Security Professionals

'I’m trying to learn…and I’m shooting myself in the foot': Beginners’ Struggles When Solving Binary Exploitation Exercises

'Threat modeling is very formal, it’s very technical, and also very hard to do correctly': Investigating Threat Modeling Practices in Open-Source Software Projects

An Investigation of Interaction and Information Needs for Protocol Reverse Engineering Automation

Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges

Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

Understanding the How and the Why: Exploring Secure Development Practices Through a Course Competition

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It

The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level

Toward a Field Study on the Impact of Hacking Competitions on Secure Development

Hackers vs Testers: A Comparison of Software Vulnerability Discovery Processes