Main Content

Talks and (invited) lectures

  1. Hackathon on Effective Threat Modeling, Online, DevSecOps Days DC 2021.
  2. Hackathon on Effective Threat Modeling, Online, Microsoft, 2021.
  3. Threat Modeling in Practice, The 7th International Workshop on Secure Software Engineering (SSE 2021), Digital, 2021 (keynote)
  4. On the security of connected vehicles , The 6th International Conference on Software Security and Assurance (ICSSA 2020), Altoona, PA, 2020 (keynote) Recording
  5. Maintain Software Security During Code Changes, Security Compass, Online, 2020.Recording
  6. On the security of connected vehicles , The 14th International Conference on Risks and Security of Internet and Systems, Hammamet, Tunisia, 2019 (Keynotes)
  7. Security Concerns and Best Practices for SecDevOps, DevSecOpsDays, Istanbul, Turkey, 2019
  8. Secure Code Changes, Annual Computer Security Applications Conference, San Juan, Puerto Rico, USA, 2018.
  9. Security Concerns and Best Practices for SecDevOps, 12th Central Area Networking and Security Workshop, Manhattan, KS, 2018.
  10. Teaching Software Architecture Process to Undergraduate Students: A Case Study, International Workshop on Engineering IoT systems: Architectures, Services, Applications, and Platforms, Seattle, USA, 2018. Presentation
  11. On the Limit of Security Protection Mechanisms, Iowa State University Research Day, Ames, IA, USA, 2018.
  12. What Will It Take to Develop Secure Software? Midwest Security Workshop, Urbana, USA, 2018.
  13. Identification of Dependency-based Attacks on Node.js, Montclair State University, USA, 2018.
  14. What Roles Can Empirical Research Play to Advance Software Security Knowledge? Purdue University, USA, 2018.
  15. Identification of Dependency-based Attacks on Node.js, 11th Central Area Networking and Security Workshop, Rolla, MO, USA, 2017.
  16. What Roles Can Empirical Research Play to Advance Software Security Knowledge? University of Oslo, Oslo, Norway, 2017.
  17. What Will It Take to Develop Secure Software? SINTEF, Norway, 2016.
  18. What Will It Take to Develop Secure Software? Ivoire Cybersecurity conference, Cote d'Ivoire, 2016.
  19. Reflection on the Learner-Centric Education Approach, Iowa State University, USA,(online) 2016.
  20. Likelihood of Threats to Connected Vehicles, Robert Bosch GmbH, Renningen, Germany, 2016.
  21. Time for Addressing Software Security Issues: Prediction Models and Impacting Factors, OWASP AppSec Europe, Rome, Italy, 2016.
  22. Security Code Analysis of Truecrypt, Workshop "Softwarequalitat sichtbar machen," Leipzig, Germany, 2016.
  23. Empirical Research Methods for Secure Software Engineering, International Cyber Security Workshop and Certificate Program, Istanbul, Turkey, 2016.
  24. Empirical Research Methods for Secure Software Development, Ninth International Crisis Management Workshop (CriM'15) and Oulu Winter School, Oulu, Finland, 2015.
  25. Estimating Vulnerabilities Fixing Time, Cast Workshop hot topic ``Big Data Security," Darmstadt, Germany, 2015.
  26. Estimating Effort to fix Vulnerabilities at SAP, Workshop Recent Advances in Secure Software Engineering, Alghero, Italy, 2015.
  27. An Example of the Science for Secure Software Development - Attacker-Capability-Based Risk Estimation, SINTEF, Trondheim, Norway, 2015.
  28. Incorporating Attacker Capabilities in Risk Estimation and Mitigation, Purdue University, West Lafayette, IN, USA, 2014.
  29. Three examples of Cyber-physical Systems,? Summer School on Cyber-Physical Systems, Grenoble, France, 2014.
  30. Extending the Agile Development Life-cycle to Develop Secure Software, Fraunhofer Secure Information Technology, Darmstadt, Germany, 2013.
  31. Extending the Agile Development Life-cycle to Develop Secure Software, Lero-The Irish Software Research Center, Limerick, Ireland, 2013.
  32. Digital Security Culture for Organizations and the Society, Workshop Information Technology Security for Public Institutions, Hannover, Germany, 2013.
  33. Towards Self-protecting Data, Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg, 2012.
  34. Protecting Privacy in Sensitive Data Dissemination with Active Bundles, Purdue University, West Lafayette, IN, USA, 2010.