Home
Publications
Teaching
Contact
CV
Michelle L. Mazurek
Latest
A Survey of Cybersecurity Professionals’ Perceptions and Experiences of Safety and Belonging in the Community
“I can say I’m John Travolta...but I’m not John Travolta.” Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts
Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery
Understanding the How and the Why: Exploring Secure Development Practices Through a Course Competition
How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
On the Other Side of the Table: Hosting Capture-the-Flag (CTF) Competitions, An Investigation from the CTF Organizer’s Perspective
An Observational Investigation of Reverse Engineers' Processes
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
Building and Validating a Scale for Secure Software Development Self-Efficacy
Symbolic Path Tracing to Find Android Permission-Use Triggers
Does Being Verified Make You More Credible? The Effect of Account Verification on Tweet Credibility
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
User Comfort with Android Background Resource Accesses in Different Contexts
Toward a Field Study on the Impact of Hacking Competitions on Secure Development
Hackers vs Testers: A Comparison of Software Vulnerability Discovery Processes
User Interactions and Permission Use on Android
Cite
×