Daniel Votipka
All Your Droid Are Belong to Us: A Survey of Current Android Attacks.
T Vidas, D Votipka, N Christin
Woot 11, 8-9, 2011
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
D Votipka, R Stevens, EM Redmiles, J Hu, ML Mazurek
Security and Privacy (SP), 2018 IEEE Symposium on, 2018
User interactions and permission use on android
K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
An observational investigation of reverse engineers’ processes
D Votipka, S Rabin, K Micinski, JS Foster, ML Mazurek
29th {USENIX} Security Symposium ({USENIX} Security 20), 1875-1892, 2020
The battle for new york: a case study of applied digital threat modeling at the enterprise level
R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek
27th {USENIX} Security Symposium ({USENIX} Security 18), 621-637, 2018
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it
D Votipka, KR Fulton, J Parker, M Hou, ML Mazurek, M Hicks
29th {USENIX} Security Symposium ({USENIX} Security 20), 109-126, 2020
User comfort with Android background resource accesses in different contexts
D Votipka, SM Rabin, K Micinski, T Gilray, ML Mazurek, JS Foster
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 235-250, 2018
Passe-partout: A general collection methodology for Android devices
D Votipka, T Vidas, N Christin
IEEE Transactions on Information Forensics and Security 8 (12), 1937-1946, 2013
Does Being Verified Make You More Credible? Account Verification's Effect on Tweet Credibility
T Vaidya, D Votipka, ML Mazurek, M Sherr
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
Toward a field study on the impact of hacking competitions on secure development
D Votipka, ML Mazurek, H Hu, B Eastes
Workshop on Security Information Workers (WSIW), 2018
Building and Validating a Scale for Secure Software Development Self-Efficacy
D Votipka, D Abrokwa, ML Mazurek
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
All Your Droid Are Belong To Us: A Survey of Current Android Attacks, INI/CyLab
T Vidas, D Votipka, N Christin
Carnegie Mellon University, 0
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra
D Votipka, MN Punzalan, SM Rabin, Y Tausczik, ML Mazurek
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 1-20, 2021
Build it, break it, fix it: Contesting secure development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study
KR Fulton, A Chan, D Votipka, M Hicks, ML Mazurek
Seventeenth Symposium on Usable Privacy and Security ({SOUPS} 2021), 597-616, 2021
On the other side of the table: Hosting capture the flag (ctf) competitions
B Carlisle, M Reininger, D Fox, D Votipka, ML Mazurek
Proceedings of the 6th Workshop on Security Information Workers, ser. WSIW 20, 2020
4.2 Ecological validity and study design for empirical secure development studies
ML Mazurek, D Votipka
Empirical Evaluation of Secure Development Processes, 12, 2020
A Human-Centric Approach to Software Vulnerability Discovery
DJ Votipka
University of Maryland, College Park, 2020
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
E Zhang, D Votipka, ML Mazurek
The Hackers’ Viewpoint: Exploring Challenges and Benefits of Bug-Bounty Programs
O Akgul, T Eghtesad, A Elazari, O Gnawali, J Grossklags, D Votipka, ...
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20