Vulnerability Discovery

Understanding the How and the Why: Exploring Secure Development Practices Through a Course Competition

On the Other Side of the Table: Hosting Capture-the-Flag (CTF) Competitions, An Investigation from the CTF Organizer’s Perspective

The Hackers’ Viewpoint: Exploring Challenges and Benefits of Bug-Bounty Programs

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It

Building and Validating a Scale for Secure Software Development Self-Efficacy

Toward a Field Study on the Impact of Hacking Competitions on Secure Development

Hackers vs Testers: A Comparison of Software Vulnerability Discovery Processes