Trustworthy LLMs: A survey and guideline for evaluating large language models' alignment

Y Liu, Y Yao, JF Ton, X Zhang, RGH Cheng… - arXiv preprint arXiv …, 2023 - arxiv.org
Ensuring alignment, which refers to making models behave in accordance with human
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …

Privacy laws and privacy by design schemes for the internet of things: A developer's perspective

A Aljeraisy, M Barati, O Rana, C Perera - ACM Computing Surveys (Csur …, 2021 - dl.acm.org
Internet of Things applications have the potential to derive sensitive information about
individuals. Therefore, developers must exercise due diligence to make sure that data are …

Security in the software development lifecycle

H Assal, S Chiasson - Fourteenth symposium on usable privacy and …, 2018 - usenix.org
We interviewed developers currently employed in industry to explore real-life software
security practices during each stage of the development lifecycle. This paper explores steps …

'Think secure from the beginning' A Survey with Software Developers

H Assal, S Chiasson - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Vulnerabilities persist despite existing software security initiatives and best practices. This
paper focuses on the human factors of software security, including human behaviour and …

Examining security and privacy research in developing regions

A Vashistha, R Anderson, S Mare - Proceedings of the 1st ACM SIGCAS …, 2018 - dl.acm.org
Prior research suggests that security and privacy needs of users in developing regions are
different than those in developed regions. To better understand the underlying differentiating …

Investigating system operators' perspective on security misconfigurations

C Dietrich, K Krombholz, K Borgolte… - Proceedings of the 2018 …, 2018 - dl.acm.org
Nowadays, security incidents have become a familiar" nuisance," and they regularly lead to
the exposure of private and sensitive data. The root causes for such incidents are rarely …

Ethics emerging: the story of privacy and security perceptions in virtual reality

D Adams, A Bah, C Barwulor, N Musaby… - … Symposium on Usable …, 2018 - usenix.org
Virtual reality (VR) technology aims to transport the user to a virtual world, fully immersing
them in an experience entirely separate from the real world. VR devices can use sensor data …

Why can't johnny fix vulnerabilities: A usability evaluation of static analysis tools for security

J Smith, LNQ Do, E Murphy-Hill - Sixteenth Symposium on Usable …, 2020 - usenix.org
Static analysis tools can help prevent security incidents, but to do so, they must enable
developers to resolve the defects they detect. Unfortunately, developers often struggle to …

Why developers cannot embed privacy into software systems? An empirical investigation

A Senarath, NAG Arachchilage - Proceedings of the 22nd International …, 2018 - dl.acm.org
Pervasive use of software applications continue to challenge user privacy when users
interact with software systems. Even though privacy practices such as Privacy by Design …

How does usable security (not) end up in software products? results from a qualitative interview study

M Gutfleisch, JH Klemmer, N Busch… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …