A survey on developer-centred security
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …
runs on millions of devices. Yet we continue to see insecure code being developed and …
Automatic detection of Java cryptographic API misuses: Are we there yet?
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …
correctly using these APIs is challenging for developers who lack cybersecurity training …
You get where you're looking for: The impact of information sources on code security
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …
unprotected inter-component communication, broken TLS implementations, and violations of …
Comparing the usability of cryptographic apis
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Challenges in chatbot development: A study of stack overflow posts
Chatbots are becoming increasingly popular due to their benefits in saving costs, time, and
effort. This is due to the fact that they allow users to communicate and control different …
effort. This is due to the fact that they allow users to communicate and control different …
What security questions do developers ask? a large-scale study of stack overflow posts
Security has always been a popular and critical topic. With the rapid development of
information technology, it is always attracting people's attention. However, since security has …
information technology, it is always attracting people's attention. However, since security has …
Secure coding practices in java: Challenges and vulnerabilities
The Java platform and its third-party libraries provide useful features to facilitate secure
coding. However, misusing them can cost developers time and effort, as well as introduce …
coding. However, misusing them can cost developers time and effort, as well as introduce …
Why do developers get password storage wrong? A qualitative usability study
A Naiakshina, A Danilova, C Tiefenau… - Proceedings of the …, 2017 - dl.acm.org
Passwords are still a mainstay of various security systems, as well as the cause of many
usability issues. For end-users, many of these issues have been studied extensively …
usability issues. For end-users, many of these issues have been studied extensively …
“Leagile” software development: An experience report analysis of the application of lean approaches in agile software development
In recent years there has been a noticeable shift in attention from those who use agile
software development toward lean software development, often labelled as a shift “from …
software development toward lean software development, often labelled as a shift “from …
Going big: a large-scale study on what big data developers ask
M Bagherzadeh, R Khatchadourian - Proceedings of the 2019 27th ACM …, 2019 - dl.acm.org
Software developers are increasingly required to write big data code. However, they find big
data software development challenging. To help these developers it is necessary to …
data software development challenging. To help these developers it is necessary to …