Dr.-Ing. Marco Gutfleisch

HUMAN-CENTRED SECURITY

Postdoc

Address:
Ruhr University Bochum
Faculty of Computer Science
Human-Centred Security
Universitätsstr. 150
D-44801 Bochum

Room: MB 2/172

Telephone: (+49)(0)234 / 32 – 25715

Office Hours: By arrangement

E-Mail: marco.gutfleisch@rub.de

Publications

2025

[1]
F. Reichmann, J. Opdenbusch, K. Marky, and M. Gutfleisch, ‘Security knight in shining armor: what and who VPN providers claim to shield consumers against’, in CHI ’25, Yokohama, Japan, Apr. 2025, doi: 10.1145/3706598.3713980.
[2]
N. Houda, M. Gutfleisch, and A. Naiakshina, ‘Relationship status: “It’s complicated”: developer-security expert dynamics in Scrum’, in 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE), Ottawa, Ontario, Canada, 2025, pp. 657–657, doi: 10.1109/icse55347.2025.00120.

2024

[1]
S. Andreina et al., ‘Defying the odds: Solana’s unexpected resilience in spite of the security challenges faced by developers’, Jun. 19, 2024. .
[2]
S. Andreina et al., ‘Defying the odds: solana’s unexpected resilience in spite of the security challenges faced by developers’, in Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, Salt Lake City, Dec. 2024, pp. 4226–4240, doi: 10.1145/3658644.3670333.
[3]
M. Schöps, M. Gutfleisch, E. Wolter, and M. A. Sasse, ‘Simulated stress: a case study of the effects of a simulated phishing campaign on employees’ perception, stress and self-efficacy’, in 33rd USENIX Security Symposium, Philadelphia, PA, 2024, pp. 4589–4606, doi: 10.6084/m9.figshare.25990963.
[4]
J. Hielscher et al., ‘Selling satisfaction: a qualitative analysis of cybersecurity awareness vendors’ promises’, in Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, Salt Lake City, Dec. 2024, pp. 2666–2680, doi: 10.1145/3658644.3690196.

2023

[1]
S. Horstmann et al., ‘“Those things are written by lawyers, and programmers are reading that.” Mapping the communication gap between software developers and privacy experts’, Proceedings on privacy enhancing technologies, vol. 2024, no. 1, pp. 151–170, Oct. 2023, doi: 10.56553/popets-2024-0010.
[2]
J. H. Klemmer, M. Gutfleisch, C. Stransky, Y. Acar, M. A. Sasse, and S. Fahl, ‘“Make them change it every week!”: a qualitative exploration of online developer advice on usable and secure authentication’, in CCS ’23, Kopenhagen, Nov. 2023, pp. 2740–2754, doi: 10.1145/3576915.3623072.
[3]
M. Gutfleisch, M. Schöps, S. Horstmann, D. Wichmann, and M. A. Sasse, ‘Security champions without support: results from a case study with OWASP SAMM in a large-scale e-commerce enterprise’, in Proceedings of the 2023 European Symposium on Usable Security, Copenhagen, Denmark, Oct. 2023, pp. 260–276, doi: 10.1145/3617072.3617115.
[4]
R. Serafini, M. Gutfleisch, S. Horstmann, and A. Naiakshina, ‘On the recruitment of company developers for security studies: results from a qualitative interview study’, in Proceedings of the Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), Anaheim, CA, 2023, pp. 321–340.

2022

[1]
M. Gutfleisch, J. H. Klemmer, N. Busch, Y. Acar, M. A. Sasse, and S. Fahl, ‘How does usable security (not) end up in software products?: Results from a qualitative interview study’, in 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2022, pp. 171–188, doi: 10.1109/sp46214.2022.00011 [Online]. Available: https://casa.rub.de/fileadmin/img/Publikationen_PDFs/2022_How_Does_Usable_Security__Not__End_Up_in_Software_Products_Results_From_a_Qualitative_Interview_Study_Publication_ClusterofExcellence_CASA_Bochum.pdf
[2]
M. A. Sasse, J. Hielscher, and M. Gutfleisch, ‘Human-Centred Security: Unfug Informationssicherheits-Sensibilisierung’, Kma , vol. 27, no. 4, pp. 44–46, Apr. 2022, doi: 10.1055/s-0042-1748095. [Online]. Available: https://www.thieme-connect.de/products/ejournals/abstract/10.1055/s-0042-1748095
[3]
M. Gutfleisch et al., ‘Caring about IoT-security: an interview study in the healthcare sector’, in Proceedings of the 2022 European symposium on usable security, Karlsruhe, Sep. 2022, pp. 202–215, doi: 10.1145/3549015.3554209 [Online]. Available: https://dl.acm.org/doi/pdf/10.1145/3549015.3554209
[4]
M. Gutfleisch, M. Schöps, S. Sayin, F. Wende, and M. A. Sasse, ‘Putting security on the table: the digitalisation of security tabletop games and its challenging aftertaste’, in 2022 ACM/IEEE 44th International Conference on Software Engineering: software engineering education and training, Pittsburgh, Pennsylvania, Jun. 2022, pp. 217–222, doi: 10.1109/icse-seet55299.2022.9794181.

2021

[1]
M. Gutfleisch, M. Peiffer, S. Erk, and A. Million, ‘Microsoft Office macro warnings: a design comedy of errors with tagic security consequences’, Oct. 11, 2021.
[2]
M. Gutfleisch, M. Peiffer, S. Erk, and M. A. Sasse, ‘Microsoft Office macro warnings: a design comedy of errors with tragic security consequences’, in Proceedings of the 2021 European symposium on usable security, Karlsruhe, Dec. 2021, pp. 9–22, doi: 10.1145/3481357.3481512.