Cognicrypt: Supporting developers in using cryptography

S Krüger, S Nadi, M Reif, K Ali, M Mezini… - 2017 32nd IEEE …, 2017 - ieeexplore.ieee.org
Previous research suggests that developers often struggle using low-level cryptographic
APIs and, as a result, produce insecure code. When asked, developers desire, among other …

Comparing the usability of cryptographic apis

Y Acar, M Backes, S Fahl, S Garfinkel… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …

Towards secure integration of cryptographic software

S Arzt, S Nadi, K Ali, E Bodden, S Erdweg… - 2015 ACM International …, 2015 - dl.acm.org
While cryptography is now readily available to everyone and can, provably, protect private
information from attackers, we still frequently hear about major data leakages, many of which …

Java cryptography uses in the wild

M Hazhirpasand, M Ghafari, O Nierstrasz - Proceedings of the 14th ACM …, 2020 - dl.acm.org
[Background] Previous research has shown that developers commonly misuse cryptography
APIs.[Aim] We have conducted an exploratory study to find out how crypto APIs are used in …

Developers are not the enemy!: The need for usable security apis

M Green, M Smith - IEEE Security & Privacy, 2016 - ieeexplore.ieee.org
Rather than recognizing software engineers' limitations, modern security practice has
created an adversarial relationship between security software designers and the developers …

You are not your developer, either: A research agenda for usable security and privacy research beyond end users

Y Acar, S Fahl, ML Mazurek - 2016 IEEE Cybersecurity …, 2016 - ieeexplore.ieee.org
While researchers have developed many tools, techniques, and protocols for improving
software security, exploits and breaches are only becoming more frequent. Some of this gap …

Jumping through hoops: Why do Java developers struggle with cryptography APIs?

S Nadi, S Krüger, M Mezini, E Bodden - Proceedings of the 38th …, 2016 - dl.acm.org
To protect sensitive data processed by current applications, developers, whether security
experts or not, have to rely on cryptography. While cryptography algorithms have become …

Suit up!--made-to-measure hardware implementations of ASCON

H Gross, E Wenger, C Dobraunig… - … Conference on Digital …, 2015 - ieeexplore.ieee.org
Having ciphers that provide confidentiality and authenticity, that are fast in software and
efficient in hardware, these are the goals of the CAESAR authenticated encryption …

Developers need support, too: A survey of security advice for software developers

Y Acar, C Stransky, D Wermke, C Weir… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
Increasingly developers are becoming aware of the importance of software security, as
frequent high-profile security incidents emphasize the need for secure code. Faced with this …

A systematic mapping study on security in agile requirements engineering

H Villamizar, M Kalinowski, M Viana… - 2018 44th Euromicro …, 2018 - ieeexplore.ieee.org
[Background] The rapidly changing business environments in which many companies
operate is challenging traditional Requirements Engineering (RE) approaches. This gave …