Security Professionals

I Can SE Clearly Now: Investigating the Effectiveness of GUI-based Symbolic Execution for Software Vulnerability Discovery

“Your imaging may be stone-cold normal, but if they look sick, they’re going to get admitted”: An Investigation of Clinicians’ Perceptions of Impact & Likelihood of Security Failures

A Qualitative Analysis of Fuzzing Tool Usability and Challenges

Navigating the Patchwork: Investigating the Availability and Consistency of Public Security Advisories

'I’m trying to learn…and I’m shooting myself in the foot': Beginners’ Struggles When Solving Binary Exploitation Exercises

'Threat modeling is very formal, it’s very technical, and also very hard to do correctly': Investigating Threat Modeling Practices in Open-Source Software Projects

An Investigation of Interaction and Information Needs for Protocol Reverse Engineering Automation

Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges

Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

Understanding the How and the Why: Exploring Secure Development Practices Through a Course Competition