Security Professionals

A Qualitative Analysis of Fuzzing Tool Usability and Challenges

Navigating the Patchwork: Investigating the Availability and Consistency of Public Security Advisories

'I’m trying to learn…and I’m shooting myself in the foot': Beginners’ Struggles When Solving Binary Exploitation Exercises

'Threat modeling is very formal, it’s very technical, and also very hard to do correctly': Investigating Threat Modeling Practices in Open-Source Software Projects

An Investigation of Interaction and Information Needs for Protocol Reverse Engineering Automation

Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges

Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

Understanding the How and the Why: Exploring Secure Development Practices Through a Course Competition

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It

The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level