Follow
Daniel Votipka
Title
Cited by
Cited by
Year
All your droid are belong to us: A survey of current android attacks
T Vidas, D Votipka, N Christin
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
2422011
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
D Votipka, R Stevens, EM Redmiles, J Hu, ML Mazurek
Security and Privacy (SP), 2018 IEEE Symposium on, 2018
1332018
An Observational Investigation of Reverse {Engineers’} Processes
D Votipka, S Rabin, K Micinski, JS Foster, ML Mazurek
29th USENIX Security Symposium (USENIX Security 20), 1875-1892, 2020
59*2020
User interactions and permission use on android
K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
492017
The battle for new york: a case study of applied digital threat modeling at the enterprise level
R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek
27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018
42*2018
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it
D Votipka, KR Fulton, J Parker, M Hou, ML Mazurek, M Hicks
29th USENIX Security Symposium (USENIX Security 20), 109-126, 2020
412020
Does being verified make you more credible? Account verification's effect on tweet credibility
T Vaidya, D Votipka, ML Mazurek, M Sherr
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
272019
User comfort with android background resource accesses in different contexts
D Votipka, SM Rabin, K Micinski, T Gilray, ML Mazurek, JS Foster
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 235-250, 2018
222018
Building and validating a scale for secure software development self-efficacy
D Votipka, D Abrokwa, ML Mazurek
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
212020
Passe-partout: A general collection methodology for Android devices
D Votipka, T Vidas, N Christin
IEEE Transactions on Information Forensics and Security 8 (12), 1937-1946, 2013
162013
Benefits and drawbacks of adopting a secure programming language: rust as a case study
KR Fulton, A Chan, D Votipka, M Hicks, ML Mazurek
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 597-616, 2021
112021
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
D Votipka, E Zhang, ML Mazurek
IEEE Symposium on Security and Privacy (SP), 2021
112021
Toward a field study on the impact of hacking competitions on secure development
D Votipka, ML Mazurek, H Hu, B Eastes
Workshop on Security Information Workers (WSIW), 2018
102018
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra
D Votipka, MN Punzalan, SM Rabin, Y Tausczik, ML Mazurek
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 1-20, 2021
82021
Build it, break it, fix it: Contesting secure development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020
82020
The Hackers’ Viewpoint: Exploring Challenges and Benefits of Bug-Bounty Programs
O Akgul, T Eghtesad, A Elazari, O Gnawali, J Grossklags, D Votipka, ...
6th Workshop on Security Information Workers, 1-7, 2020
42020
How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks
R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ...
CHI Conference on Human Factors in Computing Systems, 1-18, 2022
32022
On the other side of the table: Hosting capture the flag (ctf) competitions
B Carlisle, M Reininger, D Fox, D Votipka, ML Mazurek
Proceedings of the 6th Workshop on Security Information Workers, ser. WSIW 20, 2020
32020
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery
KR Fulton, S Katcher, K Song, M Chetty, ML Mazurek, C Messdaghi, ...
IEEE Symposium on Security and Privacy, 2023
22023
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples
H Kaur, S Amft, D Votipka, Y Acar, S Fahl
31st USENIX Security Symposium (USENIX Security 22), 4041-4058, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20