How {Double-Fetch} situations turn into {Double-Fetch} vulnerabilities: A study of double fetches in the linux kernel P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro 26th USENIX Security Symposium (USENIX Security 17), 1-16, 2017 | 74 | 2017 |
From Paternalistic to User-Centred Security: Putting Users First with Value-Sensitive Design S Dodier-Lazaro, R Abu-Salma, I Becker, MA Sasse CHI 2017 Workshop on Values in Computing, 7, 2017 | 31 | 2017 |
“No Good Reason to Remove Features” Expert Users Value Useful Apps over Secure Ones S Dodier-Lazaro, I Becker, J Krinke, MA Sasse Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017 | 7 | 2017 |
SODA CD: A Model for Scalability-Oriented, Distributed and Anticipative Collision Detection S Dodier-Lazaro INSA Rennes, 2012 | 4* | 2012 |
SODA: A Scalability-Oriented Distributed & Anticipative Model for Collision Detection in Physically-based Simulations S Dodier-Lazaro, Q Avril, V Gouranton GRAPP 2013, 2013 | 1 | 2013 |
Appropriate security and confinement technologies: methods for the design of appropriate security and a case study on confinement technologies for desktop computers S Dodier-Lazaro UCL (University College London), 2020 | | 2020 |
Appropriation and Principled Security S Dodier-Lazaro ECSCW 2015 Workshop on Experiences of Technology Appropriation …, 2015 | | 2015 |
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro | | |