{"id":"https://openalex.org/W4300948847","doi":"https://doi.org/10.1145/2976749.2978382","title":"Build It, Break It, Fix It","display_name":"Build It, Break It, Fix It","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W4300948847","doi":"https://doi.org/10.1145/2976749.2978382"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978382","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978382","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059542428","display_name":"Andrew Ruef","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andrew Ruef","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046625836","display_name":"Michael Hicks","orcid":"https://orcid.org/0000-0002-2759-9223"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Hicks","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059759222","display_name":"James Parker","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James Parker","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088579822","display_name":"Dave Levin","orcid":"https://orcid.org/0000-0003-4957-5131"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dave Levin","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105206771","display_name":"Michelle L. Mazurek","orcid":"https://orcid.org/0000-0003-4151-6428"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michelle L. Mazurek","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030425946","display_name":"Piotr Mardziel","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Piotr Mardziel","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5059542428"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":2.25501503,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.95087498,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"690","last_page":"703"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/contest","display_name":"CONTEST","score":0.8309986591339111},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7954742908477783},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6605684757232666},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5868849754333496},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5547055602073669},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5220806002616882},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5015780925750732},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.4909082055091858},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4865916967391968},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4775170385837555},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4678203761577606},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42283859848976135},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.41423988342285156},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.35603636503219604},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.17202210426330566},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.110192209482193},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.07871529459953308}],"concepts":[{"id":"https://openalex.org/C2777582232","wikidata":"https://www.wikidata.org/wiki/Q5013414","display_name":"CONTEST","level":2,"score":0.8309986591339111},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7954742908477783},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6605684757232666},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5868849754333496},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5547055602073669},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5220806002616882},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5015780925750732},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.4909082055091858},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4865916967391968},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4775170385837555},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4678203761577606},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42283859848976135},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.41423988342285156},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.35603636503219604},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.17202210426330566},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.110192209482193},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.07871529459953308},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978382","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978382","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W125279808","https://openalex.org/W186684821","https://openalex.org/W1412317863","https://openalex.org/W1584091223","https://openalex.org/W1628063087","https://openalex.org/W1998029707","https://openalex.org/W2005525408","https://openalex.org/W2045856890","https://openalex.org/W2052714158","https://openalex.org/W2055976619","https://openalex.org/W2056852345","https://openalex.org/W2066358396","https://openalex.org/W2067148378","https://openalex.org/W2092595369","https://openalex.org/W2095881341","https://openalex.org/W2096650374","https://openalex.org/W2099151437","https://openalex.org/W2114827655","https://openalex.org/W2147901100","https://openalex.org/W2159059513","https://openalex.org/W2215492781","https://openalex.org/W2296718798","https://openalex.org/W2951119335","https://openalex.org/W4253277433","https://openalex.org/W4300870773","https://openalex.org/W4361868421"],"related_works":["https://openalex.org/W2735088306","https://openalex.org/W4286740636","https://openalex.org/W2946214509","https://openalex.org/W2606108738","https://openalex.org/W2628063975","https://openalex.org/W2356479129","https://openalex.org/W2387346515","https://openalex.org/W2352196451","https://openalex.org/W2590086693","https://openalex.org/W2381260192"],"abstract_inverted_index":{"Typical":[0],"security":[1,153,185],"contests":[2,114,130],"focus":[3],"on":[4,96],"breaking":[5,106],"or":[6],"mitigating":[7],"the":[8,15,25,42,67,71,133],"impact":[9],"of":[10,44,118],"buggy":[11],"systems.":[12],"We":[13],"present":[14],"Build-it,":[16],"Break-it,":[17],"Fix-it":[18],"(BIBIFI)":[19],"contest,":[20],"which":[21],"aims":[22],"to":[23,27,57,77,150],"assess":[24],"ability":[26],"securely":[28],"build":[29,38],"software,":[30],"not":[31],"just":[32],"break":[33,58],"it.":[34],"In":[35],"BIBIFI,":[36],"teams":[37,55,120,156,173,179],"specified":[39],"software":[40,104],"with":[41,100,157,169],"goal":[43],"maximizing":[45],"correctness,":[46],"performance,":[47],"and":[48,70,105,121],"security.":[49],"The":[50],"latter":[51],"is":[52],"tested":[53],"when":[54],"attempt":[56],"other":[59,144],"teams'":[60],"submissions.":[61],"Winners":[62],"are":[63],"chosen":[64],"from":[65,128],"among":[66],"best":[68,72],"builders":[69],"breakers.":[73],"BIBIFI":[74],"was":[75],"designed":[76],"be":[78],"open-ended-teams":[79],"can":[80],"use":[81],"any":[82],"language,":[83],"tool,":[84],"process,":[85],"etc.":[86],"that":[87,98,132,174],"they":[88],"like.":[89],"As":[90],"such,":[91],"contest":[92],"outcomes":[93],"shed":[94],"light":[95],"factors":[97],"correlate":[99],"successfully":[101],"building":[102],"secure":[103,164],"insecure":[107],"software.":[108],"During":[109],"2015,":[110],"we":[111],"ran":[112],"three":[113],"involving":[115],"a":[116,152],"total":[117],"116":[119],"two":[122],"different":[123],"programming":[124],"problems.":[125],"Quantitative":[126],"analysis":[127],"these":[129],"found":[131],"most":[134],"efficient":[135],"build-it":[136,155,178],"submissions":[137,141],"used":[138],"C/C++,":[139],"but":[140],"coded":[142],"in":[143],"statically-typed":[145],"languages":[146],"were":[147,175,180],"less":[148],"likely":[149],"have":[151],"flaw;":[154],"diverse":[158],"programming-language":[159],"knowledge":[160],"also":[161,176],"produced":[162],"more":[163],"code.":[165],"Shorter":[166],"programs":[167],"correlated":[168],"better":[170,182],"scores.":[171],"Break-it":[172],"successful":[177],"significantly":[181],"at":[183],"finding":[184],"bugs.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":7},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-10-04T00:00:00"}
