A survey on developer-centred security

M Tahaei, K Vaniea - 2019 IEEE European Symposium on …, 2019 - ieeexplore.ieee.org
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …

Sok: Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

'Think secure from the beginning' A Survey with Software Developers

H Assal, S Chiasson - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Vulnerabilities persist despite existing software security initiatives and best practices. This
paper focuses on the human factors of software security, including human behaviour and …

Power jacking your station: In-depth security analysis of electric vehicle charging station management systems

T Nasr, S Torabi, E Bou-Harb, C Fachkha, C Assi - Computers & Security, 2022 - Elsevier
Abstract The demand for Electric Vehicles (EVs) has been exponentially increasing, and to
achieve sustainable growth, the industry dictated rapid development of the supporting …

Human factors in security research: Lessons learned from 2008-2018

M Kaur, M van Eeten, M Janssen, K Borgolte… - arXiv preprint arXiv …, 2021 - arxiv.org
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …

Understanding privacy-related questions on stack overflow

M Tahaei, K Vaniea, N Saphra - … of the 2020 CHI conference on human …, 2020 - dl.acm.org
We analyse Stack Overflow (SO) to understand challenges and confusions developers face
while dealing with privacy-related topics. We apply topic modelling techniques to 1,733 …

Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez, O Barais - arXiv preprint arXiv:2204.04008, 2022 - arxiv.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

Smart contract security: A practitioners' perspective

Z Wan, X Xia, D Lo, J Chen, X Luo… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Smart contracts have been plagued by security incidents, which resulted in substantial
financial losses. Given numerous research efforts in addressing the security issues of smart …

{“Security} is not my field,{I'm} a stats {guy”}: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry

J Mink, H Kaur, J Schmüser, S Fahl, Y Acar - 32nd USENIX Security …, 2023 - usenix.org
Adversarial machine learning (AML) has the potential to leak training data, force arbitrary
classifications, and greatly degrade overall performance of machine learning models, all of …

How does usable security (not) end up in software products? results from a qualitative interview study

M Gutfleisch, JH Klemmer, N Busch… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …