Login / Signup
Sam Weber
Publication Activity (10 Years)
Years Active: 1992-2023
Publications (10 Years): 9
Top Topics
Crowd Sourcing
Development Processes
Empirical Evaluation
Human Factors
Top Venues
Dagstuhl Reports
PLATEAU@SPLASH
USENIX Annual Technical Conference
RE
</>
Publications
</>
Eric Bodden
,
Sam Weber
,
Laurie A. Williams
Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 23181).
Dagstuhl Reports
13 (5) (2023)
Adam Shostack
,
Matthew Smith
,
Sam Weber
,
Mary Ellen Zurko
Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 19231).
Dagstuhl Reports
9 (6) (2019)
Sam Weber
,
Adam Shostack
,
Jon A. Solworth
,
Mary Ellen Zurko
Panel: Empirically-based Secure OS Design.
NSPW
(2017)
Nancy Mead
,
Forrest Shull
,
Janine Spears
,
Stefan Heibl
,
Sam Weber
,
Jane Cleland-Huang
Crowd Sourcing the Creation of Personae Non Gratae for Requirements-Phase Threat Modeling.
RE
(2017)
Yiwen Li
,
Brendan Dolan-Gavitt
,
Sam Weber
,
Justin Cappos
Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path.
USENIX Annual Technical Conference
(2017)
Sam Weber
,
Michael J. Coblenz
,
Brad A. Myers
,
Jonathan Aldrich
,
Joshua Sunshine
Empirical Studies on the Security and Usability Impact of Immutability.
SecDev
(2017)
Beth Yost
,
Michael J. Coblenz
,
Brad A. Myers
,
Joshua Sunshine
,
Jonathan Aldrich
,
Sam Weber
,
Matthew Patron
,
Melissa Heeren
,
Shelley Krueger
,
Mark S. Pfaff
Software Development Practices, Barriers in the Field and the Relationship to Software Quality.
ESEM
(2016)
Michael J. Coblenz
,
Joshua Sunshine
,
Jonathan Aldrich
,
Brad A. Myers
,
Sam Weber
,
Forrest Shull
Exploring language support for immutability.
ICSE
(2016)
Michael J. Coblenz
,
Joshua Sunshine
,
Brad A. Myers
,
Sam Weber
,
Forrest Shull
Comparing transitive to non-transitive object immutability.
PLATEAU@SPLASH
(2015)
Sam Weber
,
Amitkumar M. Paradkar
,
Suzanne McIntosh
,
David C. Toll
,
Paul A. Karger
,
Matthew Kaplan
,
Elaine R. Palmer
The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System.
ISSRE
(2008)
David C. Toll
,
Paul A. Karger
,
Elaine R. Palmer
,
Suzanne McIntosh
,
Sam Weber
The Caernarvon secure embedded operating system.
ACM SIGOPS Oper. Syst. Rev.
42 (1) (2008)
Sam Weber
,
Paula Austel
,
Michael McIntosh
A Framework for Multi-Platform SOA Security Analyses.
ICWS
(2007)
Xiaolan Zhang
,
Larry Koved
,
Marco Pistoia
,
Sam Weber
,
Trent Jaeger
,
Guillaume Marceau
,
Liangzhao Zeng
The case for analysis preserving language transformation.
ISSTA
(2006)
Amit M. Paradkar
,
Suzanne McIntosh
,
Sam Weber
,
David C. Toll
,
Paul A. Karger
,
Matt Kaplan
Chicken & Egg: Dependencies in Security Testing and Compliance with Common Criteria Evaluations.
ISSSE
(2006)
Sam Weber
,
Paul A. Karger
,
Amit M. Paradkar
A software flaw taxonomy: aiming tools at security.
SESS@ICSE
(2005)
Sam Weber
,
Paul A. Karger
,
Amit M. Paradkar
A software flaw taxonomy: aiming tools at security.
ACM SIGSOFT Softw. Eng. Notes
30 (4) (2005)
Sam Weber
,
Hoi Y. Chan
,
Lou Degenaro
,
Judah Diament
,
Achille Fokoue-Nkoutche
,
Isabelle Rouvellou
Fusion: A System For Business Users To Manage Program Variability.
IEEE Trans. Software Eng.
31 (7) (2005)
Isabelle Rouvellou
,
Lou Degenaro
,
Judah Diament
,
Achille Fokoue
,
Sam Weber
Business Users and Program Variability: Bridging the Gap.
ICSR
(2004)
Hani Umar Shakeel
,
Michael L. Best
,
Bruno Miller
,
Sam Weber
Comparing Urban and Rural Telecenters Costs.
Electron. J. Inf. Syst. Dev. Ctries.
4 (1) (2001)
Joshua Anhalt
,
Asim Smailagic
,
Daniel P. Siewiorek
,
Francine Gemperle
,
Daniel Salber
,
Sam Weber
,
James E. Beck
,
James Jennings
Toward Context-Aware Computing: Experiences and Lessons.
IEEE Intell. Syst.
16 (3) (2001)
Jonathan S. Shapiro
,
Sam Weber
Verifying the EROS Confinement Mechanism.
IEEE Symposium on Security and Privacy
(2000)
Sam Weber
,
Bard Bloom
,
Geoffrey Brown
Compiling Joy Into Silicon: An Exercise in Applied Structural Operational Semantics.
REX Workshop
(1992)