Home
Publications
Teaching
Contact
CV
Vulnerability Discovery
'I’m trying to learn…and I’m shooting myself in the foot': Beginners’ Struggles When Solving Binary Exploitation Exercises
'Threat modeling is very formal, it’s very technical, and also very hard to do correctly': Investigating Threat Modeling Practices in Open-Source Software Projects
An Investigation of Interaction and Information Needs for Protocol Reverse Engineering Automation
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
Understanding the How and the Why: Exploring Secure Development Practices Through a Course Competition
On the Other Side of the Table: Hosting Capture-the-Flag (CTF) Competitions, An Investigation from the CTF Organizer’s Perspective
The Hackers’ Viewpoint: Exploring Challenges and Benefits of Bug-Bounty Programs
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
Building and Validating a Scale for Secure Software Development Self-Efficacy
Toward a Field Study on the Impact of Hacking Competitions on Secure Development
»
Cite
×