You are not your developer, either: A research agenda for usable security and privacy research beyond end users
While researchers have developed many tools, techniques, and protocols for improving
software security, exploits and breaches are only becoming more frequent. Some of this gap …
software security, exploits and breaches are only becoming more frequent. Some of this gap …
A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Stack overflow considered harmful? the impact of copy&paste on android application security
Online programming discussion platforms such as Stack Overflow serve as a rich source of
information for software developers. Available information include vibrant discussions and …
information for software developers. Available information include vibrant discussions and …
Reliable third-party library detection in android and its security applications
Third-party libraries on Android have been shown to be security and privacy hazards by
adding security vulnerabilities to their host apps or by misusing inherited access rights …
adding security vulnerabilities to their host apps or by misusing inherited access rights …
You get where you're looking for: The impact of information sources on code security
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …
unprotected inter-component communication, broken TLS implementations, and violations of …
Comparing the usability of cryptographic apis
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Conventional wisdom suggests that many of these errors are caused by cryptographic …
" If HTTPS Were Secure, I Wouldn't Need 2FA"-End User and Administrator Mental Models of HTTPS
HTTPS is one of the most important protocols used to secure communication and is,
fortunately, becoming more pervasive. However, especially the long tail of websites is still …
fortunately, becoming more pervasive. However, especially the long tail of websites is still …
Do you really code? designing and evaluating screening questions for online surveys with programmers
A Danilova, A Naiakshina… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Recruiting professional programmers in sufficient numbers for research studies can be
challenging because they often cannot spare the time, or due to their geographical …
challenging because they often cannot spare the time, or due to their geographical …
A survey on developer-centred security
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …
runs on millions of devices. Yet we continue to see insecure code being developed and …
" I Have No Idea What I'm Doing"-On the Usability of Deploying {HTTPS}
Protecting communication content at scale is a difficult task, and TLS is the protocol most
commonly used to do so. However, it has been shown that deploying it in a truly secure …
commonly used to do so. However, it has been shown that deploying it in a truly secure …