[HTML][HTML] Challenges with developing secure mobile health applications: Systematic review

B Aljedaani, MA Babar - JMIR mHealth and uHealth, 2021 - mhealth.jmir.org
Background: Mobile health (mHealth) apps have gained significant popularity over the last
few years due to their tremendous benefits, such as lowering health care costs and …

A qualitative study of dependency management and its security implications

I Pashchenko, DL Vu, F Massacci - … of the 2020 ACM SIGSAC conference …, 2020 - dl.acm.org
Several large scale studies on the Maven, NPM, and Android ecosystems point out that
many developers do not often update their vulnerable software libraries thus exposing the …

Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges

H Chen, MA Babar - ACM Computing Surveys, 2024 - dl.acm.org
The rapid development of Machine Learning (ML) has demonstrated superior performance
in many areas, such as computer vision and video and speech recognition. It has now been …

Understanding privacy-related questions on stack overflow

M Tahaei, K Vaniea, N Saphra - … of the 2020 CHI conference on human …, 2020 - dl.acm.org
We analyse Stack Overflow (SO) to understand challenges and confusions developers face
while dealing with privacy-related topics. We apply topic modelling techniques to 1,733 …

Do you really code? designing and evaluating screening questions for online surveys with programmers

A Danilova, A Naiakshina… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Recruiting professional programmers in sufficient numbers for research studies can be
challenging because they often cannot spare the time, or due to their geographical …

Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list

M Tahaei, K Vaniea - Proceedings of the 2022 CHI Conference on …, 2022 - dl.acm.org
Reliably recruiting participants with programming skills is an ongoing challenge for empirical
studies involving software development technologies, often leading to the use of …

" Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain

D Wermke, JH Klemmer, N Wöhler… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Open source components are ubiquitous in companies' setups, processes, and software.
Utilizing these external components as building blocks enables companies to leverage the …

Beyond bot detection: combating fraudulent online survey takers✱

Z Zhang, S Zhu, J Mink, A Xiong, L Song… - Proceedings of the ACM …, 2022 - dl.acm.org
Different techniques have been recommended to detect fraudulent responses in online
surveys, but little research has been taken to systematically test the extent to which they …

Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps

N Alomar, S Egelman - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …

Smart contract security: A practitioners' perspective

Z Wan, X Xia, D Lo, J Chen, X Luo… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Smart contracts have been plagued by security incidents, which resulted in substantial
financial losses. Given numerous research efforts in addressing the security issues of smart …