Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns
JH Klemmer, SA Horstmann, N Patnaik… - Proceedings of the …, 2024 - dl.acm.org
Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub
Copilot, the software industry quickly utilized these tools for software development tasks, eg …
Copilot, the software industry quickly utilized these tools for software development tasks, eg …
Skipping the Security Side Quests: A Qualitative Study on Security Practices and Challenges in Game Development
The video game market is one of the biggest for software products. Video game
development has progressed in the last decades to complex and multifaceted endeavors …
development has progressed in the last decades to complex and multifaceted endeavors …
“I'm pretty expert and I still screw it up”: Qualitative Insights into Experiences and Challenges of Designing and Implementing Cryptographic Library APIs
Cryptographic libraries are a vital security component of software systems, yet their misuse
has caused several incidents. Prior work has established that misuse of cryptographic …
has caused several incidents. Prior work has established that misuse of cryptographic …
Unraveling Challenges with Supply-Chain Levels for Software Artifacts (SLSA) for Securing the Software Supply Chain
In 2023, Sonatype reported a 200\% increase in software supply chain attacks, including
major build infrastructure attacks. To secure the software supply chain, practitioners can …
major build infrastructure attacks. To secure the software supply chain, practitioners can …
What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developers
Several security issues in open-source projects demonstrate that developer accounts get
misused or stolen if weak authentication is used. Many services have started to enforce …
misused or stolen if weak authentication is used. Many services have started to enforce …
Developers' Approaches to Software Supply Chain Security: An Interview Study
R Sammak, AL Rotthaler, HS Ramulu… - Proceedings of the …, 2023 - dl.acm.org
Software Supply Chain Security (SSC) involves numerous stakeholders, processes and
tools that work together to deliver a software product. A vulnerability in one element can …
tools that work together to deliver a software product. A vulnerability in one element can …
On the usability of authentication security communication
SM Amft - 2024 - repo.uni-hannover.de
Information technology has become more and more ubiquitous in recent times, and it affects
almost all aspects of modern life. To protect this technology and its underlying resources, the …
almost all aspects of modern life. To protect this technology and its underlying resources, the …