A survey on developer-centred security
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …
runs on millions of devices. Yet we continue to see insecure code being developed and …
Sok: Taxonomy of attacks on open-source software supply chains
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …
'Think secure from the beginning' A Survey with Software Developers
H Assal, S Chiasson - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Vulnerabilities persist despite existing software security initiatives and best practices. This
paper focuses on the human factors of software security, including human behaviour and …
paper focuses on the human factors of software security, including human behaviour and …
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems
Abstract The demand for Electric Vehicles (EVs) has been exponentially increasing, and to
achieve sustainable growth, the industry dictated rapid development of the supporting …
achieve sustainable growth, the industry dictated rapid development of the supporting …
Human factors in security research: Lessons learned from 2008-2018
Instead of only considering technology, computer security research now strives to also take
into account the human factor by studying regular users and, to a lesser extent, experts like …
into account the human factor by studying regular users and, to a lesser extent, experts like …
Understanding privacy-related questions on stack overflow
We analyse Stack Overflow (SO) to understand challenges and confusions developers face
while dealing with privacy-related topics. We apply topic modelling techniques to 1,733 …
while dealing with privacy-related topics. We apply topic modelling techniques to 1,733 …
Taxonomy of attacks on open-source software supply chains
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …
Smart contract security: A practitioners' perspective
Smart contracts have been plagued by security incidents, which resulted in substantial
financial losses. Given numerous research efforts in addressing the security issues of smart …
financial losses. Given numerous research efforts in addressing the security issues of smart …
{“Security} is not my field,{I'm} a stats {guy”}: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry
Adversarial machine learning (AML) has the potential to leak training data, force arbitrary
classifications, and greatly degrade overall performance of machine learning models, all of …
classifications, and greatly degrade overall performance of machine learning models, all of …
How does usable security (not) end up in software products? results from a qualitative interview study
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …
security features. These features are usually implemented by software professionals during …