Publications

Filter by type:
. An Observational Investigation of Reverse Engineers' Processes. USENIX Security (Acceptance: 21%), 2020.

PDF Poster Slides Video

. Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. USENIX Security (Acceptance: 21%), 2020.

PDF Poster Slides Video

. Building and Validating a Scale for Secure Software Development Self-Efficacy. CHI (Acceptance: 24%), 2020.

PDF Poster Slides Video

. Symbolic Path Tracing to Find Android Permission-Use Triggers. BAR, 2019.

PDF

. Does Being Verified Make You More Credible? The Effect of Account Verification on Tweet Credibility. CHI (Acceptance: 23%), 2019.

PDF Video

. The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level. USENIX Security (Acceptance: 19%), 2018.

PDF Slides Video

. User Comfort with Android Background Resource Accesses in Different Contexts. SOUPS (Acceptance: 23%), 2018.

PDF Poster Slides

. Toward a Field Study on the Impact of Hacking Competitions on Secure Development. WSIW, 2018.

PDF Slides

. Hackers vs Testers: A Comparison of Software Vulnerability Discovery Processes. IEEE S&P (Acceptance: 14%), 2018.

PDF Poster Slides Video

. User Interactions and Permission Use on Android. CHI (Acceptance: 25%), 2017.

PDF Poster

. Passe-Partout:A General Collection Methodology for Android Devices. TIFS, 2013.

PDF

. All Your Droids are Belong to Us: A Survey of Current Android Attacks. WOOT, 2011.

PDF Slides Video