Everyone for themselves? a qualitative study about individual security setups of open source software contributors
To increase open-source software supply chain security, protecting the development
environment of contributors against attacks is crucial. For example, contributors must protect …
environment of contributors against attacks is crucial. For example, contributors must protect …
A mixed-methods study of open-source software maintainers on vulnerability management and platform security features
In open-source software (OSS), software vulnerabilities have significantly increased.
Although researchers have investigated the perspectives of vulnerability reporters and OSS …
Although researchers have investigated the perspectives of vulnerability reporters and OSS …
What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developers
Several security issues in open-source projects demonstrate that developer accounts get
misused or stolen if weak authentication is used. Many services have started to enforce …
misused or stolen if weak authentication is used. Many services have started to enforce …
On the usability of authentication security communication
SM Amft - 2024 - repo.uni-hannover.de
Information technology has become more and more ubiquitous in recent times, and it affects
almost all aspects of modern life. To protect this technology and its underlying resources, the …
almost all aspects of modern life. To protect this technology and its underlying resources, the …