{"language":[{"iso":"eng"}],"abstract":[{"text":"Vulnerability disclosures are necessary to improve the security of our digital ecosystem. However, they can also be challenging for researchers: it may be hard to find out who the affected parties even are, or how to contact them. Researchers may be ignored or face adversity when disclosing vulnerabilities. We investigate researchers' experiences with vulnerability disclosures, extract best practices, and make recommendations for researchers, institutions that employ them, industry, and regulators to enable effective vulnerability disclosures.","lang":"eng"}],"publication_status":"published","doi":"10.1145/3719027.3760723","status":"public","author":[{"last_name":"Sri Ramulu","orcid":"0000-0002-0000-5843","full_name":"Sri Ramulu, Harshini","first_name":"Harshini","id":"99000"},{"id":"97843","first_name":"Anna Lena","full_name":"Rotthaler, Anna Lena","last_name":"Rotthaler"},{"orcid":"0000-0002-3182-4059","full_name":"Rossel, Jost","last_name":"Rossel","id":"58331","first_name":"Jost"},{"full_name":"Gonzalez Rodriguez, Rachel","last_name":"Gonzalez Rodriguez","first_name":"Rachel"},{"first_name":"Dominik","last_name":"Wermke","full_name":"Wermke, Dominik"},{"first_name":"Sascha","last_name":"Fahl","full_name":"Fahl, Sascha"},{"first_name":"Tadayoshi","last_name":"Kohno","full_name":"Kohno, Tadayoshi"},{"id":"83504","first_name":"Juraj","last_name":"Somorovsky","full_name":"Somorovsky, Juraj","orcid":"0000-0002-3593-7720"},{"full_name":"Acar, Yasemin","last_name":"Acar","first_name":"Yasemin","id":"94636"}],"oa":"1","type":"conference","conference":{"end_date":"2025-10-17","start_date":"2025-10-13"},"date_created":"2025-12-02T08:48:00Z","date_updated":"2025-12-02T08:54:18Z","year":"2025","keyword":["software vulnerabilities","vulnerability disclosure","security research"],"_id":"62738","citation":{"short":"H. Sri Ramulu, A.L. Rotthaler, J. Rossel, R. Gonzalez Rodriguez, D. Wermke, S. Fahl, T. Kohno, J. Somorovsky, Y. Acar, in: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2025.","chicago":"Sri Ramulu, Harshini, Anna Lena Rotthaler, Jost Rossel, Rachel Gonzalez Rodriguez, Dominik Wermke, Sascha Fahl, Tadayoshi Kohno, Juraj Somorovsky, and Yasemin Acar. “Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures.” In Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2025. https://doi.org/10.1145/3719027.3760723.","apa":"Sri Ramulu, H., Rotthaler, A. L., Rossel, J., Gonzalez Rodriguez, R., Wermke, D., Fahl, S., Kohno, T., Somorovsky, J., & Acar, Y. (2025). Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures. Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. https://doi.org/10.1145/3719027.3760723","ieee":"H. Sri Ramulu et al., “Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures,” 2025, doi: 10.1145/3719027.3760723.","mla":"Sri Ramulu, Harshini, et al. “Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures.” Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2025, doi:10.1145/3719027.3760723.","bibtex":"@inproceedings{Sri Ramulu_Rotthaler_Rossel_Gonzalez Rodriguez_Wermke_Fahl_Kohno_Somorovsky_Acar_2025, title={Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures}, DOI={10.1145/3719027.3760723}, booktitle={Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Sri Ramulu, Harshini and Rotthaler, Anna Lena and Rossel, Jost and Gonzalez Rodriguez, Rachel and Wermke, Dominik and Fahl, Sascha and Kohno, Tadayoshi and Somorovsky, Juraj and Acar, Yasemin}, year={2025} }","ama":"Sri Ramulu H, Rotthaler AL, Rossel J, et al. Poster: Computer Security Researchers’ Experiences with Vulnerability Disclosures. In: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. ACM; 2025. doi:10.1145/3719027.3760723"},"title":"Poster: Computer Security Researchers' Experiences with Vulnerability Disclosures","publication":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","publisher":"ACM","user_id":"58331","main_file_link":[{"open_access":"1","url":"https://dl.acm.org/doi/10.1145/3719027.3760723"}]}