Comparing the usability of cryptographic apis
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Why do developers get password storage wrong? A qualitative usability study
Passwords are still a mainstay of various security systems, as well as the cause of many
usability issues. For end-users, many of these issues have been studied extensively …
usability issues. For end-users, many of these issues have been studied extensively …
A systematic map** study of API usability evaluation methods
Abstract An Application Programming Interface (API) provides a programmatic interface to a
software component that is often offered publicly and may be used by programmers who are …
software component that is often offered publicly and may be used by programmers who are …
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In
many cases developers are overburdened by the complex set of programming choices and …
many cases developers are overburdened by the complex set of programming choices and …
An investigation into misuse of java security apis by large language models
The increasing trend of using Large Language Models (LLMs) for code generation raises
the question of their capability to generate trustworthy code. While many researchers are …
the question of their capability to generate trustworthy code. While many researchers are …
Deception task design in developer password studies: Exploring a student sample
Studying developer behavior is a hot topic for usable security researchers. While the usable
security community has ample experience and best-practice knowledge concerning the …
security community has ample experience and best-practice knowledge concerning the …
Listen to developers! a participatory design study on security warnings for cryptographic apis
The positive effect of security information communicated to developers through API warnings
has been established. However, current prototypical designs are based on security …
has been established. However, current prototypical designs are based on security …
[HTML][HTML] Multi-level fuzzy system for usable-security assessment
Indubitably, security is an integral aspect of the development of quality software. More
importantly, usability is also an elemental and pivotal factor for develo** quality software …
importantly, usability is also an elemental and pivotal factor for develo** quality software …
“I'm pretty expert and I still screw it up”: Qualitative Insights into Experiences and Challenges of Designing and Implementing Cryptographic Library APIs
Cryptographic libraries are a vital security component of software systems, yet their misuse
has caused several incidents. Prior work has established that misuse of cryptographic …
has caused several incidents. Prior work has established that misuse of cryptographic …
Detecting Misuses of Security APIs: A Systematic Review
Security Application Programming Interfaces (APIs) play a vital role in ensuring software
security. However, misuse of security APIs may introduce vulnerabilities that can be …
security. However, misuse of security APIs may introduce vulnerabilities that can be …