Home
Publications
Teaching
Contact
CV
Vulnerability Discovery
Understanding the How and the Why: Exploring Secure Development Practices Through a Course Competition
On the Other Side of the Table: Hosting Capture-the-Flag (CTF) Competitions, An Investigation from the CTF Organizer’s Perspective
The Hackers’ Viewpoint: Exploring Challenges and Benefits of Bug-Bounty Programs
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
Building and Validating a Scale for Secure Software Development Self-Efficacy
Toward a Field Study on the Impact of Hacking Competitions on Secure Development
Hackers vs Testers: A Comparison of Software Vulnerability Discovery Processes
Cite
×