Author of the publication

An Observational Investigation of Reverse Engineers' Process and Mental Models.

, , , , and . CHI Extended Abstracts, ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility., , , and . CHI, page 525. ACM, (2019)User Interactions and Permission Use on Android., , , , , and . CHI, page 362-373. ACM, (2017)The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level., , , , , and . USENIX Security Symposium, page 621-637. USENIX Association, (2018)All Your Droid Are Belong to Us: A Survey of Current Android Attacks., , and . WOOT, page 81-90. USENIX Association, (2011)Build It, Break It, Fix It: Contesting Secure Development., , , , , , , and . CoRR, (2019)Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes., , , , and . IEEE Symposium on Security and Privacy, page 374-391. IEEE Computer Society, (2018)Passe-Partout: A General Collection Methodology for Android Devices., , and . IEEE Trans. Information Forensics and Security, 8 (12): 1937-1946 (2013)Applied Digital Threat Modeling: It Works., , , , and . IEEE Security & Privacy, 17 (4): 35-42 (2019)An Observational Investigation of Reverse Engineers' Process and Mental Models., , , , and . CHI Extended Abstracts, ACM, (2019)User Comfort with Android Background Resource Accesses in Different Contexts., , , , , and . SOUPS @ USENIX Security Symposium, page 235-250. USENIX Association, (2018)