Comparing the usability of cryptographic apis

Y Acar, M Backes, S Fahl, S Garfinkel… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …

Why do developers get password storage wrong? A qualitative usability study

A Naiakshina, A Danilova, C Tiefenau… - Proceedings of the …, 2017 - dl.acm.org
Passwords are still a mainstay of various security systems, as well as the cause of many
usability issues. For end-users, many of these issues have been studied extensively …

A systematic map** study of API usability evaluation methods

I Rauf, E Troubitsyna, I Porres - Computer Science Review, 2019 - Elsevier
Abstract An Application Programming Interface (API) provides a programmatic interface to a
software component that is often offered publicly and may be used by programmers who are …

Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse

PL Gorski, LL Iacono, D Wermke, C Stransky… - … Symposium on Usable …, 2018 - usenix.org
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In
many cases developers are overburdened by the complex set of programming choices and …

An investigation into misuse of java security apis by large language models

Z Mousavi, C Islam, K Moore, A Abuadbba… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing trend of using Large Language Models (LLMs) for code generation raises
the question of their capability to generate trustworthy code. While many researchers are …

Deception task design in developer password studies: Exploring a student sample

A Naiakshina, A Danilova, C Tiefenau… - Fourteenth Symposium on …, 2018 - usenix.org
Studying developer behavior is a hot topic for usable security researchers. While the usable
security community has ample experience and best-practice knowledge concerning the …

Listen to developers! a participatory design study on security warnings for cryptographic apis

PL Gorski, Y Acar, L Lo Iacono, S Fahl - … of the 2020 CHI Conference on …, 2020 - dl.acm.org
The positive effect of security information communicated to developers through API warnings
has been established. However, current prototypical designs are based on security …

[HTML][HTML] Multi-level fuzzy system for usable-security assessment

A Agrawal, M Alenezi, SA Khan, R Kumar… - Journal of King Saud …, 2022 - Elsevier
Indubitably, security is an integral aspect of the development of quality software. More
importantly, usability is also an elemental and pivotal factor for develo** quality software …

“I'm pretty expert and I still screw it up”: Qualitative Insights into Experiences and Challenges of Designing and Implementing Cryptographic Library APIs

J Schmüser, P Klostermeyer, K Friedrich… - 2025 IEEE Symposium …, 2024 - computer.org
Cryptographic libraries are a vital security component of software systems, yet their misuse
has caused several incidents. Prior work has established that misuse of cryptographic …

Detecting Misuses of Security APIs: A Systematic Review

Z Mousavi, C Islam, MA Babar, A Abuadbba… - arxiv preprint arxiv …, 2023 - arxiv.org
Security Application Programming Interfaces (APIs) play a vital role in ensuring software
security. However, misuse of security APIs may introduce vulnerabilities that can be …