Daniel Votipka
Orcid: 0000-0001-9985-250X
According to our database1,
Daniel Votipka
authored at least 30 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
"There are rabbit holes I want to go down that I'm not allowed to go down": An Investigation of Security Expert Threat Modeling Practices for Medical Devices.
Proceedings of the 33rd USENIX Security Symposium, 2024
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
A Survey of Cybersecurity Professionals' Perceptions and Experiences of Safety and Belonging in the Community.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
An Investigation of US Universities' Implementation of FERPA Student Directory Policies and Student Privacy Preferences.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023
Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples.
Proceedings of the 31st USENIX Security Symposium, 2022
How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes.
login Usenix Mag., 2020
ACM Trans. Priv. Secur., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2013
IEEE Trans. Inf. Forensics Secur., 2013
2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011