Systematic mapping study on domain-specific language development tools

A Iung, J Carbonell, L Marchezan, E Rodrigues… - Empirical Software …, 2020 - Springer
Abstract Domain-specific languages (DSL) are programming or modeling languages
devoted to a given application domain. There are many tools used to support the …

Do users write more insecure code with AI assistants?

N Perry, M Srivastava, D Kumar, D Boneh - Proceedings of the 2023 …, 2023 - dl.acm.org
AI code assistants have emerged as powerful tools that can aid in the software development
life-cycle and can improve developer productivity. Unfortunately, such assistants have also …

Automatic detection of Java cryptographic API misuses: Are we there yet?

Y Zhang, MMA Kabir, Y Xiao, D Yao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Java platform provides various cryptographic APIs to facilitate secure coding. However,
correctly using these APIs is challenging for developers who lack cybersecurity training …

The seven sins: Security smells in infrastructure as code scripts

A Rahman, C Parnin, L Williams - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Practitioners use infrastructure as code (IaC) scripts to provision servers and development
environments. While developing IaC scripts, practitioners may inadvertently introduce …

Your firmware has arrived: A study of firmware update vulnerabilities

Y Wu, J Wang, Y Wang, S Zhai, Z Li, Y He… - 33rd USENIX Security …, 2024 - usenix.org
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …

“They're not that hard to mitigate”: What cryptographic library developers think about timing attacks

J Jancar, M Fourné, DDA Braga, M Sabt… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Timing attacks are among the most devastating side-channel attacks, allowing remote
attackers to retrieve secret material, including cryptographic keys, with relative ease. In …

Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects

S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian… - Proceedings of the …, 2019 - dl.acm.org
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …

An observational investigation of reverse {Engineers'} processes

D Votipka, S Rabin, K Micinski, JS Foster… - 29th USENIX Security …, 2020 - usenix.org
Reverse engineering is a complex process essential to software-security tasks such as
vulnerability discovery and malware analysis. Significant research and engineering effort …

Context-, flow-, and field-sensitive data-flow analysis using synchronized pushdown systems

J Späth, K Ali, E Bodden - Proceedings of the ACM on Programming …, 2019 - dl.acm.org
Precise static analyses are context-, field-and flow-sensitive. Context-and field-sensitivity are
both expressible as context-free language (CFL) reachability problems. Solving both CFL …

Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it

D Votipka, KR Fulton, J Parker, M Hou… - 29th USENIX Security …, 2020 - usenix.org
Secure software development is a challenging task requiring consideration of many possible
threats and mitigations. This paper investigates how and why programmers, despite a …