sandra, Huaman, Nicolas, Krause, Alexander, Simko, Lucy, Acar, Yasemin, Fahl, Sascha
Multi-Factor Authentication is intended to strengthen the security of password-based authentication by adding another factor, such as hardware tokens or one-time passwords using mobile apps. However, this increased authentication security comes with
Externí odkaz:
http://arxiv.org/abs/2306.09708
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be "morally good" or at least "morally allowed / acceptable". Among philosophy's contri
Externí odkaz:
http://arxiv.org/abs/2302.14326
Autor:
Bouma-Sims, Elijah, Acar, Yasemin
Categorization via gender is omnipresent throughout society, and thus also computing; gender identity is often requested of users before they use software or web services. Despite this fact, no research has explored how software developers approach r
Externí odkaz:
http://arxiv.org/abs/2302.05351