Closed jssmith1 closed 7 years ago
Related to #431
Somewhat related to #423
We reported the assumptions where they could be associated with information needs. We now report them more completely in the appendix. We summarized our strategies for brevity, especially in categories where participants did not pursue strategies actively. The full 40 pages can be found in the online archive. We agree with the reviewer that some strategies are general, but don't view it as a problem. The generality suggests improving these strategies would also benefit developers in diagnosing security vulnerabilities.
R3: