Daniel Votipka

Orcid: 0000-0001-9985-250X

According to our database1, Daniel Votipka authored at least 24 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023

Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples.
Proceedings of the 31st USENIX Security Symposium, 2022

How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

A Qualitative Evaluation of Reverse Engineering Tool Usability.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes.
login Usenix Mag., 2020

Build It, Break It, Fix It: Contesting Secure Development.
ACM Trans. Priv. Secur., 2020

An Observational Investigation of Reverse Engineers' Processes.
Proceedings of the 29th USENIX Security Symposium, 2020

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.
Proceedings of the 29th USENIX Security Symposium, 2020

Building and Validating a Scale for Secure Software Development Self-Efficacy.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Applied Digital Threat Modeling: It Works.
IEEE Secur. Priv., 2019

An Observational Investigation of Reverse Engineers' Process and Mental Models.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level.
Proceedings of the 27th USENIX Security Symposium, 2018

Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

User Comfort with Android Background Resource Accesses in Different Contexts.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
User Interactions and Permission Use on Android.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2013
Passe-Partout: A General Collection Methodology for Android Devices.
IEEE Trans. Inf. Forensics Secur., 2013

2011
All Your Droid Are Belong to Us: A Survey of Current Android Attacks.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011


  Loading...