Home
Publications
Teaching
Contact
CV
Security Professionals
A Qualitative Analysis of Fuzzing Tool Usability and Challenges
Navigating the Patchwork: Investigating the Availability and Consistency of Public Security Advisories
'I’m trying to learn…and I’m shooting myself in the foot': Beginners’ Struggles When Solving Binary Exploitation Exercises
'Threat modeling is very formal, it’s very technical, and also very hard to do correctly': Investigating Threat Modeling Practices in Open-Source Software Projects
An Investigation of Interaction and Information Needs for Protocol Reverse Engineering Automation
Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
Understanding the How and the Why: Exploring Secure Development Practices Through a Course Competition
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
»
Cite
×