Android source code vulnerability detection: a systematic literature review
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …
increasing number of mobile applications are constantly offered on mobile marketplaces to …
Android mobile malware detection using machine learning: A systematic review
With the increasing use of mobile devices, malware attacks are rising, especially on Android
phones, which account for 72.2% of the total market share. Hackers try to attack …
phones, which account for 72.2% of the total market share. Hackers try to attack …
Privacy champions in software teams: Understanding their motivations, strategies, and challenges
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …
[HTML][HTML] Influencing the security prioritisation of an agile software development project
Software security is a complex topic, and for development projects it can be challenging to
assess what security is necessary and cost-effective. Agile Software Development (ASD) …
assess what security is necessary and cost-effective. Agile Software Development (ASD) …
How does usable security (not) end up in software products? results from a qualitative interview study
For software to be secure in practice, users need to be willing and able to appropriately use
security features. These features are usually implemented by software professionals during …
security features. These features are usually implemented by software professionals during …
The case for adaptive security interventions
Despite the availability of various methods and tools to facilitate secure coding, developers
continue to write code that contains common vulnerabilities. It is important to understand …
continue to write code that contains common vulnerabilities. It is important to understand …
Security notifications in static analysis tools: Developers' attitudes, comprehension, and ability to act on them
Static analysis tools (SATs) have the potential to assist developers in finding and fixing
vulnerabilities in the early stages of software development, requiring them to be able to …
vulnerabilities in the early stages of software development, requiring them to be able to …
A passion for security: Intervening to help software developers
While the techniques to achieve secure, privacy-preserving software are now well
understood, evidence shows that many software development teams do not use them: they …
understood, evidence shows that many software development teams do not use them: they …
Towards the integration of security practices in agile software development: a systematic map** review
Y Valdés-Rodríguez, J Hochstetter-Diez… - Applied Sciences, 2023 - mdpi.com
Software development must be based on more than just the experience and capabilities of
your programmers and your team. The importance of obtaining a quality product lies in the …
your programmers and your team. The importance of obtaining a quality product lies in the …
Measuring secure coding practice and culture: A finger pointing at the moon is not the moon
Software security research has a core problem: it is impossible to prove the security of
complex software. A low number of known defects may simply indicate that the software has …
complex software. A low number of known defects may simply indicate that the software has …