12 angry developers-a qualitative study on developers' struggles with csp

S Roth, L Gröber, M Backes, K Krombholz… - Proceedings of the 2021 …, 2021 - dl.acm.org
The Web has improved our ways of communicating, collaborating, teaching, and
entertaining us and our fellow human beings. However, this cornerstone of our modern …

Measuring developers' web security awareness from attack and defense perspectives

M Sahin, T Ünlü, C Hébert, LA Shepherd… - 2022 IEEE Security …, 2022 - ieeexplore.ieee.org
Web applications are the public-facing components of information systems, which makes
them an easy entry point for various types of attacks. While it is often the responsibility of …

“I just looked for the solution!” On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices

PL Gorski, S Möller, S Wiefling… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Software developers build complex systems using plenty of third-party libraries.
Documentation is key to understand and use the functionality provided via the libraries' APIs …

[PDF][PDF] Usability, security, and privacy of risk-based authentication

S Wiefling - 2023 - researchgate.net
Weaknesses in password-based authentication have always shaken password security,
especially with the rise of data breaches. Credential stuffing and password spraying attacks …

[PDF][PDF] An Empirical Study on Reproducible Packaging in Open-Source Ecosystems

G Benedetti, O Solarin, C Miller, G Tystahl, W Enck… - cs.cmu.edu
The integrity of software builds is fundamental to the security of the software supply chain.
While Thompson first raised the potential for attacks on build infrastructure in 1984, limited …

Development of secure software

V Petrova - Security & Future, 2022 - stumejournals.com
The main goal of this paper is to present methods and tools for secure software
development. The process of creating secure software involves analysis, design and …

[PDF][PDF] A Software Security Assessment using OWASP's Application Security Verification Standard: Results and Experiences from Assessing the DHIS2 Open-Source …

A Eismont - 2020 - duo.uio.no
Security in a software product is a property organizations can not overlook in this day and
age, due to the sensitive and personal information they need to protect. To ensure that …

[การอ้างอิง][C] Аналитичен йерархичен процес за оценка и избор на защитени софтуерни решения

В Петрова - 2022