Trustworthy LLMs: A survey and guideline for evaluating large language models' alignment
Ensuring alignment, which refers to making models behave in accordance with human
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
Privacy laws and privacy by design schemes for the internet of things: A developer's perspective
Internet of Things applications have the potential to derive sensitive information about
individuals. Therefore, developers must exercise due diligence to make sure that data are …
individuals. Therefore, developers must exercise due diligence to make sure that data are …
Security in the software development lifecycle
H Assal, S Chiasson - Fourteenth symposium on usable privacy and …, 2018 - usenix.org
We interviewed developers currently employed in industry to explore real-life software
security practices during each stage of the development lifecycle. This paper explores steps …
security practices during each stage of the development lifecycle. This paper explores steps …
'Think secure from the beginning' A Survey with Software Developers
H Assal, S Chiasson - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
Vulnerabilities persist despite existing software security initiatives and best practices. This
paper focuses on the human factors of software security, including human behaviour and …
paper focuses on the human factors of software security, including human behaviour and …
Examining security and privacy research in developing regions
Prior research suggests that security and privacy needs of users in developing regions are
different than those in developed regions. To better understand the underlying differentiating …
different than those in developed regions. To better understand the underlying differentiating …
Investigating system operators' perspective on security misconfigurations
C Dietrich, K Krombholz, K Borgolte… - Proceedings of the 2018 …, 2018 - dl.acm.org
Nowadays, security incidents have become a familiar" nuisance," and they regularly lead to
the exposure of private and sensitive data. The root causes for such incidents are rarely …
the exposure of private and sensitive data. The root causes for such incidents are rarely …
Ethics emerging: the story of privacy and security perceptions in virtual reality
D Adams, A Bah, C Barwulor, N Musaby… - … Symposium on Usable …, 2018 - usenix.org
Virtual reality (VR) technology aims to transport the user to a virtual world, fully immersing
them in an experience entirely separate from the real world. VR devices can use sensor data …
them in an experience entirely separate from the real world. VR devices can use sensor data …
Why can't johnny fix vulnerabilities: A usability evaluation of static analysis tools for security
Static analysis tools can help prevent security incidents, but to do so, they must enable
developers to resolve the defects they detect. Unfortunately, developers often struggle to …
developers to resolve the defects they detect. Unfortunately, developers often struggle to …
Why developers cannot embed privacy into software systems? An empirical investigation
A Senarath, NAG Arachchilage - Proceedings of the 22nd International …, 2018 - dl.acm.org
Pervasive use of software applications continue to challenge user privacy when users
interact with software systems. Even though privacy practices such as Privacy by Design …
interact with software systems. Even though privacy practices such as Privacy by Design …
How does usable security (not) end up in software products? results from a qualitative interview study
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …
security features. These features are usually implemented by software professionals during …