Measuring Cybersecurity

From Build it, Break it, Fix it contests to Cyber Public Health

in Research Security Measurement

January 2, 2026

Overview

A fundamental challenge in cybersecurity is connecting innovations to their real-world impact. How do we know if a new security tool, technique, or policy actually makes people safer? How do we assess the effectiveness of secure development practices? My research aims to apply empirical measurements to better understand and improve cybersecurity outcomes.

Build it, Break it, Fix it Contests

Build it, Break it, Fix it (BIBIFI)) is a security-oriented programming competition my collaborators and I created to encourage and study secure software development. BIBIFI has three phases, essentially marrying a traditional programming contest with a capture-the-flag contest:

  1. Build it: Teams implement a secure system according to a specification
  2. Break it: Teams try to find vulnerabilities in other teams’ submissions
  3. Fix it: Original teams patch the vulnerabilities found in their code

This structure is tantamount to a quasi-controlled experiment that allows us to measure:

  • Common security vulnerabilities developers introduce
  • Effectiveness of different secure coding practices
  • How developers respond to security feedback
  • Trade-offs between security, functionality, and performance

Papers and Talks

Cyber Public Health

Cyber Public Health applies lessons from public health to cybersecurity. Public health tracks disease outbreaks and intervention effectiveness; we need similar efforts to improve cybersecurity. In particular:

  • Measuring end-user cyber harm: Developing methodologies to quantify the actual harm users experience from cyber incidents
  • Outcomes-based metrics: Moving beyond counting vulnerabilities to measuring real security impacts
  • Data-driven interventions: Using empirical data to guide security improvements

I am working with Penn colleagues in business, law, policy, and health to advance this agenda. It is early days for us: Get in touch if you have interest or ideas!

Resources

Posted on:
January 2, 2026
Length:
2 minute read, 395 words
Categories:
Research Security Measurement
See Also: