Cognicrypt: Supporting developers in using cryptography
Previous research suggests that developers often struggle using low-level cryptographic
APIs and, as a result, produce insecure code. When asked, developers desire, among other …
APIs and, as a result, produce insecure code. When asked, developers desire, among other …
Comparing the usability of cryptographic apis
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Towards secure integration of cryptographic software
While cryptography is now readily available to everyone and can, provably, protect private
information from attackers, we still frequently hear about major data leakages, many of which …
information from attackers, we still frequently hear about major data leakages, many of which …
Java cryptography uses in the wild
[Background] Previous research has shown that developers commonly misuse cryptography
APIs.[Aim] We have conducted an exploratory study to find out how crypto APIs are used in …
APIs.[Aim] We have conducted an exploratory study to find out how crypto APIs are used in …
Developers are not the enemy!: The need for usable security apis
M Green, M Smith - IEEE Security & Privacy, 2016 - ieeexplore.ieee.org
Rather than recognizing software engineers' limitations, modern security practice has
created an adversarial relationship between security software designers and the developers …
created an adversarial relationship between security software designers and the developers …
You are not your developer, either: A research agenda for usable security and privacy research beyond end users
While researchers have developed many tools, techniques, and protocols for improving
software security, exploits and breaches are only becoming more frequent. Some of this gap …
software security, exploits and breaches are only becoming more frequent. Some of this gap …
Jumping through hoops: Why do Java developers struggle with cryptography APIs?
To protect sensitive data processed by current applications, developers, whether security
experts or not, have to rely on cryptography. While cryptography algorithms have become …
experts or not, have to rely on cryptography. While cryptography algorithms have become …
Suit up!--made-to-measure hardware implementations of ASCON
Having ciphers that provide confidentiality and authenticity, that are fast in software and
efficient in hardware, these are the goals of the CAESAR authenticated encryption …
efficient in hardware, these are the goals of the CAESAR authenticated encryption …
Developers need support, too: A survey of security advice for software developers
Increasingly developers are becoming aware of the importance of software security, as
frequent high-profile security incidents emphasize the need for secure code. Faced with this …
frequent high-profile security incidents emphasize the need for secure code. Faced with this …
A systematic mapping study on security in agile requirements engineering
[Background] The rapidly changing business environments in which many companies
operate is challenging traditional Requirements Engineering (RE) approaches. This gave …
operate is challenging traditional Requirements Engineering (RE) approaches. This gave …