Deep learning based vulnerability detection: Are we there yet?
Automated detection of software vulnerabilities is a fundamental problem in software
security. Existing program analysis techniques either suffer from high false positives or false …
security. Existing program analysis techniques either suffer from high false positives or false …
A survey on developer-centred security
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …
runs on millions of devices. Yet we continue to see insecure code being developed and …
Large language models for code: Security hardening and adversarial testing
Large language models (large LMs) are increasingly trained on massive codebases and
used to generate code. However, LMs lack awareness of security and are found to …
used to generate code. However, LMs lack awareness of security and are found to …
Security in the software development lifecycle
We interviewed developers currently employed in industry to explore real-life software
security practices during each stage of the development lifecycle. This paper explores steps …
security practices during each stage of the development lifecycle. This paper explores steps …
'Think secure from the beginning' A Survey with Software Developers
Vulnerabilities persist despite existing software security initiatives and best practices. This
paper focuses on the human factors of software security, including human behaviour and …
paper focuses on the human factors of software security, including human behaviour and …
Hackers vs. testers: A comparison of software vulnerability discovery processes
Identifying security vulnerabilities in software is a critical task that requires significant human
effort. Currently, vulnerability discovery is often the responsibility of software testers before …
effort. Currently, vulnerability discovery is often the responsibility of software testers before …
A large-scale study of usability criteria addressed by static analysis tools
Static analysis tools support developers in detecting potential coding issues, such as bugs
or vulnerabilities. Research on static analysis emphasizes its technical challenges but also …
or vulnerabilities. Research on static analysis emphasizes its technical challenges but also …
" False negative-that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing
The demand for automated security analysis techniques, such as static analysis based
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
security testing (SAST) tools continues to increase. To develop SASTs that are effectively …
Security developer studies with {GitHub} users: Exploring a convenience sample
The usable security community is increasingly considering how to improve security decision-
making not only for end users, but also for information technology professionals, including …
making not only for end users, but also for information technology professionals, including …
An observational investigation of reverse {Engineers'} processes
Reverse engineering is a complex process essential to software-security tasks such as
vulnerability discovery and malware analysis. Significant research and engineering effort …
vulnerability discovery and malware analysis. Significant research and engineering effort …