drvotipka Profile Banner
Daniel Votipka Profile
Daniel Votipka

@drvotipka

Followers
515
Following
721
Media
26
Statuses
378

@TuftsCS professor. @umdcs Alum. Member of @CollegeParkMC2 lab. Interested in usable security and software vulnerability discovery.

Boston, MA
Joined December 2013
Don't wanna be here? Send us removal request.
@drvotipka
Daniel Votipka
11 months
@TuftsCS is hiring multiple tenure track positions. We're particularly interested in #HCI. Our department has several people in HCI-related fields and we're looking to build on that expertise. Come join us. @TuftsUniversity is a great place to work!.
0
3
2
@drvotipka
Daniel Votipka
2 months
She’s going to hate me for doing this, but I just want to say how proud I am of my wife @RBnCoffee, the new President-Elect of #APAPP!
Tweet media one
0
0
13
@drvotipka
Daniel Votipka
2 months
RT @Tanusree_Sharma: Thanks @GoogleResearch for the generous gift in supporting our research on “ Designing Accessible Tools for Blind and….
Tweet card summary image
research.google
0
3
0
@drvotipka
Daniel Votipka
7 months
RT @lujobauer: Please consider sending your awesome computer security & privacy papers to @USENIXSecurity '25! The cycle 2 deadline is Jan….
Tweet card summary image
usenix.org
.view-reference-conference-organizers .content { column-count: 3; } .paragraphs-item-view-reference.view-reference-conference-organizers .field { padding-left: 2em}
0
12
0
@drvotipka
Daniel Votipka
10 months
RT @wentaochirps: I'll be presenting our paper "A Qualitative Analysis of Practical De-Identification Guides" at a 3:30pm CCS session today….
0
2
0
@drvotipka
Daniel Votipka
10 months
RT @tianshi_li: I’m planning to hire 2 PhD students in Fall25 at @KhouryCollege!. How do we make privacy easier for people?.How do we addre….
0
127
0
@drvotipka
Daniel Votipka
10 months
RT @AmritaRoyChowd8: I'll be recruiting PhD students this cycle! If you're interested in working at the intersection of cryptography, diffe….
0
106
0
@drvotipka
Daniel Votipka
10 months
RT @sarahradway: had so much fun yesterday hosting the first session of the policy red teaming working group @BKCHarvard !! truly a blast <….
0
2
0
@drvotipka
Daniel Votipka
1 year
RT @DrSanchariDas: Excited to see our work in print📚 .Read our work on telehealth privacy & security: Grateful to c….
0
3
0
@drvotipka
Daniel Votipka
1 year
Any chance anyone got a picture of @ZenW00kie presenting? I had to head home early, so I didn't catch it. I guess I'll just have to wait for USENIX to post the videos.
0
0
0
@drvotipka
Daniel Votipka
1 year
RT @MiuyinY: I am incredibly grateful to have had the opportunity to present our paper, “Comparing Malware Evasion Theory with Practice: Re….
0
4
0
@drvotipka
Daniel Votipka
1 year
RT @marvinkopo: If you are around, @PriyankaBadva will be presenting our paper today after lunch. Track 1 1:30 pm–2:45 pm. "Unveiling the H….
0
3
0
@drvotipka
Daniel Votipka
1 year
@ShannonLantzy @sethcarmody1 @HealthCyberWG @MedCrypt @ada95ftw @_peterney Adding some more tags @TuftsUniversity, @TuftsCS (Can you tell I'm not good at Twitter? 😅).
0
0
0
@drvotipka
Daniel Votipka
1 year
This extreme labor of love, which required 2-years of recruiting could not have been done without our partners in the medical device and threat modeling communities, @ShannonLantzy, @sethcarmody1, @HealthCyberWG, @MedCrypt, @ada95ftw, and @_peterney.
1
0
1
@drvotipka
Daniel Votipka
1 year
From these results, we create a two-phase threat modeling process model, for future researchers investigating threat modeling in other domains and empirically assessing the efficacy of novel threat modeling supports. To learn more, check out the paper:
1
0
2
@drvotipka
Daniel Votipka
1 year
They navigated the system in an ad-hoc fashion, sometimes working left-to-right, reviewing similar assets, or focusing on a single use case (a strategy with limited previous discussion). Also, they often used multiple approaches during a single threat modeling session.
1
0
0
@drvotipka
Daniel Votipka
1 year
We observed the questions they asked could be grouped according to threat modeling's 4 questions, and further divided into the common subquestions in this picture. Also, the question order is flexible, sometimes starting with threats, but other with mitigations or safety concern.
Tweet media one
1
0
0
@drvotipka
Daniel Votipka
1 year
We observed which parts of the system they focused on, how they elicited threats and mitigations in specific system components, and if they relied on a specific approach to traverse the system and ensure they covered every part of the potential attack surface.
1
0
0
@drvotipka
Daniel Votipka
1 year
We take a first step to answer this question through interviews with 12 medical device security experts, asking them to develop threat models for mock systems. This community offers a unique opportunity to study threat modeling as the FDA introduced threat modeling requirements.
1
0
1
@drvotipka
Daniel Votipka
1 year
Last, but not least, @ZenW00kie will be presenting first thing tomorrow at #usesec2024 about our work investigating medical device manufacturers' threat modeling processes. We all have probably heard about some process for threat modeling, but how do people actually do it?.
2
1
1