Skip to main content

Showing 1–3 of 3 results for author: Hibshi, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.02230  [pdf, other

    cs.SE

    "Against the Void": An Interview and Survey Study on How Rust Developers Use Unsafe Code

    Authors: Ian McCormack, Tomas Dougan, Sam Estep, Hanan Hibshi, Jonathan Aldrich, Joshua Sunshine

    Abstract: The Rust programming language is an increasingly popular choice for systems programming, since it can statically guarantee memory safety without automatic garbage collection. Rust provides its safety guarantees by restricting aliasing and mutability, but many key design patterns, such as cyclic aliasing and multi-language interoperation, must bypass these restrictions. Rust's $\texttt{unsafe}$ key… ▽ More

    Submitted 17 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: 12 pages with references, preprint

    ACM Class: D.2

  2. arXiv:2204.12601  [pdf, other

    cs.CR cs.HC

    Observations From an Online Security Competition and Its Implications on Crowdsourced Security

    Authors: Alejandro Cuevas, Emma Hogan, Hanan Hibshi, Nicolas Christin

    Abstract: The crowd sourced security industry, particularly bug bounty programs, has grown dramatically over the past years and has become the main source of software security reviews for many companies. However, the academic literature has largely omitted security teams, particularly in crowd work contexts. As such, we know very little about how distributed security teams organize, collaborate, and what te… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

    Comments: 13 pages, 1 figure, 1 table

  3. arXiv:2002.04631  [pdf, other

    cs.CY cs.CR cs.HC

    Ask the Experts: What Should Be on an IoT Privacy and Security Label?

    Authors: Pardis Emami-Naeini, Yuvraj Agarwal, Lorrie Faith Cranor, Hanan Hibshi

    Abstract: Information about the privacy and security of Internet of Things (IoT) devices is not readily available to consumers who want to consider it before making purchase decisions. While legislators have proposed adding succinct, consumer accessible, labels, they do not provide guidance on the content of these labels. In this paper, we report on the results of a series of interviews and surveys with pri… ▽ More

    Submitted 11 February, 2020; originally announced February 2020.

    Comments: To appear at the 41st IEEE Symposium on Security and Privacy (S&P'20)