Daniel Votipka
Title
Cited by
Cited by
Year
All Your Droid Are Belong to Us: A Survey of Current Android Attacks.
T Vidas, D Votipka, N Christin
Woot 11, 8-9, 2011
2282011
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
D Votipka, R Stevens, EM Redmiles, J Hu, ML Mazurek
Security and Privacy (SP), 2018 IEEE Symposium on, 2018
602018
User interactions and permission use on android
K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
362017
The battle for new york: a case study of applied digital threat modeling at the enterprise level
R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek
27th {USENIX} Security Symposium ({USENIX} Security 18), 621-637, 2018
202018
An Observational Investigation of Reverse Engineers’ Processes
D Votipka, S Rabin, K Micinski, JS Foster, ML Mazurek
29th {USENIX} Security Symposium ({USENIX} Security 20), 1875-1892, 2020
15*2020
User comfort with Android background resource accesses in different contexts
D Votipka, SM Rabin, K Micinski, T Gilray, ML Mazurek, JS Foster
Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), 235-250, 2018
152018
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it
D Votipka, KR Fulton, J Parker, M Hou, ML Mazurek, M Hicks
29th {USENIX} Security Symposium ({USENIX} Security 20), 109-126, 2020
142020
Passe-partout: A general collection methodology for Android devices
D Votipka, T Vidas, N Christin
IEEE Transactions on Information Forensics and Security 8 (12), 1937-1946, 2013
142013
Does Being Verified Make You More Credible? Account Verification's Effect on Tweet Credibility
T Vaidya, D Votipka, ML Mazurek, M Sherr
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
72019
Toward a field study on the impact of hacking competitions on secure development
D Votipka, ML Mazurek, H Hu, B Eastes
Workshop on Security Information Workers (WSIW), 2018
72018
Building and Validating a Scale for Secure Software Development Self-Efficacy
D Votipka, D Abrokwa, ML Mazurek
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
32020
Build it, break it, fix it: Contesting secure development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020
22020
On the Other Side of the Table: Hosting Capture-the-Flag (CTF) Competitions
B Carlisle, M Reininger, D Fox, D Votipka, ML Mazurek
1
4.2 Ecological validity and study design for empirical secure development studies
ML Mazurek, D Votipka
Empirical Evaluation of Secure Development Processes, 12, 2020
2020
A Human-Centric Approach to Software Vulnerability Discovery
DJ Votipka
2020
Build It, Break It, Fix It: Contesting Secure Development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
arXiv preprint arXiv:1907.01679, 2019
2019
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra
D Votipka, MN Punzalan, SM Rabin, Y Tausczik, ML Mazurek
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
E Zhang, D Votipka, ML Mazurek
The Hackers’ Viewpoint: Exploring Challenges and Benefits of Bug-Bounty Programs
O Akgul, T Eghtesad, A Elazari, O Gnawali, J Grossklags, D Votipka, ...
Visible to the public Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
D Votipka, K Fulton, J Parker, M Hou, ML Mazurek, M Hicks
The system can't perform the operation now. Try again later.
Articles 1–20