Survey and taxonomy of adversarial reconnaissance techniques

S Roy, N Sharmin, JC Acosta, C Kiekintveld… - ACM Computing …, 2022 - dl.acm.org
Adversaries are often able to penetrate networks and compromise systems by exploiting
vulnerabilities in people and systems. The key to the success of these attacks is information …

99% false positives: A qualitative study of {SOC} analysts' perspectives on security alarms

BA Alahmadi, L Axon, I Martinovic - 31st USENIX Security Symposium …, 2022 - usenix.org
In this work, we focus on the prevalence of False Positive (FP) alarms produced by security
tools, and Security Operation Centers (SOCs) practitioners' perception of their quality. In an …

Human factors in security research: Lessons learned from 2008-2018

M Kaur, M van Eeten, M Janssen, K Borgolte… - arXiv preprint arXiv …, 2021 - arxiv.org
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …

Matched and mismatched SOCs: A qualitative study on security operations center issues

FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili… - Proceedings of the …, 2019 - dl.acm.org
Organizations, such as companies and governments, created Security Operations Centers
(SOCs) to defend against computer security attacks. SOCs are central defense groups that …

Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense

RK Konoth, E Vineti, V Moonsamy, M Lindorfer… - Proceedings of the …, 2018 - dl.acm.org
A wave of alternative coins that can be effectively mined without specialized hardware, and
a surge in cryptocurrencies' market value has led to the development of cryptocurrency …

Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps

N Alomar, S Egelman - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …

An observational investigation of reverse {Engineers'} processes

D Votipka, S Rabin, K Micinski, JS Foster… - 29th USENIX Security …, 2020 - usenix.org
Reverse engineering is a complex process essential to software-security tasks such as
vulnerability discovery and malware analysis. Significant research and engineering effort …

An Ethnographic Understanding of Software ({In) Security} and a {Co-Creation} Model to Improve Secure Software Development

H Palombo, AZ Tabari, D Lende, J Ligatti… - Sixteenth Symposium on …, 2020 - usenix.org
We present an ethnographic study of secure software development processes in a software
company using the anthropological research method of participant observation. Two PhD …

Where to recruit for security development studies: Comparing six software developer samples

H Kaur, S Amft, D Votipka, Y Acar, S Fahl - 31st USENIX Security …, 2022 - usenix.org
Studying developers is an important aspect of usable security and privacy research. In
particular, studying security development challenges such as the usability of security APIs …

Iotflow: Inferring iot device behavior at scale through static mobile companion app analysis

D Schmidt, C Tagliaro, K Borgolte… - Proceedings of the 2023 …, 2023 - dl.acm.org
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is
steadily growing. They suffer from vulnerabilities just as other software and hardware …