Follow
Daniel Votipka
Title
Cited by
Cited by
Year
All your droid are belong to us: A survey of current android attacks
T Vidas, D Votipka, N Christin
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
2492011
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
D Votipka, R Stevens, EM Redmiles, J Hu, ML Mazurek
Security and Privacy (SP), 2018 IEEE Symposium on, 2018
1932018
An observational investigation of reverse engineers' processes
D Votipka, SM Rabin, K Micinski, JS Foster, MM Mazurek
Proceedings of the 29th USENIX Conference on Security Symposium, 1875-1892, 2020
108*2020
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it
D Votipka, KR Fulton, J Parker, M Hou, ML Mazurek, M Hicks
29th USENIX Security Symposium (USENIX Security 20), 109-126, 2020
842020
The battle for new york: a case study of applied digital threat modeling at the enterprise level
R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek
27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018
64*2018
User interactions and permission use on android
K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
602017
Benefits and drawbacks of adopting a secure programming language: rust as a case study
KR Fulton, A Chan, D Votipka, M Hicks, ML Mazurek
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 597-616, 2021
562021
Does being verified make you more credible? Account verification's effect on tweet credibility
T Vaidya, D Votipka, ML Mazurek, M Sherr
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
482019
Building and validating a scale for secure software development self-efficacy
D Votipka, D Abrokwa, ML Mazurek
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
422020
Bug hunters’ perspectives on the challenges and benefits of the bug bounty ecosystem
O Akgul, T Eghtesad, A Elazari, O Gnawali, J Grossklags, ML Mazurek, ...
32nd USENIX Security Symposium (USENIX Security). https://doi. org/10.48550 …, 2023
29*2023
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples
H Kaur, S Amft, D Votipka, Y Acar, S Fahl
31st USENIX Security Symposium (USENIX Security 22), 4041-4058, 2022
262022
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
D Votipka, E Zhang, ML Mazurek
IEEE Symposium on Security and Privacy (SP), 2021
252021
User comfort with android background resource accesses in different contexts
D Votipka, SM Rabin, K Micinski, T Gilray, ML Mazurek, JS Foster
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 235-250, 2018
242018
How ready is your ready? assessing the usability of incident response playbook frameworks
R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
202022
Passe-partout: A general collection methodology for Android devices
D Votipka, T Vidas, N Christin
IEEE Transactions on Information Forensics and Security 8 (12), 1937-1946, 2013
192013
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra
D Votipka, MN Punzalan, SM Rabin, Y Tausczik, ML Mazurek
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 1-20, 2021
162021
Build it, break it, fix it: Contesting secure development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020
162020
Toward a field study on the impact of hacking competitions on secure development
D Votipka, ML Mazurek, H Hu, B Eastes
Workshop on Security Information Workers (WSIW), 2018
132018
Understanding the how and the why: Exploring secure development practices through a course competition
KR Fulton, D Votipka, D Abrokwa, ML Mazurek, M Hicks, J Parker
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
112022
Everybody’s Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations
J Mink, H Benkraouda, L Yang, A Ciptadi, A Ahmadzadeh, D Votipka, ...
2023 IEEE Symposium on Security and Privacy (SP), 2068-2085, 2023
92023
The system can't perform the operation now. Try again later.
Articles 1–20