Daniel Votipka

Google Scholar
23 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges.
2025
conf/uss
"Threat modeling is very formal, it's very technical, and also very hard to do correctly": Investigating Threat Modeling Practices in Open-Source Software Projects.
2025
conf/uss
"I'm trying to learn...and I'm shooting myself in the foot": Beginners' Struggles When Solving Binary Exploitation Exercises.
2024
conf/uss
"There are rabbit holes I want to go down that I'm not allowed to go down": An Investigation of Security Expert Threat Modeling Practices for Medical Devices.
2024
conf/soups
A Survey of Cybersecurity Professionals' Perceptions and Experiences of Safety and Belonging in the Community.
2024
conf/soups
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts.
2023
conf/uss
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
2022
conf/uss
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples.
2021
conf/soups
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study.
2020
conf/uss
An Observational Investigation of Reverse Engineers' Processes.
2020
conf/uss
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.
2018
conf/uss
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level.
2018
conf/soups
User Comfort with Android Background Resource Accesses in Different Contexts.
2011
conf/uss
All Your Droid Are Belong to Us: A Survey of Current Android Attacks.
Filters
Years:  to