Author of the publication

What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool.

, , , , and . WSIW@SOUPS, USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets - A Tool and Visualization Framework., , , and . Digit. Investig., (2020)Mitigating Access Control Vulnerabilities through Interactive Static Analysis., , , and . SACMAT, page 199-209. ACM, (2015)Interactive Code Annotation for Security Vulnerability Detection., , , and . SIW@CCS, page 17-22. ACM, (2014)What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool., , , , and . WSIW@SOUPS, USENIX Association, (2016)BlockQuery: Toward forensically sound cryptocurrency investigation., , and . Digit. Investig., 40 (Supplement): 301340 (2022)Duck Hunt: Memory forensics of USB attack platforms., , , and . Digit. Investig., (2021)Exploring the usability and effectiveness of interactive annotation and code review for the detection of security vulnerabilities.. VL/HCC, page 295-296. IEEE Computer Society, (2015)A study of interactive code annotation for access control vulnerabilities., , , , and . VL/HCC, page 73-77. IEEE Computer Society, (2015)Security During Application Development: an Application Security Expert Perspective., , , and . CHI, page 262. ACM, (2018)The utility of perspecta 3D volumetric display for completion of tasks., , , and . Human Vision and Electronic Imaging, volume 5666 of SPIE Proceedings, page 268-279. SPIE, (2005)