Adam Shostack

Affiliations:
  • Shostack + Associates, USA
  • University of Washington, Seattle, WA, USA


According to our database1, Adam Shostack authored at least 22 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Boy Who Survived: Removing Harry Potter from an LLM is harder than reported.
CoRR, 2024

2023
Nothing Is Good Enough: Fast and Cheap Are Undervalued as Influencers of Security Tool Adoption.
IEEE Secur. Priv., 2023

Fast, Cheap and Good: Lightweight Methods Are Undervalued.
CoRR, 2023

2022
25 Years in Application Security: Looking Back, Looking Forward.
IEEE Secur. Priv., 2022

The Buffet Overflow Café.
IEEE Secur. Priv., 2022

2020
Secure development tools and techniques need more research that will increase their impact and effectiveness in practice.
Commun. ACM, 2020

Contextualisation of Data Flow Diagrams for Security Analysis.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

2019
Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 19231).
Dagstuhl Reports, 2019

2017
Panel: Empirically-based Secure OS Design.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

2014
FUD: a plea for intolerance.
Commun. ACM, 2014

Elevation of Privilege: Drawing Developers into Threat Modeling.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

2013
Control-Alt-Hack™: a card game for computer security outreach and education (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2008
Experiences Threat Modeling at Microsoft.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

2005
Avoiding Liability: An Alternative Route to More Secure Products.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

2004
What Price Privacy? - and why identity theft is about neither identity nor theft.
Proceedings of the Economics of Information Security, 2004

2002
Timing the Application of Security Patches for Optimal Uptime.
Proceedings of the 16th Conference on Systems Administration (LISA 2002), 2002

2001
Privacy Engineering for Digital Rights Management Systems.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

2000
How not to design a privacy system: reflections on the process behind the Freedom product.
Proceedings of the Tenth Conference on Computers, 2000

1999
Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

1996
Observed weaknesses in security dynamics' client/server protocol.
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996


  Loading...