• M. Oltrogge Y. Acar, S. Dechand, M. Smith, S. Fahl: To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections, USENIX Security 2015


  • N. Unger, S. Dechand, J. Bonneau, S. Fahl, H. Perl, I. Goldberg, M. Smith: SoK: Secure Messaging, IEEE Security & Privacy 2015


  • K. Yakdan, S. Eschweiler, E. Gerhards-Padilla M. Smith: No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations, NDSS 2015 (Distinguished Paper Award)


  • S. Fahl, S. Dechand, H. Perl, F. Fischer, J. Smrcek, M.Smith: Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers, ACM CCS 2014


  • M. Harbach, M. Hettig, S. Weber, M. Smith: Using Personal Examples to Improve Risk Communication for Security and Privacy Decisions, ACM SIGCHI 2014


  • M. Harbach, E. von Zezschwitz, A. Fichtner, A. De Luca, M. Smith: It’s a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception, Symposium on Usable Privacy and Security, SOUPS 2014



  • M Harbach, S Fahl, M Rieger, M Smith: On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards, PETS 2013



  • S. Fahl, M. Harbach, T. Muders, L. Baumgärtner, B. Freisleben, M. Smith: Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security, ACM CCS 2012


Full publication list can be found at:




Institute of Computer Science 4

Friedrich-Ebert-Allee 144

53113 Bonn



Phone: +49 228 73 54 218

Fax: +49 228 73-4571


Room: II.36






Copyright © All Rights Reserved