All your droid are belong to us: A survey of current android attacks T Vidas, D Votipka, N Christin 5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011 | 247 | 2011 |
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes D Votipka, R Stevens, EM Redmiles, J Hu, ML Mazurek Security and Privacy (SP), 2018 IEEE Symposium on, 2018 | 177 | 2018 |
An observational investigation of reverse engineers' processes D Votipka, SM Rabin, K Micinski, JS Foster, MM Mazurek Proceedings of the 29th USENIX Conference on Security Symposium, 1875-1892, 2020 | 95* | 2020 |
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it D Votipka, KR Fulton, J Parker, M Hou, ML Mazurek, M Hicks 29th USENIX Security Symposium (USENIX Security 20), 109-126, 2020 | 78 | 2020 |
User interactions and permission use on android K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017 | 57 | 2017 |
The battle for new york: a case study of applied digital threat modeling at the enterprise level R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek 27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018 | 54* | 2018 |
Benefits and drawbacks of adopting a secure programming language: rust as a case study KR Fulton, A Chan, D Votipka, M Hicks, ML Mazurek Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 597-616, 2021 | 50 | 2021 |
Does being verified make you more credible? Account verification's effect on tweet credibility T Vaidya, D Votipka, ML Mazurek, M Sherr Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 45 | 2019 |
Building and validating a scale for secure software development self-efficacy D Votipka, D Abrokwa, ML Mazurek Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 34 | 2020 |
User comfort with android background resource accesses in different contexts D Votipka, SM Rabin, K Micinski, T Gilray, ML Mazurek, JS Foster Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 235-250, 2018 | 24 | 2018 |
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples H Kaur, S Amft, D Votipka, Y Acar, S Fahl 31st USENIX Security Symposium (USENIX Security 22), 4041-4058, 2022 | 21 | 2022 |
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises D Votipka, E Zhang, ML Mazurek IEEE Symposium on Security and Privacy (SP), 2021 | 21 | 2021 |
Passe-partout: A general collection methodology for Android devices D Votipka, T Vidas, N Christin IEEE Transactions on Information Forensics and Security 8 (12), 1937-1946, 2013 | 18 | 2013 |
How ready is your ready? assessing the usability of incident response playbook frameworks R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ... Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022 | 14 | 2022 |
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra D Votipka, MN Punzalan, SM Rabin, Y Tausczik, ML Mazurek 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 1-20, 2021 | 14 | 2021 |
Build it, break it, fix it: Contesting secure development J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ... ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020 | 14 | 2020 |
Bug hunters’ perspectives on the challenges and benefits of the bug bounty ecosystem O Akgul, T Eghtesad, A Elazari, O Gnawali, J Grossklags, ML Mazurek, ... 32nd USENIX Security Symposium (USENIX Security). https://doi. org/10.48550 …, 2023 | 12 | 2023 |
The hackers’ viewpoint: Exploring challenges and benefits of bug-bounty programs O Akgul, T Eghtesad, A Elazari, O Gnawali, J Grossklags, D Votipka, ... Proceedings of the 2020 Workshop on Security Information Workers, ser. WSIW 20, 2020 | 11 | 2020 |
Toward a field study on the impact of hacking competitions on secure development D Votipka, ML Mazurek, H Hu, B Eastes Workshop on Security Information Workers (WSIW), 2018 | 11 | 2018 |
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery KR Fulton, S Katcher, K Song, M Chetty, ML Mazurek, C Messdaghi, ... IEEE Symposium on Security and Privacy, 2023 | 9 | 2023 |