Home
Publications
Teaching
Contact
CV
Michelle L. Mazurek
Latest
Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery
Understanding the How and the Why: Exploring Secure Development Practices Through a Course Competition
How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
On the Other Side of the Table: Hosting Capture-the-Flag (CTF) Competitions, An Investigation from the CTF Organizer’s Perspective
An Observational Investigation of Reverse Engineers' Processes
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
Building and Validating a Scale for Secure Software Development Self-Efficacy
Symbolic Path Tracing to Find Android Permission-Use Triggers
Does Being Verified Make You More Credible? The Effect of Account Verification on Tweet Credibility
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
User Comfort with Android Background Resource Accesses in Different Contexts
Toward a Field Study on the Impact of Hacking Competitions on Secure Development
Hackers vs Testers: A Comparison of Software Vulnerability Discovery Processes
User Interactions and Permission Use on Android
Cite
×