Marcel Fourné

Orcid: 0000-0003-4442-0085

According to our database1, Marcel Fourné authored at least 13 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
Human factors in open source security.
PhD thesis, 2024

"These results must be false": A usability evaluation of constant-time analysis tools.
IACR Cryptol. ePrint Arch., 2024

"You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic Standards.
Proceedings of the 33rd USENIX Security Symposium, 2024

Committed to Trust: A Qualitative Study on Security and Trust in Open Source Software Projects.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024

They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024

2023
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda.
IEEE Secur. Priv., 2023

It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks.
IACR Cryptol. ePrint Arch., 2021

2018
Can Verification of Cryptographic Libraries be liberated from the von Neumann Style?
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018

2014
Aggregation of Network Protocol Data Near Its Source.
Proceedings of the Information and Communication Technology, 2014

2013
Attack-Test and Verification Systems, steps towards verifiable Anomaly Detection.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013


  Loading...