Author of the publication

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.

, , , , , and . USENIX Security Symposium, page 109-126. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Dynamic Software Update Safety Using Systematic Testing., , , , and . IEEE Trans. Software Eng., 38 (6): 1340-1354 (2012)Specifying and Verifying the Correctness of Dynamic Software Updates., , , , and . VSTTE, volume 7152 of Lecture Notes in Computer Science, page 278-293. Springer, (2012)Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation., , , and . Asia-Pacific Computer Systems Architecture Conference, volume 4186 of Lecture Notes in Computer Science, page 366-372. Springer, (2006)Coverage guided, property based testing., , and . Proc. ACM Program. Lang., 3 (OOPSLA): 181:1-181:29 (2019)Verified compilation of Quantum oracles., , , , , and . Proc. ACM Program. Lang., 6 (OOPSLA2): 589-615 (2022)Does the Bronze Garbage Collector Make Rust Easier to Use? A Controlled Experiment., , and . CoRR, (2021)Fuzzing Configurations of Program Options - RCR Report., , , , and . ACM Trans. Softw. Eng. Methodol., 32 (2): 55:1-55:3 (April 2023)A Verified Optimizer for Quantum Circuits., , , , and . CoRR, (2019)BullFrog: Online Schema Evolution via Lazy Evaluation., , , and . SIGMOD Conference, page 194-206. ACM, (2021)The ruby intermediate language., , , and . DLS, page 89-98. ACM, (2009)