Where to recruit for security development studies: Comparing six software developer samples

H Kaur, S Klivan, D Votipka, Y Acar, S Fahl - 31st USENIX Security …, 2022 - usenix.org
Studying developers is an important aspect of usable security and privacy research. In
particular, studying security development challenges such as the usability of security APIs …

A qualitative evaluation of reverse engineering tool usability

J Mattei, M McLaughlin, S Katcher… - Proceedings of the 38th …, 2022 - dl.acm.org
Software reverse engineering is a challenging and time consuming task. With the growing
demand for reverse engineering in vulnerability discovery and malware analysis, manual …

An investigation of online reverse engineering community discussions in the context of ghidra

D Votipka, MN Punzalan, SM Rabin… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Reverse engineering is a complex task. As with many other expert tasks, reverse engineers
rely on colleagues and the broader reverse engineering community to provide guidance and …

The anatomy of hardware reverse engineering: an exploration of human factors during problem solving

C Wiesen, S Becker, R Walendy, C Paar… - ACM Transactions on …, 2023 - dl.acm.org
Understanding of microchips, known as Hardware Reverse Engineering (HRE), is driven by
analysts' problem solving. This work sheds light on these hitherto poorly understood …

I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering

R Walendy, M Weber, J Li, S Becker, C Wiesen… - Proceedings of the …, 2024 - dl.acm.org
Trust in digital systems depends on secure hardware, often assured through HRE. This work
develops methods for investigating human problem-solving processes in HRE, an …

" Make the Voodoo Box Go Bleep Bloop:" Exploring End Users' Understanding and Information Needs Regarding Microchips

J Speith, S Becker, T Speith, M Weber, Y Zou… - arxiv preprint arxiv …, 2025 - arxiv.org
Microchips are fundamental components of modern electronic devices, yet they remain
opaque to the users who rely on them daily. This opacity, compounded by the complexity of …

LifeLine for FPGA protection: Obfuscated cryptography for real-world security

F Stolz, N Albartus, J Speith, S Klix… - IACR Transactions on …, 2021 - icscm.ub.rub.de
Over the last decade attacks have repetitively demonstrated that bitstream protection for
SRAM-based FPGAs is a persistent problem without a satisfying solution in practice. Hence …

(I Can't Get No) Satisfaction: On the Existence of Satisfaction as a Component of Usable Security and Privacy

A Kanaoka - International Conference on Human-Computer …, 2023 - Springer
In the ISO definitions of usability, user satisfaction is specified as an element and
effectiveness and efficiency. Jakob Nielsen, who is well known for his work on usability in …

REVERSIM: A Game-Based Environment to Study Human Aspects in Hardware Reverse Engineering

S Becker, R Walendy, M Weber, C Wiesen… - arxiv preprint arxiv …, 2023 - arxiv.org
Hardware Reverse Engineering (HRE) is a technique for analyzing Integrated Circuits (ICs).
Experts employ HRE for security-critical tasks, such as detecting Trojans or intellectual …

Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment

A Waltoft-Olsen, P Johnson, L Øverlier… - … Conference on ICT …, 2024 - Springer
This research delves into Hardware Reverse Engineering, specifically focusing on hardware
manipulation. It leverages the Supply Chain attack vector and conducts a practical …