{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T07:22:08Z","timestamp":1768029728183,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978382","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"690-703","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Build It, Break It, Fix It"],"prefix":"10.1145","author":[{"given":"Andrew","family":"Ruef","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Michael","family":"Hicks","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"James","family":"Parker","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Dave","family":"Levin","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Michelle L.","family":"Mazurek","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Piotr","family":"Mardziel","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","unstructured":"The ACM-ICPC International Collegiate Programming Contest. http:\/\/icpc.baylor.edu.  The ACM-ICPC International Collegiate Programming Contest. http:\/\/icpc.baylor.edu."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_9"},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"AIC model selection and multimodel inference in behavioral ecology: some background, observations, and comparisons","volume":"65","author":"Burnham K. P.","year":"2011","unstructured":"Burnham , K. P. , Anderson , D. R. , and Huyvaert , K. P . AIC model selection and multimodel inference in behavioral ecology: some background, observations, and comparisons . Behavioral Ecology and Sociobiology 65 , 1 ( 2011 ), 23--35. Burnham, K. P., Anderson, D. R., and Huyvaert, K. P. AIC model selection and multimodel inference in behavioral ecology: some background, observations, and comparisons. Behavioral Ecology and Sociobiology 65, 1 (2011), 23--35.","journal-title":"Behavioral Ecology and Sociobiology"},{"key":"e_1_3_2_1_5_1","volume-title":"PicoCTF: A game-based computer security competition for high school students. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)","author":"Chapman P.","year":"2014","unstructured":"Chapman , P. , Burket , J. , and Brumley , D . PicoCTF: A game-based computer security competition for high school students. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) ( 2014 ). Chapman, P., Burket, J., and Brumley, D. PicoCTF: A game-based computer security competition for high school students. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) (2014)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1884848.1884859"},{"key":"e_1_3_2_1_7_1","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","year":"1988","unstructured":"Cohen , J. Statistical Power Analysis for the Behavioral Sciences . Lawrence Erlbaum Associates , 1988 . Cohen, J. Statistical Power Analysis for the Behavioral Sciences. Lawrence Erlbaum Associates, 1988."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107627"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.110"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.51"},{"key":"e_1_3_2_1_11_1","unstructured":"DEF CON Communications Inc. Capture the flag archive. https:\/\/www.defcon.org\/html\/links\/dc-ctf.html.  DEF CON Communications Inc. Capture the flag archive. https:\/\/www.defcon.org\/html\/links\/dc-ctf.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076740"},{"key":"e_1_3_2_1_13_1","unstructured":"dragostech.com inc. Cansecwest applied security conference. http:\/\/cansecwest.com.  dragostech.com inc. Cansecwest applied security conference. http:\/\/cansecwest.com."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.83"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36563-8_14"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002168.2002177"},{"key":"e_1_3_2_1_17_1","unstructured":"Git -- distributed version control management system. http:\/\/git-scm.com.  Git -- distributed version control management system. http:\/\/git-scm.com."},{"key":"e_1_3_2_1_18_1","unstructured":"Google code jam. http:\/\/code.google.com\/codejam.  Google code jam. http:\/\/code.google.com\/codejam."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.51"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.120"},{"key":"e_1_3_2_1_21_1","unstructured":"ICFP programming contest. http:\/\/icfpcontest.org.  ICFP programming contest. http:\/\/icfpcontest.org."},{"key":"e_1_3_2_1_22_1","unstructured":"Inc D. C. C. Def con hacking conference. http:\/\/www.defcon.org.  Inc D. C. C. Def con hacking conference. http:\/\/www.defcon.org."},{"key":"e_1_3_2_1_23_1","unstructured":"Kim Q. Want to learn cybersecurity? head to def con. http:\/\/www.marketplace.org\/2014\/08\/25\/tech\/want-learn-cybersecurity-head-def-con 2014.  Kim Q. Want to learn cybersecurity? head to def con. http:\/\/www.marketplace.org\/2014\/08\/25\/tech\/want-learn-cybersecurity-head-def-con 2014."},{"key":"e_1_3_2_1_24_1","unstructured":"Maryland cyber challenge & competition. http:\/\/www.fbcinc.com\/e\/cybermdconference\/competitorinfo.aspx.  Maryland cyber challenge & competition. http:\/\/www.fbcinc.com\/e\/cybermdconference\/competitorinfo.aspx."},{"key":"e_1_3_2_1_25_1","unstructured":"National Collegiate Cyber Defense Competition. http:\/\/www.nationalccdc.org.  National Collegiate Cyber Defense Competition. http:\/\/www.nationalccdc.org."},{"key":"e_1_3_2_1_26_1","volume-title":"Dept of Computer Science, the University of Maryland","author":"Parker J.","year":"2014","unstructured":"Parker , J. LMonad: Information flow control for haskell web applications. Master's thesis , Dept of Computer Science, the University of Maryland , 2014 . Parker, J. LMonad: Information flow control for haskell web applications. Master's thesis, Dept of Computer Science, the University of Maryland, 2014."},{"key":"e_1_3_2_1_27_1","volume-title":"Csaw - cybersecurity competition","author":"Polytechnic Institute of New York University.","year":"2012","unstructured":"Polytechnic Institute of New York University. Csaw - cybersecurity competition 2012 . http:\/\/www.poly.edu\/csaw2012\/csaw-CTF. Polytechnic Institute of New York University. Csaw - cybersecurity competition 2012. http:\/\/www.poly.edu\/csaw2012\/csaw-CTF."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.22"},{"key":"e_1_3_2_1_29_1","unstructured":"PostgreSQL: The world's most advanced open source database. http:\/\/www.postgresql.org.  PostgreSQL: The world's most advanced open source database. http:\/\/www.postgresql.org."},{"key":"e_1_3_2_1_30_1","first-page":"1","article-title":"Build it, break it, fix it: Competing to build secure systems","volume":"21","author":"Ruef A.","year":"2015","unstructured":"Ruef , A. , and Hicks , M . Build it, break it, fix it: Competing to build secure systems . The Next Wave 21 , 1 ( 2015 ), 19--23. Ruef, A., and Hicks, M. Build it, break it, fix it: Competing to build secure systems. The Next Wave 21, 1 (2015), 19--23.","journal-title":"The Next Wave"},{"key":"e_1_3_2_1_31_1","volume-title":"CSET","author":"Ruef A.","year":"2015","unstructured":"Ruef , A. , Hicks , M. , Parker , J. , Levin , D. , Memon , A. , Plane , J. , and Mardziel , P . Build it break it: Measuring and comparing development security . In CSET ( 2015 ). Ruef, A., Hicks, M., Parker, J., Levin, D., Memon, A., Plane, J., and Mardziel, P. Build it break it: Measuring and comparing development security. In CSET (2015)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698898"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034675.2034688"},{"key":"e_1_3_2_1_35_1","unstructured":"Top coder competitions. http:\/\/apps.topcoder.com\/wiki\/display\/tc\/Algorithm+Overview.  Top coder competitions. http:\/\/apps.topcoder.com\/wiki\/display\/tc\/Algorithm+Overview."},{"key":"e_1_3_2_1_36_1","volume-title":"personal communication stating that CFI was not deployed at Microsoft due to its overhead exceeding 10%","author":"\u00dalfar Erlingsson","year":"2012","unstructured":"\u00dalfar Erlingsson . personal communication stating that CFI was not deployed at Microsoft due to its overhead exceeding 10% , 2012 . \u00dalfar Erlingsson. personal communication stating that CFI was not deployed at Microsoft due to its overhead exceeding 10%, 2012."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.32"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2016.7425809"},{"key":"e_1_3_2_1_39_1","unstructured":"Yesod web framework for haskell. http:\/\/www.yesodweb.com.  Yesod web framework for haskell. http:\/\/www.yesodweb.com."}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978382","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978382"}},"subtitle":["Contesting Secure Development"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":39,"alternative-id":["10.1145\/2976749.2978382","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978382","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}