Follow
Daniel Votipka
Title
Cited by
Cited by
Year
All your droid are belong to us: A survey of current android attacks
T Vidas, D Votipka, N Christin
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
2482011
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
D Votipka, R Stevens, EM Redmiles, J Hu, ML Mazurek
Security and Privacy (SP), 2018 IEEE Symposium on, 2018
1642018
An observational investigation of reverse engineers' processes
D Votipka, SM Rabin, K Micinski, JS Foster, MM Mazurek
Proceedings of the 29th USENIX Conference on Security Symposium, 1875-1892, 2020
87*2020
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it
D Votipka, KR Fulton, J Parker, M Hou, ML Mazurek, M Hicks
29th USENIX Security Symposium (USENIX Security 20), 109-126, 2020
642020
User interactions and permission use on android
K Micinski, D Votipka, R Stevens, N Kofinas, ML Mazurek, JS Foster
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
532017
The battle for new york: a case study of applied digital threat modeling at the enterprise level
R Stevens, D Votipka, EM Redmiles, C Ahern, P Sweeney, ML Mazurek
27th USENIX Security Symposium (USENIX Security 18), 621-637, 2018
52*2018
Benefits and drawbacks of adopting a secure programming language: rust as a case study
KR Fulton, A Chan, D Votipka, M Hicks, ML Mazurek
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 597-616, 2021
422021
Does being verified make you more credible? Account verification's effect on tweet credibility
T Vaidya, D Votipka, ML Mazurek, M Sherr
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
392019
Building and validating a scale for secure software development self-efficacy
D Votipka, D Abrokwa, ML Mazurek
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
312020
User comfort with android background resource accesses in different contexts
D Votipka, SM Rabin, K Micinski, T Gilray, ML Mazurek, JS Foster
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 235-250, 2018
222018
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
D Votipka, E Zhang, ML Mazurek
IEEE Symposium on Security and Privacy (SP), 2021
182021
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples
H Kaur, S Amft, D Votipka, Y Acar, S Fahl
31st USENIX Security Symposium (USENIX Security 22), 4041-4058, 2022
172022
Passe-partout: A general collection methodology for Android devices
D Votipka, T Vidas, N Christin
IEEE Transactions on Information Forensics and Security 8 (12), 1937-1946, 2013
172013
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra
D Votipka, MN Punzalan, SM Rabin, Y Tausczik, ML Mazurek
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 1-20, 2021
132021
Build it, break it, fix it: Contesting secure development
J Parker, M Hicks, A Ruef, ML Mazurek, D Levin, D Votipka, P Mardziel, ...
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-36, 2020
132020
How ready is your ready? assessing the usability of incident response playbook frameworks
R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
122022
Toward a field study on the impact of hacking competitions on secure development
D Votipka, ML Mazurek, H Hu, B Eastes
Workshop on Security Information Workers (WSIW), 2018
102018
Bug hunters’ perspectives on the challenges and benefits of the bug bounty ecosystem
O Akgul, T Eghtesad, A Elazari, O Gnawali, J Grossklags, ML Mazurek, ...
32nd USENIX Security Symposium (USENIX Security). https://doi. org/10.48550 …, 2023
82023
On the other side of the table: Hosting capture the flag (ctf) competitions
B Carlisle, M Reininger, D Fox, D Votipka, ML Mazurek
Proceedings of the 6th Workshop on Security Information Workers, ser. WSIW 20, 2020
82020
The hackers’ viewpoint: Exploring challenges and benefits of bug-bounty programs
O Akgul, T Eghtesad, A Elazari, O Gnawali, J Grossklags, D Votipka, ...
Proceedings of the 2020 Workshop on Security Information Workers, ser. WSIW 20, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20