Home
Publications
Teaching
Contact
CV
Security Professionals
'I’m trying to learn…and I’m shooting myself in the foot': Beginners’ Struggles When Solving Binary Exploitation Exercises
'Threat modeling is very formal, it’s very technical, and also very hard to do correctly': Investigating Threat Modeling Practices in Open-Source Software Projects
An Investigation of Interaction and Information Needs for Protocol Reverse Engineering Automation
Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
Understanding the How and the Why: Exploring Secure Development Practices Through a Course Competition
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
Toward a Field Study on the Impact of Hacking Competitions on Secure Development
Hackers vs Testers: A Comparison of Software Vulnerability Discovery Processes
Cite
×