Smart home personal assistants: a security and privacy review

JS Edu, JM Such, G Suarez-Tangil - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Smart Home Personal Assistants (SPA) are an emerging innovation that is changing the
means by which home users interact with technology. However, several elements expose …

The security of smart buildings: a systematic literature review

P Ciholas, A Lennie, P Sadigova, JM Such - arxiv preprint arxiv …, 2019 - arxiv.org
Smart Buildings are networks of connected devices and software in charge of automatically
managing and controlling several building functions such as HVAC, fire alarms, lighting …

[HTML][HTML] Security in agile software development: A practitioner survey

K Rindell, J Ruohonen, J Holvitie, S Hyrynsalmi… - Information and …, 2021 - Elsevier
Context: Software security engineering provides the means to define, implement and verify
security in software products. Software security engineering is performed by following a …

[HTML][HTML] “Talking a different Language”: Anticipating adversary attack cost for cyber risk assessment

R Derbyshire, B Green, D Hutchison - Computers & Security, 2021 - Elsevier
Typical cyber security risk assessment methods focus on the system under consideration, its
vulnerabilities, and the resulting impact in the event of a system compromise. Cyber security …

From needs to actions to secure apps? the effect of requirements and developer practices on app security

C Weir, B Hermann, S Fahl - 29th USENIX security symposium (USENIX …, 2020 - usenix.org
Increasingly mobile device users are being hurt by security or privacy issues with the apps
they use. App developers can help prevent this; inexpensive security assurance techniques …

A passion for security: Intervening to help software developers

C Weir, I Becker, L Blair - 2021 IEEE/ACM 43rd International …, 2021 - ieeexplore.ieee.org
While the techniques to achieve secure, privacy-preserving software are now well
understood, evidence shows that many software development teams do not use them: they …

Basic cyber hygiene: Does it work?

JM Such, P Ciholas, A Rashid, J Vidler, T Seabrook - Computer, 2019 - ieeexplore.ieee.org
A number of security certifications for small-and medium-size enterprises have been
proposed, but how effective are these schemes? We evaluated the effectiveness of Cyber …

Developers are neither enemies nor users: they are collaborators

PD Chowdhury, J Hallett, N Patnaik… - 2021 IEEE Secure …, 2021 - ieeexplore.ieee.org
Developers struggle to program securely. Prior works have reviewed the methods used to
run user-studies with developers, systematized the ancestry of security API usability …

Interventions for long‐term software security: Creating a lightweight program of assurance techniques for developers

C Weir, I Becker, J Noble, L Blair… - Software: Practice …, 2020 - Wiley Online Library
Though some software development teams are highly effective at delivering security, others
either do not care or do not have access to security experts to teach them how …

Infiltrating security into development: exploring the world's largest software security study

C Weir, S Migues, M Ware, L Williams - … of the 29th ACM Joint Meeting …, 2021 - dl.acm.org
Recent years have seen rapid increases in cybercrime. The use of effective software security
activities plays an important part in preventing the harm involved. Objective research on …