Author of the publication

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.

, , , , , and . USENIX Security Symposium, page 109-126. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Qualitative Evaluation of Reverse Engineering Tool Usability., , , and . ACSAC, page 619-631. ACM, (2022)Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study., , , , and . SOUPS @ USENIX Security Symposium, page 597-616. USENIX Association, (2021)User Interactions and Permission Use on Android., , , , , and . CHI, page 362-373. ACM, (2017)How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks., , , , , , and . CHI, page 589:1-589:18. ACM, (2022)The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level., , , , , and . USENIX Security Symposium, page 621-637. USENIX Association, (2018)Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery., , , , , , and . SP, page 1997-2014. IEEE, (2023)Build It, Break It, Fix It: Contesting Secure Development., , , , , , , and . ACM Trans. Priv. Secur., 23 (2): 10:1-10:36 (2020)Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition., , , , , and . CCS, page 1141-1155. ACM, (2022)Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility., , , and . CHI, page 525. ACM, (2019)Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples., , , , and . USENIX Security Symposium, page 4041-4058. USENIX Association, (2022)