A survey on developer-centred security

M Tahaei, K Vaniea - 2019 IEEE European Symposium on …, 2019 - ieeexplore.ieee.org
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …

Automatic detection of Java cryptographic API misuses: Are we there yet?

Y Zhang, MMA Kabir, Y Xiao, D Yao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …

You get where you're looking for: The impact of information sources on code security

Y Acar, M Backes, S Fahl, D Kim… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …

Comparing the usability of cryptographic apis

Y Acar, M Backes, S Fahl, S Garfinkel… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …

Challenges in chatbot development: A study of stack overflow posts

A Abdellatif, D Costa, K Badran… - Proceedings of the 17th …, 2020 - dl.acm.org
Chatbots are becoming increasingly popular due to their benefits in saving costs, time, and
effort. This is due to the fact that they allow users to communicate and control different …

What security questions do developers ask? a large-scale study of stack overflow posts

XL Yang, D Lo, X Xia, ZY Wan, JL Sun - Journal of Computer Science and …, 2016 - Springer
Security has always been a popular and critical topic. With the rapid development of
information technology, it is always attracting people's attention. However, since security has …

Secure coding practices in java: Challenges and vulnerabilities

N Meng, S Nagy, D Yao, W Zhuang… - Proceedings of the 40th …, 2018 - dl.acm.org
The Java platform and its third-party libraries provide useful features to facilitate secure
coding. However, misusing them can cost developers time and effort, as well as introduce …

Why do developers get password storage wrong? A qualitative usability study

A Naiakshina, A Danilova, C Tiefenau… - Proceedings of the …, 2017 - dl.acm.org
Passwords are still a mainstay of various security systems, as well as the cause of many
usability issues. For end-users, many of these issues have been studied extensively …

“Leagile” software development: An experience report analysis of the application of lean approaches in agile software development

X Wang, K Conboy, O Cawley - Journal of Systems and Software, 2012 - Elsevier
In recent years there has been a noticeable shift in attention from those who use agile
software development toward lean software development, often labelled as a shift “from …

Going big: a large-scale study on what big data developers ask

M Bagherzadeh, R Khatchadourian - Proceedings of the 2019 27th ACM …, 2019 - dl.acm.org
Software developers are increasingly required to write big data code. However, they find big
data software development challenging. To help these developers it is necessary to …