Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Daniel Votipka"'
Autor:
Sanchari Das, Kapil Madathil, Josiah Dykstra, Prashanth Rajivan, Shubha Setty, James T. McElligott, Jiovanne Hughart, Daniel Votipka
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 66:1524-1528
Telehealth technologies have aided in the distribution of health-related services, especially during the COVID-19 pandemic. With increased telehealth use, privacy risks and security concerns among healthcare providers and patients have subsequently i
Publikováno v:
Proceedings of the 38th Annual Computer Security Applications Conference.
Autor:
Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Rock Stevens, Daniel Votipka, Josiah Dykstra, Fernando Tomlinson, Erin Quartararo, Colin Ahern, Michelle L. Mazurek
Publikováno v:
CHI Conference on Human Factors in Computing Systems.
Autor:
Mary Nicole Dugay Punzalan, Michelle L. Mazurek, Yla R. Tausczik, Seth M. Rabin, Daniel Votipka
Publikováno v:
EuroS&P
Reverse engineering is a complex task. As with many other expert tasks, reverse engineers rely on colleagues and the broader reverse engineering community to provide guidance and develop knowledge necessary to achieve their goals. For example, it is
Publikováno v:
IEEE Security & Privacy. 17:35-42
Threat modeling, a structured process for identifying risks and developing mitigation strategies, has never been systematically evaluated in a real environment. Our case study at the New York City Cyber Commandmthe primary digital defense organizatio
Publikováno v:
IEEE Symposium on Security and Privacy
Hacking exercises are a common tool for security education, but there is limited investigation of how they teach security concepts and whether they follow pedagogical best practices. This paper enumerates the pedagogical practices of 31 popular onlin
Publikováno v:
CHI
Security is an essential component of the software development lifecycle. Researchers and practitioners have developed educational interventions, guidelines, security analysis tools, and new APIs aimed at improving security. However, measuring any re
Autor:
Piotr Mardziel, Kelsey R. Fulton, James Parker, Andrew Ruef, Daniel Votipka, Michael Hicks, Dave Levin, Michelle L. Mazurek
Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it, Break-it, Fix-it (BIBIFI) contest, which aims to assess the ability to securely build software, not just break it. In BIBIFI, teams build
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b7e461cd6411bb0c3d7698953eeafe33
http://arxiv.org/abs/1907.01679
http://arxiv.org/abs/1907.01679
Publikováno v:
CHI
Many popular social networking and microblogging sites support verified accounts---user accounts that are deemed of public interest and whose owners have been authenticated by the site. Importantly, the content of messages contributed by verified acc