Follow
Steve Dodier-Lazaro
Title
Cited by
Cited by
Year
How {Double-Fetch} situations turn into {Double-Fetch} vulnerabilities: A study of double fetches in the linux kernel
P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro
26th USENIX Security Symposium (USENIX Security 17), 1-16, 2017
742017
From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design
S Dodier-Lazaro, R Abu-Salma, I Becker, MA Sasse
CHI 2017 Workshop on Values in Computing, 7, 2017
312017
“No Good Reason to Remove Features” Expert Users Value Useful Apps over Secure Ones
S Dodier-Lazaro, I Becker, J Krinke, MA Sasse
Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017
72017
SODA CD: A Model for Scalability-Oriented, Distributed and Anticipative Collision Detection
S Dodier-Lazaro
INSA Rennes, 2012
4*2012
SODA: A Scalability-Oriented Distributed & Anticipative Model for Collision Detection in Physically-based Simulations
S Dodier-Lazaro, Q Avril, V Gouranton
GRAPP 2013, 2013
12013
Appropriate security and confinement technologies: methods for the design of appropriate security and a case study on confinement technologies for desktop computers
S Dodier-Lazaro
UCL (University College London), 2020
2020
Appropriation and Principled Security
S Dodier-Lazaro
ECSCW 2015 Workshop on Experiences of Technology Appropriation …, 2015
2015
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities
P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro
The system can't perform the operation now. Try again later.
Articles 1–8