Papers

S. Türpe und A. Poller: „Erfolgsfaktoren für den Datenschutz durch Technikgestaltung,” eingereicht und angenommen für den Konferenzband „Die Fortentwicklung des Datenschutzes” (http://dx.doi.org/10.1007/978-3-658-23727-1), dort jedoch aufgrund unannehmbarer Forderungen und mangelnder Verhandlungsbereitschaft des Verlags nicht veröffentlicht, 2018.

S. Türpe and A. Poller, “Managing Security Work in Scrum: Tensions and Challenges,” in Proceedings of the International Workshop on Security in DevOps and Agile Secure Software Engineering (SecSE 2017), 2017, vol. 1977.

S. Türpe, “The Trouble With Security Requirements,” in IEEE 25th International Requirements Engineering Conference (RE’17), 2017, pp. 122–133.

A. Poller, L. Kocksch, S. Türpe, F. A. Epp, and K. Kinder-Kurlanda, “Can Security Become a Routine? A Study of Organizational Change in an Agile Software Development Group,” in Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing – CSCW ’17, 2017, pp. 2489–2503.

S. Türpe, J. Geuter, and A. Poller, “Emission statt Transaktion,” in Informationelle Selbstbestimmung im digitalen Wandel, M. Friedewald, J. Lamla, and A. Roßnagel, Eds. Wiesbaden: Springer Fachmedien Wiesbaden, 2017, pp. 227–248.

S. Türpe, L. Kocksch, and A. Poller, “Penetration Tests a Turning Point in Security Practices? Organizational Challenges and Implications in a Software Development Team,” in 2nd Workshop on Security Information Workers, 2016.

S. Türpe, “Idea: Usable platforms for secure programming — mining Unix for insight and guidelines,” in Engineering Secure Software and Systems (ESSoS), 2016, vol. 9639.

J. Whitmore, S. Türpe, S. Triller, A. Poller, and C. Carlson, “Threat analysis in the software development lifecycle,” IBM J. Res. Dev., vol. 58, no. 1, p. 6:1-6:13, Jan. 2014.

A. Poller, S. Türpe, and K. Kinder-Kurlanda, “An asset to security modeling? Analyzing stakeholder collaborations instead of threats to assets,” in Proceedings of the 2014 workshop on New Security Paradigms Workshop – NSPW, 2014, pp. 69–82.

S. Türpe, A. Selzer, A. Poller, and M. Bedner, “Denkverbote für Star-Trek-Computer?” Datenschutz und Datensicherheit – DuD, vol. 38, no. 1, pp. 31–35, Jan. 2014.

S. Türpe, “Point-and-Shoot Security Design: Can We Build Better Tools for Developers?” in Proc. New Security Paradigms Workshop, 2012, pp. 27–42.

S. Türpe, “Warum Googles Datensammeln gar nicht so böse ist,” golem.de, 2012. [Online]. Available: http://www.golem.de/news/imho-warum-googles-datensammeln-gar-nicht-so-boese-ist-1203-90241.html.

A. Poller, U. Waldmann, S. Vowé, and S. Türpe, “Electronic identity cards for user authentication—promise and practice,” IEEE Secur. Priv., vol. 10, no. 1, pp. 46–54, 2012.

S. Türpe, “Search-based application security testing: Towards a structured search space,” in Proceedings – 4th IEEE International Conference on Software Testing, Verification, and Validation Workshops, ICSTW 2011, 2011.

T. Heumann, S. Türpe, J. Keller, and S. Türpe, “Quantifying the Attack Surface of a Web Application,” in Sicherheit 2010: Sicherheit, Schutz und Zuverlässigkeit. Beiträge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) 5.-7. Oktober 2010 in Berlin, 2010, vol. P-170, pp. 305–316.

J. Eichler and S. Türpe, “Produktivsysteme sicher testen,” <kes>, no. 2, 2010.

S. Türpe, A. Poller, J. Steffan, J.-P. J. P. Stotz, and J. Trukenmüller, “Attacking the Bitlocker boot process,” in Proceedings Trust’09, 2009, vol. 5471 LNCS, pp. 183–196.

S. Türpe and J. Eichler, “Testing production systems safely: Common precautions in penetration testing,” in TAIC PART 2009 – Testing: Academic and Industrial Conference – Practice and Research Techniques, 2009, pp. 205–209.

S. Türpe, “What is the shape of your security policy? Security as a classification problem,” in Proceedings New Security Paradigms Workshop, 2009, pp. 23–36.

S. Türpe, A. Poller, J. Trukenmüller, J. Repp, and C. Bornmann, “Supporting security testers in discovering injection flaws,” in Proceedings – Testing: Academic and Industrial Conference Practice and Research Techniques, TAIC PART 2008, 2008, pp. 1–5.

S. Türpe, “Security Testing: Turning Practice into Theory,” in 1st International ICST workshop on Security Testing, 9 April 2008, Lillehammer, 2008, pp. 294–302.

J. Steffan, A. Poller, J. Trukenmüller, J.-P. Stotz, and S. Türpe, “BitLocker Drive Encryption im mobilen und stationären Unternehmenseinsatz: ein Leitfaden für Anwender.” Fraunhofer-Institut SIT und BSI, Mar-2008.

S. Türpe, “When it comes to testing, is usability the closest analogy to security?,” in 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW’08, 2008.

S. Türpe, “Exploiting Trust in Bad Faith,” in Workshop “Considering Trust in Ambient Societies,” 2004.

S. Türpe and A. Baumann, “Phishing-Schutz im Online-Banking – Hilfe zum Selbstschutz für Nutzer.” Fraunhofer SIT, Oct-2004.

M. Zapf, R. Reinema, R. Wolf, and S. Türpe, “UNITE – An Agent-Oriented Teamwork Environment,” in Mobile Agents for Telecommunication Applications – Proceedings MATA’02, 2002, vol. 2521, pp. 302–315.

S. Türpe, “Kinderleicht wie ein Computerspiel?” in Informatik 2001: Wirtschaft und Wissenschaft in der Network Economy – Visionen und Wirklichkeit, Tagungsband der GI/OCG-Jahrestagung, 25.-28. September 2001, Universität Wien, 2001, pp. 1239–1246.

S. Türpe, “Entwicklung eines Systems zur dezentralen Online-Ticketerstellung und -kontrolle,” Universtität Leipzig, 1998.