default search action
Dominik Wermke
Person information
- affiliation: North Carolina State University, Raleigh, NC, USA
- affiliation (former): CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- affiliation (former): Leibniz University Hannover, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Juliane Schmüser, Harshini Sri Ramulu, Noah Wöhler, Christian Stransky, Felix Bensmann, Dimitar Dimitrov, Sebastian Schellhammer, Dominik Wermke, Stefan Dietze, Yasemin Acar, Sascha Fahl:
Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on Twitter. CHI 2024: 574:1-574:16 - [c20]Lina Boughton, Courtney Miller, Yasemin Acar, Dominik Wermke, Christian Kästner:
Decomposing and Measuring Trust in Open-Source Software Supply Chains. NIER@ICSE 2024: 57-61 - [c19]Rami Sammak, Anna Lena Rotthaler, Harshini Sri Ramulu, Dominik Wermke, Yasemin Acar:
Developers' Approaches to Software Supply Chain Security: An Interview Study. SCORED@CCS 2024: 56-66 - [c18]Dominik Wermke, Jan H. Klemmer, Noah Wöhler, Juliane Schmüser, Harshini Sri Ramulu, Yasemin Acar, Sascha Fahl:
Always Contribute Back: A Qualitative Study on Security Challenges of the Open Source Supply Chain. Software Engineering 2024: 139-140 - [c17]Dominik Wermke, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, Sascha Fahl:
Committed to Trust: A Qualitative Study on Security and Trust in Open Source Software Projects. Software Engineering 2024: 141-142 - [c16]Harshini Sri Ramulu, Helen Schmitt, Dominik Wermke, Yasemin Acar:
Security and Privacy Software Creators' Perspectives on Unintended Consequences. USENIX Security Symposium 2024 - [i6]Greg Tystahl, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, Laurie A. Williams:
S3C2 Summit 2024-03: Industry Secure Supply Chain Summit. CoRR abs/2405.08762 (2024) - [i5]Imranur Rahman, Ranidya Paramitha, Henrik Plate, Dominik Wermke, Laurie A. Williams:
Less Is More: A Mixed-Methods Study on Security-Sensitive API Calls in Java for Better Dependency Selection. CoRR abs/2408.02846 (2024) - [i4]Nusrat Zahan, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, Laurie A. Williams:
S3C2 Summit 2023-11: Industry Secure Supply Chain Summit. CoRR abs/2408.16529 (2024) - 2023
- [b1]Dominik Wermke:
Security considerations in the open source software ecosystem. Leibniz University Hannover, Germany, Germany, 2023 - [j1]Marcel Fourné, Dominik Wermke, Sascha Fahl, Yasemin Acar:
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. IEEE Secur. Priv. 21(6): 59-63 (2023) - [c15]Marcel Fourné, Dominik Wermke, William Enck, Sascha Fahl, Yasemin Acar:
It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. SP 2023: 1527-1544 - [c14]Dominik Wermke, Jan H. Klemmer, Noah Wöhler, Juliane Schmüser, Harshini Sri Ramulu, Yasemin Acar, Sascha Fahl:
"Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain. SP 2023: 1545-1560 - [c13]Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl:
Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories. USENIX Security Symposium 2023: 2527-2544 - 2022
- [c12]Nicolas Huaman, Alexander Krause, Dominik Wermke, Jan H. Klemmer, Christian Stransky, Yasemin Acar, Sascha Fahl:
If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers. SOUPS @ USENIX Security Symposium 2022: 313-330 - [c11]Dominik Wermke, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, Sascha Fahl:
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. SP 2022: 1880-1896 - [i3]Juliane Schmüser, Noah Wöhler, Harshini Sri Ramulu, Christian Stransky, Dominik Wermke, Sascha Fahl, Yasemin Acar:
"Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine. CoRR abs/2208.11581 (2022) - [i2]Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl:
Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories. CoRR abs/2211.06213 (2022) - 2021
- [c10]Maximilian Häring, Eva Gerlitz, Christian Tiefenau, Matthew Smith, Dominik Wermke, Sascha Fahl, Yasemin Acar:
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany. SOUPS @ USENIX Security Symposium 2021: 77-98 - [c9]Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, Sascha Fahl:
On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. SOUPS @ USENIX Security Symposium 2021: 437-454 - [c8]Nicolas Huaman, Bennet von Skarczinski, Christian Stransky, Dominik Wermke, Yasemin Acar, Arne Dreißigacker, Sascha Fahl:
A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises. USENIX Security Symposium 2021: 1235-1252 - 2020
- [c7]Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, Sascha Fahl:
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites. SOUPS @ USENIX Security Symposium 2020: 359-377
2010 – 2019
- 2018
- [c6]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. ACSAC 2018: 222-235 - [c5]Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl:
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. SOUPS @ USENIX Security Symposium 2018: 265-281 - [i1]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. CoRR abs/1801.02742 (2018) - 2017
- [c4]Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl:
A Stitch in Time: Supporting Android Developers in WritingSecure Code. CCS 2017: 1065-1077 - [c3]Yasemin Acar, Christian Stransky, Dominik Wermke, Charles Weir, Michelle L. Mazurek, Sascha Fahl:
Developers Need Support, Too: A Survey of Security Advice for Software Developers. SecDev 2017: 22-26 - [c2]Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl:
Security Developer Studies with GitHub Users: Exploring a Convenience Sample. SOUPS 2017: 81-95 - [c1]Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, Sascha Fahl:
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. CSET @ USENIX Security Symposium 2017
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint